Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 22:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe
-
Size
2.0MB
-
MD5
68b82480f42d95aff0d4e83dc2413ab1
-
SHA1
6f06f5f94b25cf7a17f7009ffa2a9f51c6b7d5ee
-
SHA256
4c0f4cde7981ab905300efcd647adffcc46d682468cae06fcf46b7a791d6b3d6
-
SHA512
2598d8bf2518167b875782f4da949a58d2a52f4575c3b2c43844c9594babd068063c2b2ff1f6ab479750c2f970481b1dbd73b0549a46085af52f5c924f5c1a1d
-
SSDEEP
49152:rUC7YTgYsd3g7lWZ9Q1MWHt5YxmAFuWKJz+jaX:r33rmlrE2b
Malware Config
Signatures
-
Ardamax family
-
Executes dropped EXE 1 IoCs
pid Process 2884 LGY.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe 2884 LGY.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LGY Start = "C:\\ProgramData\\KJOSFC\\LGY.exe" LGY.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LGY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2884 LGY.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2884 LGY.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2884 LGY.exe 2884 LGY.exe 2884 LGY.exe 2884 LGY.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2884 3024 JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe 31 PID 3024 wrote to memory of 2884 3024 JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe 31 PID 3024 wrote to memory of 2884 3024 JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe 31 PID 3024 wrote to memory of 2884 3024 JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe 31 PID 2884 wrote to memory of 2980 2884 LGY.exe 32 PID 2884 wrote to memory of 2980 2884 LGY.exe 32 PID 2884 wrote to memory of 2980 2884 LGY.exe 32 PID 2884 wrote to memory of 2980 2884 LGY.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68b82480f42d95aff0d4e83dc2413ab1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\ProgramData\KJOSFC\LGY.exe"C:\ProgramData\KJOSFC\LGY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\PROGRA~3\KJOSFC\LGY.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59f60b617a2a459b8e8145a21ebdcf08a
SHA171452e002b9605029dce25605867f14b71c0015e
SHA2562df4e15612f2986ea1f511abd468d6e4d906bd8f369a7779d2506009d52d8841
SHA5123e8c63675f80f83885159b1218ee2ba4cacc293fa474a3b68283c5ce3691b5b77a27992009b99b644686b3a4daa8bb8679a7c58075e53a550a08936472650969
-
Filesize
80KB
MD5c5b79d794cfea3adfd1307e882668885
SHA1b86e92f61616251ed70b0319225ec9b1d29050c4
SHA256514c161c625713fb800e7920f7efc4d55a1167a16885fa3aa3ae2e4ae25a20c6
SHA512ed12e55c1e26cd44e5273e00c739df9ffc5f378f048809796e2e4a3fd144dd033e4f5ab4317b5066db582dddf5da9d27d036749a738fcc5cf4873535055427a6
-
Filesize
56KB
MD585942669a5484566b5e8a54873fc2138
SHA196f180b4d8b1dc922984329fd99ee03dc3c14d86
SHA256e4aa7ad0fccf26671d74e0cba04c135be2ac5a470b7e4d1d5aa62980f19f49ac
SHA5123b9de5be16ad6ecafcc3d07c432a06b68bd0bd9e3926ad496d7589fe2e415daf812bf378d8d5187beb7417ea8e6d41b4c75964d8d5a55ee19fee48d1d4db10cc
-
Filesize
2.3MB
MD529ca8cd6b4da6f0c729cf0a0edb52c9f
SHA10a509edd7a68eee2f32fbf62708731edf4c6d551
SHA256fa7d72437dbf948ae462b7126747f52144c6613d889a930b180362b009470393
SHA512521aad2ef65a52b002bd4a855a6c696e070549b0f450775b99647f7f681b669080e5e321bfde530bc7ca6a0f95452b6585fa0ba5161bf9a0b07a40336660a582