General
-
Target
cfccfbe9ab6445941858985f799b3394_JaffaCakes118
-
Size
498KB
-
Sample
241207-atrzfawlfx
-
MD5
cfccfbe9ab6445941858985f799b3394
-
SHA1
14ccd9f95a53370c8b63740b81490d3edf6c3948
-
SHA256
810e9b511db1b633000325ef4cc4d53e8f206b2fd10aab9d7a0c94d9fc5b6b74
-
SHA512
06f13b54fd1900cc82c5fc0dba692fa29c0127ed4a5aede3c7a437e1cbc603eb9a8ce7dab1d9cf2391a2c4a823f98165aa36b187f25385f8ee0b6a3d5a58c4ea
-
SSDEEP
12288:Hm9tXxVmqzFDsxT3wxaHWBlzjqK/9g+FZkoUMFb4qevW1+EaoqYVr:0loTgzFVg+FnX9jevW1+Eaov9
Static task
static1
Behavioral task
behavioral1
Sample
cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cfccfbe9ab6445941858985f799b3394_JaffaCakes118
-
Size
498KB
-
MD5
cfccfbe9ab6445941858985f799b3394
-
SHA1
14ccd9f95a53370c8b63740b81490d3edf6c3948
-
SHA256
810e9b511db1b633000325ef4cc4d53e8f206b2fd10aab9d7a0c94d9fc5b6b74
-
SHA512
06f13b54fd1900cc82c5fc0dba692fa29c0127ed4a5aede3c7a437e1cbc603eb9a8ce7dab1d9cf2391a2c4a823f98165aa36b187f25385f8ee0b6a3d5a58c4ea
-
SSDEEP
12288:Hm9tXxVmqzFDsxT3wxaHWBlzjqK/9g+FZkoUMFb4qevW1+EaoqYVr:0loTgzFVg+FnX9jevW1+Eaov9
-
Ardamax family
-
Ardamax main executable
-
Modifies firewall policy service
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1