Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 10:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe
-
Size
291KB
-
MD5
03d93bafb2ae535989c49881f2f361cd
-
SHA1
fd450baf1b8f85002ec131dbc751a202ed4b21a5
-
SHA256
b9f7e35be38d618a7612fdca540a8a76eae5e73ea9d8d17c94e40fbbaf9e04d6
-
SHA512
0eedff9738ed815c12c2319406b8b65c1ed7843bf466110334357de425f44c0c956ba6c268ba59ca39162ae50949e2c2b2fb3c14ce1c4574daa4893a45c624f0
-
SSDEEP
6144:zrQ6N34L+7BUXxRTBBZdxPdY62ernqcSF54URZa9MVGVvxNOYIQ:zrQ+4La+XvdB3xPdYujqx5jZa+ovnOYJ
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0008000000016cd7-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2872 QIOU.exe -
Loads dropped DLL 5 IoCs
pid Process 2080 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe 2080 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe 2080 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe 2872 QIOU.exe 2872 QIOU.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QIOU Agent = "C:\\Windows\\SysWOW64\\Sys32\\QIOU.exe" QIOU.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\QIOU.001 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe File created C:\Windows\SysWOW64\Sys32\QIOU.006 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe File created C:\Windows\SysWOW64\Sys32\QIOU.007 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe File created C:\Windows\SysWOW64\Sys32\QIOU.exe JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe File opened for modification C:\Windows\SysWOW64\Sys32 QIOU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QIOU.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2872 QIOU.exe Token: SeIncBasePriorityPrivilege 2872 QIOU.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2872 QIOU.exe 2872 QIOU.exe 2872 QIOU.exe 2872 QIOU.exe 2872 QIOU.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2872 2080 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe 30 PID 2080 wrote to memory of 2872 2080 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe 30 PID 2080 wrote to memory of 2872 2080 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe 30 PID 2080 wrote to memory of 2872 2080 JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\Sys32\QIOU.exe"C:\Windows\system32\Sys32\QIOU.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
492B
MD5a41d887b866591fcb699c95abdf055a4
SHA195abca678fa91c9c312f27c330d938c89aef4312
SHA25658a991c248e9fe0532d2fe122fa5dec8ef31f5c5c2f1e043ef2ec30dde33ba56
SHA51289b7a913a3b8c66cb72b322a8bca05684952cdcefa3ca3fa4e038a64f7a92bade4ca265c1c5982a91429ce1584200d29f81e50eed8b85c1ddc4dc48c1c1856a4
-
Filesize
7KB
MD5a08026db7b86f2ba69f6317a4a66778b
SHA16afe5979a1ef3ee8b94b6ef4a6bf8a70d641bf62
SHA25690c1300aaa05d24a32f9d01824c611742a10c2bb3e0450504b62282ab658e2f5
SHA512059d6abdb37800f7673d116a0e9a4d2f3e8e7d955a402ef91ca97cf24f3c29121dc36c54599511ac0e04cd2b1467e30fb7b2563e42e2fe43e71560816902207e
-
Filesize
5KB
MD549e240cd2e8fe880e177e208aaf8feea
SHA154e9ee5a7523148542113ee654f00ea13d3ca3d7
SHA256f1b86ba7a2c3aa753966cc67bc5efb4e4badb670b6a0e56ffcfdcbbc379108fc
SHA512e92efd1d0ab3249d6c93b32af0885e22726421055bff36dcf64d307ef2f8aaf2dd06c221342bd5e2a1fadb5d61ac284cd39750cdf1134fd530ba9ff1744d965f
-
Filesize
4KB
MD52bbb6ffc878515a79478917c5af03a9c
SHA152532ea393f3a623c05b2cd72a205da41f152c29
SHA25623c8cc69783ab663e036fb0d15c01b3863ff898d5534fa1d02f16c291863f3a5
SHA512be8846674af43f20501e6fe59fbd369d7393e79970ab1a4fc7c516c491939f575c5e07a1cd284287e8663d1ca2f4e6663839a79f798a7453ecd30bb0fbdcc464
-
Filesize
477KB
MD5db4d88b22f173a37c34477abeea6a789
SHA111c42d2d445c01a408ad947d48927fe2b370aa8c
SHA256251cd62057ee822ad0139fddadd88945ef0951af715eea17ac5faa4b25e17a55
SHA51267501ecf3b474536c3ae0cf68d49672b108b3b509a229f2a8bd4126e2f67228c93e2bbb78379de7dac3bbff6f7495d1d1aeffebb3fa5f8c7a0e29eaac4bce23e