Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe
-
Size
200KB
-
MD5
ffefb9ff1878b202d4549d7fb77b3dab
-
SHA1
50d443ea3acb3c03a92a45131c1cb8ca790c0d38
-
SHA256
6e3036c93c3e7684e3995518822c3d693c947d7259d11f0ad2e931f244f149ee
-
SHA512
0d93e70ed26aeab258bce102c5c2ee44ca8dc3132011658463b3c4e7e942e5cb897852f5ab6951997fb8117fa5e17f7a98b7a7e1621d8c167c0bf8951d5412f2
-
SSDEEP
3072:HOiQ7ixraQ7AhNoaXBII64TOLdCj7XP3f+m+Pz7yLlgVZgcD5m7zKcmvclKDb6ke:vrzAhNpiNYXXi77y/cD5AzKMwDub
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000018b64-9.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 604 NSK.exe 2876 GunzCheater.exe -
Loads dropped DLL 8 IoCs
pid Process 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 604 NSK.exe 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 604 NSK.exe 2876 GunzCheater.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\NSK.001 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe File created C:\Windows\SysWOW64\NSK.006 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe File created C:\Windows\SysWOW64\NSK.007 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe File created C:\Windows\SysWOW64\NSK.exe ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0007000000018b71-21.dat upx behavioral1/memory/2876-33-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2876-39-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 NSK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GunzCheater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 604 NSK.exe Token: SeIncBasePriorityPrivilege 604 NSK.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 604 NSK.exe 604 NSK.exe 604 NSK.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2524 wrote to memory of 604 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 30 PID 2524 wrote to memory of 604 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 30 PID 2524 wrote to memory of 604 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 30 PID 2524 wrote to memory of 604 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2876 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2876 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2876 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2876 2524 ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffefb9ff1878b202d4549d7fb77b3dab_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\NSK.exe"C:\Windows\system32\NSK.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:604
-
-
C:\Users\Admin\AppData\Local\Temp\GunzCheater.exe"C:\Users\Admin\AppData\Local\Temp\GunzCheater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ff2850b50512fa26598d9edcb6d7ab4d
SHA10620129a1938d18037a496f96590a4677d83cbdd
SHA2569c57eea4129abeb26107d2381d1b8b425457d61007d675be70e5dba348fad337
SHA512899bab2cdb7e7e86cf69490bac0767cf3ed53ddc7f85f2447e9ba6a66d5e1549905d5c9a2d2ceec8f5a460facf1232d1d8b31ce056ef1c427bf12c7bdb38f65b
-
Filesize
4KB
MD50868167c8915fb3d87d4e5a775a57ffd
SHA15f223134e003382fd8c191a1f4ca94922f1d802e
SHA2566a28449ee15745e772f877b6133913325400a2ca3dbf829d76cf42e0c8d6da4c
SHA512d9f82239d6990b3dcc261f99f5acf20d71965b08146821575f830698fa07a5ec7ba0553494bb779e427692ada39ed5973489d1077aeec5ddfdf5a73d9c91b058
-
Filesize
4KB
MD5ccfd350414f3804bbb32ddd7eb3f6153
SHA1e91d270b8481d456a3beabf617ef3379a93f1137
SHA2561dabedfe9c7cda2d8aa74c95ba57fb832a4066b20f4051c0330b4422de237eb3
SHA512328e069aaced9217eb9f4b4f20e27cd7ef933427e3388b3a0829089d694ea2280a2e5511a9eb577cec2a7b409cf367b0f17d8654076931648e152936fad810bd
-
Filesize
32KB
MD567857fd5bd53a8754264f093a8175cf5
SHA1d0d83da14e35b962fa510a9735e5a93c575c740c
SHA2565e91661e3ea89fabcce262628402ca4e7d6e02f9ece42dd9033d6bcec14fc4f1
SHA512d73e21b9c64a5eb74ec0c3495bd0b1aed2909cfb19b8d88d20f9f665ed9e743499c0480e142cf463b3cbe7cdc7ee3fb6827a346c4016a0aeb2af5417cbc7c718
-
Filesize
6KB
MD55e023770dfb9d9068706facc958c7d66
SHA19cf95074a78239da000452362c2167991970e972
SHA256f16ca7e5533eb28fa882eb500add2a936f8d0a705cfc9f4e6c8f4c522a2cf6db
SHA512a9621e77fe22b054686924cebee3c9a5c448b2f60bd1d4c8a6d6bda161ec270d9a5c76cbe07dcd1d0ee59fdc071de1d271344c629181e14c2c0a54cbac7831af
-
Filesize
239KB
MD52bada91f44e2a5133a5c056b31866112
SHA19fbe664832d04d79f96fa090191b73d9811ef08d
SHA256c742feab59b4e1b7b188b02ed91ab34eaeb83c87ac6babfb5f08649ed2b8cd02
SHA512dc797a06061937f8dd657a34d4373d3069c9c1a6752752516042e5d135fc41257c7a3a6738b3accd626a02f1887476197eca0ab28cf568daf57269cbe9c8eb41