Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 15:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe
-
Size
660KB
-
MD5
6da4f18dbb94bbe6c7472f2709a58df0
-
SHA1
4bb3ff58cea6e46bc5ac4f8d4d7a4faa61a18cb6
-
SHA256
8d4f6885f05bcea6497b46d3294ef57d180848a07e0bcb3e6153da4673345609
-
SHA512
5f20fb122b1aee03d3ed122981148ad8989a5bb111d45f2b32afe13f3d763cbfa9e9e074c0ef34db84c883921c893cfbc667d35f0db081a7207bb23c9f074272
-
SSDEEP
12288:ElOmIbyf7CkRWgssPXMdKiFzGqLY/CrhaQRqvLo4DI7/:mIbyf7CkRWgjPXMGqL4Ck8qDoEI7/
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0009000000018b62-25.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2732 XFUB.exe -
Loads dropped DLL 8 IoCs
pid Process 2140 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe 2140 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe 2140 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe 2732 XFUB.exe 2732 XFUB.exe 2716 DllHost.exe 2716 DllHost.exe 2140 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XFUB Agent = "C:\\Windows\\SysWOW64\\28463\\XFUB.exe" XFUB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\XFUB.007 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe File created C:\Windows\SysWOW64\28463\XFUB.exe JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe File created C:\Windows\SysWOW64\28463\AKV.exe JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe File opened for modification C:\Windows\SysWOW64\28463 XFUB.exe File created C:\Windows\SysWOW64\28463\XFUB.001 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe File created C:\Windows\SysWOW64\28463\XFUB.006 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XFUB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2732 XFUB.exe Token: SeIncBasePriorityPrivilege 2732 XFUB.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 DllHost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2732 XFUB.exe 2732 XFUB.exe 2732 XFUB.exe 2732 XFUB.exe 2732 XFUB.exe 2716 DllHost.exe 2716 DllHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2732 2140 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe 30 PID 2140 wrote to memory of 2732 2140 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe 30 PID 2140 wrote to memory of 2732 2140 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe 30 PID 2140 wrote to memory of 2732 2140 JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\28463\XFUB.exe"C:\Windows\system32\28463\XFUB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD567584bbdab8a381102833088723f038e
SHA12d3921aa7d1317f604fd4e411d627f6777b8e744
SHA256094f471301e3592ddef84a6398527f6a3fd08af90c85dfbef681a84b93332d9a
SHA512f106129381b761c163e4e8fb7e0cd67e98339874c50ea96669f08eb128d55d9eb42c12d96ebfb293982e6f2a94c350d6fb6da6e1d74ea98d06875212657908f6
-
Filesize
394KB
MD51ec252b02d7f9a8ecff2eaea41c7dea9
SHA1af71670b8e483d800216a3fab74e9306027a0669
SHA25699d086679a6296565ce4a96f3e9be5cc62ea368dd96137fa49d42b41a36ac998
SHA512f8f454d55263c3c74d190ce248338eb967dd5dbaa9e92e361e50fe4bf2cd53980f14975d5798c5574bc29a077529050b11fb5947f75c6d945f02eea6876d514e
-
Filesize
504B
MD5c9b8d94d545015f35ec9c9395c8645ff
SHA13c3aa57229bd1a56cc0729aacae02c58e1b67023
SHA256beee6ce85d5638fe0e8d1091a1a8ce34e44afb6eb3b420eceaf473fe982fa4b4
SHA512d83a3dc19b33600379db4bfc0cd350824e0a76a31fa88c4216a17ef3373aa206fe2e9d3152e1ca937df663ae6103b253f40f1fb28b1dd19595e481d8af46145e
-
Filesize
473KB
MD58692671171e5aab4afa159624aaea14b
SHA13307abb61038c38c2b9b56084b373456fa48fd5d
SHA25602296699dd94db3c4b6b34f6888905c23aa27c3fcaeebe3efe02b312dc7a9536
SHA512d270d0f254362659cd18f971c59a2fbc286f0eacfde99f906707c595013c38b662e238ed48729c28015ee8a30b3bb6f8bdf7a0ab20496ac2fe6f37315254ce97
-
Filesize
4KB
MD527092ec75c1839f36bfe900a38acc484
SHA1fe14b750a0ed653246c5f358891f8c1241913bb2
SHA256e6e29699840ae26c452227f9a1c9fd0e3cda0c2413c4255df9fc066c47af0e07
SHA512815477e8681e38dd3110171adbaf06738eb9d63839671a959a296ec1a1fb17d788682dde5e6a1f0bffa3b4deda4577292ffa37ce10b95ad14276ffcd0795ac0b
-
Filesize
8KB
MD5aae8ccee5d5eed5748d13f474123efea
SHA16da78da4de3b99a55fad00be2ec53a3ad3bd06ae
SHA25610c464d1675774e0282171555d59fb8975ed6c0e6a781182490f48e66823a5b8
SHA512d370e1ffeeb81b3f07b83a9cf1e3b44635fde7aa6ac999bccafece8091dbf96f0a78257bb0e03b3689dc47fb4e96ec7deac7848a43ddef62afc9b8cc665ee8bd
-
Filesize
5KB
MD540685d22d05d92462a2cfc1bba9a81b7
SHA1f0e19012d0ed000148898b1e1264736bed438da8
SHA256cdca1e5bc4c5129caa8eeddf637c820b6241c8790ce1a341e38e8324ae95afa0
SHA51221961d2dd118b45bde4cf00b4570712791a22769d05afb5b6c54355b0aaee9b7f7de00b357845349ef957807452365134d51e11181d2d45f98ed0cc9402de90b