Analysis
-
max time kernel
141s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe
-
Size
4.3MB
-
MD5
887e4fbd329e5238367e5c73033ed2e5
-
SHA1
20ebd911eee996e569beb2dd51b35f775a5e0c06
-
SHA256
e1eceb0b8bdf4631690be12d1488df50b9babb9e5600f0bed39e42e3c885fcbc
-
SHA512
2bdd1c95ae7fdeae2479d3cce3b7e72d4f645fde291644531a9d2f5ca83c465e9154371f9ca8447af14e60925fd4f201ae9de199ed6b9bb0dadce8ebea26889c
-
SSDEEP
98304:L/394YXd94uVCpx18A4clyK5ms6TvaYP1DpQiQhV8eVmqkly/h:54YEuVCXp4cMiLYPPiUeVm4h
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0005000000019604-24.dat family_ardamax -
Executes dropped EXE 2 IoCs
Processes:
ALE.EXEFLRV.exepid Process 2064 ALE.EXE 2788 FLRV.exe -
Loads dropped DLL 6 IoCs
Processes:
ALE.EXEFLRV.exeDllHost.exepid Process 2064 ALE.EXE 2064 ALE.EXE 2788 FLRV.exe 2788 FLRV.exe 2972 DllHost.exe 2972 DllHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
FLRV.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FLRV Agent = "C:\\Windows\\SysWOW64\\28463\\FLRV.exe" FLRV.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
Processes:
ALE.EXEFLRV.exedescription ioc Process File created C:\Windows\SysWOW64\28463\AKV.exe ALE.EXE File opened for modification C:\Windows\SysWOW64\28463 FLRV.exe File created C:\Windows\SysWOW64\28463\FLRV.001 ALE.EXE File created C:\Windows\SysWOW64\28463\FLRV.006 ALE.EXE File created C:\Windows\SysWOW64\28463\FLRV.007 ALE.EXE File created C:\Windows\SysWOW64\28463\FLRV.exe ALE.EXE File created C:\Windows\SysWOW64\28463\key.bin ALE.EXE -
Drops file in Windows directory 5 IoCs
Processes:
887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exeDllHost.exedescription ioc Process File created C:\Windows\CALE.EXE 887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe File created C:\Windows\ALE.EXE 887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe File created C:\Windows\CVDGF058.JPG 887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe File created C:\Windows\VDGF058.JPG 887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe File opened for modification C:\Windows\VDGF058.JPG DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exeALE.EXEDllHost.exeFLRV.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ALE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FLRV.exe -
Modifies registry class 35 IoCs
Processes:
FLRV.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830} FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\ FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\HELPDIR\ FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\Version FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\ = "Degiwvol Ikariwa" FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\InProcServer32\ = "%SystemRoot%\\SysWow64\\wbem\\wbemdisp.dll" FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\ProgID FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\ FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\HELPDIR FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\" FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\TypeLib\ = "{8C19A9BB-8F44-9128-37DA-580BEB676830}" FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B} FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\Version\ FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\ = "PDFFilter 1.0 Type Library" FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\0 FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\TypeLib FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\0\win32\ FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\TypeLib\ FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\InProcServer32 FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\Programmable\ FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\0\ FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\FLAGS FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\VersionIndependentProgID FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\VersionIndependentProgID\ = "WbemScripting.SWbemNamedValueSet" FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\ProgID\ FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\Programmable FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0 FLRV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\0\win32 FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\0\win32\ = "C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRdIF.dll" FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\FLAGS\ FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\Version\ = "1.0" FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\InProcServer32\ FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\ProgID\ = "WbemScripting.SWbemNamedValueSet.1" FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8C19A9BB-8F44-9128-37DA-580BEB676830}\1.0\FLAGS\ = "0" FLRV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4BE063C3-1481-4BA6-CFAA-84C0AA9E422B}\VersionIndependentProgID\ FLRV.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
FLRV.exedescription pid Process Token: 33 2788 FLRV.exe Token: SeIncBasePriorityPrivilege 2788 FLRV.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 2972 DllHost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
FLRV.exeDllHost.exepid Process 2788 FLRV.exe 2788 FLRV.exe 2788 FLRV.exe 2788 FLRV.exe 2788 FLRV.exe 2972 DllHost.exe 2972 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exeALE.EXEdescription pid Process procid_target PID 2508 wrote to memory of 2064 2508 887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2064 2508 887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2064 2508 887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe 30 PID 2508 wrote to memory of 2064 2508 887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe 30 PID 2064 wrote to memory of 2788 2064 ALE.EXE 32 PID 2064 wrote to memory of 2788 2064 ALE.EXE 32 PID 2064 wrote to memory of 2788 2064 ALE.EXE 32 PID 2064 wrote to memory of 2788 2064 ALE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\887e4fbd329e5238367e5c73033ed2e5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\ALE.EXE"C:\Windows\ALE.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\28463\FLRV.exe"C:\Windows\system32\28463\FLRV.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD5c57e6e9bcf0c0252692a379082353555
SHA10d30ba2da6bd3366a4c4f06fccc624989c3df425
SHA256a0fdf80be32bd36f13b5d0fc53400e33bf84e64d0c8955fc7f88ed77475bdf4e
SHA51217aa5f1c6a7df4d80e3179bb8ed3aa55ae680450beba57a583e2d9f326bb352dc336ad25209b157a33309a7831eee0c773f2eaa2975c3a38a2b0a361146d796f
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
444B
MD51c9c169d8bde064ed8770d4be13be8d4
SHA1868d4b8efc748117f2b4d17e60328c0fe610a203
SHA256816c7eaf58d1d635afebe3cc21324970cfb51b249e9ba0806cb013046ef6422c
SHA512b1e34a8510e58ef4f999019ccafc863591e5934b48b4332a019aa9e7d25edd82b125cb138d5a77a84005986b5221d7f78fcf6827bb36fd8e82c5e04cabb9377c
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
Filesize
3.5MB
MD5ee835760c3eae42ea19bb4a389ecd4ec
SHA1087141785261d5f10f77907072e40bb7b8f63a14
SHA256c62d0bed90aebb240109022af1e0bfb677c1e98ce27c48f12b429cc38a26049a
SHA512ee215881a01a1f5dcac30be18bca74c33ee18b8754c89b037d4f5f47cc54e1c4a7564d5a39353cfc2dfefa7c84afbbbe9f090829f652023f625c6f24b5539066
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a