Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe
-
Size
896KB
-
MD5
e47e6e28041bf94f4eaad66eca1227de
-
SHA1
44b45b027df8b714868fe39c4137cc6b6ad9db74
-
SHA256
f44c4d99f8689e531b01187a39b51906a2dd43c923af519bf0f0e2253c9dd59d
-
SHA512
d87001df1165a1772d6c7db97f46ee634f569c4423b89cb5553032be12f68f76479c81079ecef49c74bc5fea867f38293dbf6633c4e6cd396f0e48bada269b8d
-
SSDEEP
12288:oE4G9QemJ5zgORX/ka5Dau7gpCN+k8OAXav6q3vcjSyHGMm9teigKaD9cun35Q9Y:8G9TmJVgOF/LP78O8Og6v0TmaWAJQ9Y
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0006000000019431-29.dat family_ardamax -
Executes dropped EXE 3 IoCs
pid Process 2864 1.exe 1764 2.exe 2744 IFYC.exe -
Loads dropped DLL 4 IoCs
pid Process 1764 2.exe 1764 2.exe 2744 IFYC.exe 2744 IFYC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IFYC Agent = "C:\\Windows\\SysWOW64\\28463\\IFYC.exe" IFYC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\IFYC.001 2.exe File created C:\Windows\SysWOW64\28463\IFYC.006 2.exe File created C:\Windows\SysWOW64\28463\IFYC.007 2.exe File created C:\Windows\SysWOW64\28463\IFYC.exe 2.exe File created C:\Windows\SysWOW64\28463\key.bin 2.exe File created C:\Windows\SysWOW64\28463\AKV.exe 2.exe File opened for modification C:\Windows\SysWOW64\28463 IFYC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IFYC.exe -
Modifies registry class 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0 IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\HELPDIR IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\VersionIndependentProgID IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\Programmable\ IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\Programmable IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA} IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\FLAGS\ IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\TypeLib IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\VersionIndependentProgID\ IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\InprocServer32\ = "C:\\PROGRA~2\\COMMON~1\\MICROS~1\\SMARTT~1\\IETAG.DLL" IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\ = "GrooveProjectToolsetMisc" IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\0 IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\InprocServer32\ IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\ProgID IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\ IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\8" IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\HELPDIR\ IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\InprocServer32 IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\ProgID\ IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\0\ IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA} IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\TypeLib\ IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\TypeLib\ = "{16D396BF-DA05-F718-CFB0-40698EFC7ABA}" IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\VersionIndependentProgID\ = "Ietag.OOC" IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\0\win32 IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\ProgID\ = "Ietag.OOC.1" IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\ IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\0\win32\ IFYC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\FLAGS IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{16D396BF-DA05-F718-CFB0-40698EFC7ABA}\1.0\FLAGS\ = "4" IFYC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3904FBB1-8707-4BC7-0F80-EB96DA79E6DA}\ = "Vajof" IFYC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2744 IFYC.exe Token: SeIncBasePriorityPrivilege 2744 IFYC.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 1.exe 2744 IFYC.exe 2744 IFYC.exe 2744 IFYC.exe 2744 IFYC.exe 2744 IFYC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2864 2920 e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe 32 PID 2920 wrote to memory of 2864 2920 e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe 32 PID 2920 wrote to memory of 2864 2920 e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe 32 PID 2920 wrote to memory of 2864 2920 e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe 32 PID 2920 wrote to memory of 1764 2920 e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe 33 PID 2920 wrote to memory of 1764 2920 e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe 33 PID 2920 wrote to memory of 1764 2920 e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe 33 PID 2920 wrote to memory of 1764 2920 e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe 33 PID 1764 wrote to memory of 2744 1764 2.exe 34 PID 1764 wrote to memory of 2744 1764 2.exe 34 PID 1764 wrote to memory of 2744 1764 2.exe 34 PID 1764 wrote to memory of 2744 1764 2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e47e6e28041bf94f4eaad66eca1227de_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\28463\IFYC.exe"C:\Windows\system32\28463\IFYC.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD587de545b5930c5fc243e72a2ab5b89e9
SHA1790d55bf4004c18b1f0b223ab2f53e76821aed95
SHA256a7d9c97e6c3ee1eb6cd456bbb3447deb8dec92c1e6c30777dd46c0e28a52a4ef
SHA512e9e31bd1eeea8cbe73842517082839211c1307ef6d5e1599bd9b200e775d80a31e9e809c22ec7859b37202541782ec4e0726245048cdda450e4c56ca1b14e995
-
Filesize
786KB
MD58d84ea8ef9fde4bd3e15e8d290547521
SHA1994c44199eee4817aab2b74633bd66d353fbb209
SHA2569541f46dddee758e1ca1f24dae7fc1e2bce1219ba6ee2bcd4881df308ecda7fa
SHA51244b91f806936ba8e9e5accde0ebd36a86585a687a2719b0f2bd5bf7ac4c50c8e6127cbcb87ebc2e64b9e12a6564bc9c0f5f59811a2a3508aaf5ebd8c6cbce93b
-
Filesize
457KB
MD519794a23edc7494063603d316165c04f
SHA16b5050be2ffa32cc3dd0d1e53fa2cfe355c59b4e
SHA25620aa8a967c2982acf1afce320284de9b4749fd3326b63c08fad8921720764b3e
SHA5128f782e06cd32844a336548083eeb50d818ba8acbbba042719da7505dd2d239dc133eedcf244c19901bba7424d2eef60a977b6d6795de9baa6d56ad13c3828774
-
Filesize
358B
MD5e80d7b49941b35105db4347fa49dbb99
SHA13f68d6fd398677608f8ccb89f7947b758fb24138
SHA2564c2e9514d79c14f5c826eb1978dcb9c04475a76ca17a660ea7e6357ed37ecd97
SHA51261c013f18534abfcbcc82f6c80b3b80fa2b0e9bcfeacde1a40c05746e224f571db5e0a44210df301f47af829c775b74db5f869d8d8e787c15f31ccd46620d27f
-
Filesize
8KB
MD5bc5fd352bfe50a09ffd84c95f697f9b4
SHA1847a869a2b789c2f5c9845340f133b8845976aaa
SHA2561c1bd72088d746302e15ed63f343bdbabae5ff39f1633e8f60ccd8e20dc0863f
SHA512b52e8a1507b037ec2c5704c495bb53f3275a60ea35f02928117cb9dfe4718a78f77077571cd75bbe70c2b8f993251350db832834c509d1af9a20d00cedb5a197
-
Filesize
5KB
MD5110bdf91b758328b3f33b4ab7d9fd480
SHA129d9ea9f08248307ef20c63cd1f02e8a5256d90b
SHA2569cd15a69297174a062f839ee86f2f583f09952475891683a042f56d04bd581b3
SHA51253efa1f722045a4f446e38bd780af1e5212de6052677596a7628eac2aa4a562c9752ae9859ee92530f5b3ac9ab2717777edbabdcb09f3f9ede2ba6063fe4bec7
-
Filesize
105B
MD527c90d4d9b049f4cd00f32ed1d2e5baf
SHA1338a3ea8f1e929d8916ece9b6e91e697eb562550
SHA256172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb
SHA512d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae
-
Filesize
4KB
MD570c6ae41897fd3fbc90821be9f6dcafd
SHA1212294333e175cd4e647bd1738cf1e48de41fae2
SHA2566e8e43f1ef95d0dce19434dbeb9576fdbafcfcd8ff2a1d0ada36516b1c11d634
SHA5128822bc940cf1b64e2ec6b318a7f9702c056fcd45da025091609d9e1c455f6d00e2d9413433f827aad63c29212125d100027e43f4adcb235001b269ba0b6f54b3
-
Filesize
648KB
MD5ee07ce6e1da01ee9aa4a9cf523878dd7
SHA15d964e5919146fd2cd410909c03f3aab456cf062
SHA2564ab1e4414b3659a21a5a39b0edd80e967e73140a809f6a8407e46df963ed8f7b
SHA512487eade2e555e270536c1eeaf82ade3436cb8baef5476959a7de0b74df1082ce1b3917a66bc71965e1d4ba95e043706a543b29cfa485d65edc3102a98174e6b3