Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 06:31
Behavioral task
behavioral1
Sample
JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe
-
Size
257KB
-
MD5
0b2b0c49d820052116fccc7a540bdcec
-
SHA1
3d1461dc310034d13a4c2ac10d891ec3d3f135ba
-
SHA256
ed159327250969403e30ab55de4f9404fc17ebe41219d30b68182f736f7b7dd9
-
SHA512
8bc19edfd1d1b3062655d90b05f8768ffd22abd81c8d8675e7cda0f50528a80e053f938a4e74c7f58a7fcc7cb5994f99852df4a27d3808532d24e5eccd52ff22
-
SSDEEP
6144:85hAEQQoVCEcjOt0zahIedMOSBBRJAZZz07rZ:oiQoVCRS0Red5SfoZGp
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000600000001932d-26.dat family_ardamax -
Executes dropped EXE 3 IoCs
pid Process 1740 superpi.exe 2720 rundll64.exe 2448 super_pi_mod.exe -
Loads dropped DLL 5 IoCs
pid Process 1440 JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe 1440 JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe 1740 superpi.exe 1740 superpi.exe 1740 superpi.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rundll64 = "C:\\Windows\\rundll64.exe" rundll64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1440-2-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1440-11-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1740-41-0x00000000028C0000-0x0000000002990000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundll64.001 superpi.exe File created C:\Windows\rundll64.006 superpi.exe File created C:\Windows\rundll64.007 superpi.exe File created C:\Windows\rundll64.exe superpi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language superpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language super_pi_mod.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2720 rundll64.exe Token: SeIncBasePriorityPrivilege 2720 rundll64.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2720 rundll64.exe 2720 rundll64.exe 2720 rundll64.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1740 1440 JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe 30 PID 1440 wrote to memory of 1740 1440 JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe 30 PID 1440 wrote to memory of 1740 1440 JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe 30 PID 1440 wrote to memory of 1740 1440 JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe 30 PID 1740 wrote to memory of 2720 1740 superpi.exe 31 PID 1740 wrote to memory of 2720 1740 superpi.exe 31 PID 1740 wrote to memory of 2720 1740 superpi.exe 31 PID 1740 wrote to memory of 2720 1740 superpi.exe 31 PID 1740 wrote to memory of 2448 1740 superpi.exe 32 PID 1740 wrote to memory of 2448 1740 superpi.exe 32 PID 1740 wrote to memory of 2448 1740 superpi.exe 32 PID 1740 wrote to memory of 2448 1740 superpi.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b2b0c49d820052116fccc7a540bdcec.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\superpi.exe"C:\Users\Admin\AppData\Local\Temp\superpi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\rundll64.exe"C:\Windows\rundll64.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\super_pi_mod.exe"C:\Users\Admin\AppData\Local\Temp\super_pi_mod.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5ca977a1cd46b170ddea7adc4e19bd6ba
SHA13de90a9a15b604a1ed0acd6b34d168b942db1ca4
SHA256c6bfdcb2de4612103a132c956006dc993232e291eb180e846695fc8937b69932
SHA5124e0bd62b3105dcf2814746692f6b7875fed64580909639e044fdfebf312f6df04d3543cd2cadbd7bd2c6b2057f076522992912443a718c012e2c4d7a5c2af0ac
-
Filesize
2KB
MD51d2bf93dd63f37b2c7e27d00f523aa57
SHA1bef7abed17d7b09119cc0fb218939316d32a8480
SHA256a9c555f7ffe56c3601a7c05d39bbc7449f040f0de17c1d33ea5cb949c6a7b7e5
SHA5122fb97441ac5b7557e68854167f1390f09358fea8aade8fc742498ef88571950ef44e239f96b7380c1347f41965869950ce39d28e7bf11ebf894b0bac52e92c95
-
Filesize
4KB
MD582dcd329190d327df8cc558ddb7bd796
SHA160692ef3d251e4be19445f3c37acaabd43e5153a
SHA25688930ac9efc89f62bf2d9c7d967956591fa1f3ee886cabe799c41d252647285d
SHA51276b094cf5baefe39d478445dcd5f3fbaa5ccca80abe9774c5aa9cf852cea5da37d052190968bb6f41cbd9cc6865a6b85492b4a606ac4607ac07c7f14be149d5a
-
Filesize
6KB
MD5d82e272edfbadabf6f82fc5018ce97fc
SHA188beb0c2463678910d4c726e1207ec08d7f3b00f
SHA256604434efc6c026f83708a5473aa993775649d69828315b8eafd33b58999292cd
SHA5128663a9900b4ab8912d1aeec930e0a088bb90a46a7c575f62a9f8f7d1dc4bdfec9ffffe9ea71f5d00125b3e113864cffdee4632352d17c36f73d8bc571733231d
-
Filesize
244KB
MD51cc2de0847d50813932844efcd3eac9c
SHA178799db1a7e289503fe4160d16c487fb8d45db74
SHA256d2b114a49c9941d0888d0e215f1e1b00949271877d247421c0fa85f8e7c3261b
SHA512b66cb6c931b1d541579f9c4f5ad3ee71b7ef884bf5ede2a77e8120356813f5aab8790cbced26671cc4ba77383196660ac51496a221d80ecb984ed2931c093c1c
-
Filesize
4KB
MD53a64783e94ab53902afd1ce21dc63379
SHA14933f4cdbd10630f0cf54952251e7d14c3ecd8ee
SHA256ebb2b9682502e81881c647e30575c75d202d6185c7b182003c0eea8717b26dbf
SHA5121178f0288b38b4509fca4fb1693671b2dbe4ca73cddc1679053f6680556c099691f2690c2298ea16285ad94ad8008ee1b5cebae25724d69b7dcb90ba67431e52
-
Filesize
191KB
MD5ce822a48d38f0c900b15ea2f862c6f51
SHA12e6fa79d559929d6168f8782cdb15b10f4216f74
SHA2567a55ae611adc4db25e9195e3d17277c3b5c5871260817045e856d9470ce925ad
SHA512a530ad1ed85569384b8b671e37796db98cc98fd758bb58131ef6f4943e19e001b75b6f2c37e0b35e98bf931160a075ad859f05d68cb191d03153924850558f26