Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 09:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe
-
Size
482KB
-
MD5
0c5a12e93af6e1594435f9b025833c63
-
SHA1
f76b1f498f820f5e56c79213045a74f11affd21e
-
SHA256
d9a935bb14b63e3da4db302d8daa2ceaa76a18fb55f16ad13ffe5e2cba8d4165
-
SHA512
55688a86ebf329bc16d57af95b09071965dc50529dbbd27f31a41057d1bf16a535857eb3dfe158d95871ba0e2c5a7f6c2b2f1cc9bfc12a8cfe4093ee66841863
-
SSDEEP
12288:FlheTArYwitbntPe68+gZykqbVjSiGIgTiOZMJjNSghm8ea:YuYwi5S+gZykewF2JjQgdea
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000019023-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2672 HVDR.exe -
Loads dropped DLL 5 IoCs
pid Process 2696 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 2696 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 2696 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 2672 HVDR.exe 2672 HVDR.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HVDR Agent = "C:\\Windows\\SysWOW64\\Sys32\\HVDR.exe" HVDR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\HVDR.001 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File created C:\Windows\SysWOW64\Sys32\HVDR.006 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File created C:\Windows\SysWOW64\Sys32\HVDR.007 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File created C:\Windows\SysWOW64\Sys32\HVDR.exe JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File created C:\Windows\SysWOW64\Sys32\AKV.exe JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File opened for modification C:\Windows\SysWOW64\Sys32 HVDR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HVDR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2672 HVDR.exe Token: SeIncBasePriorityPrivilege 2672 HVDR.exe Token: SeIncBasePriorityPrivilege 2672 HVDR.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2672 HVDR.exe 2672 HVDR.exe 2672 HVDR.exe 2672 HVDR.exe 2672 HVDR.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2672 2696 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 30 PID 2696 wrote to memory of 2672 2696 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 30 PID 2696 wrote to memory of 2672 2696 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 30 PID 2696 wrote to memory of 2672 2696 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 30 PID 2672 wrote to memory of 3012 2672 HVDR.exe 31 PID 2672 wrote to memory of 3012 2672 HVDR.exe 31 PID 2672 wrote to memory of 3012 2672 HVDR.exe 31 PID 2672 wrote to memory of 3012 2672 HVDR.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Sys32\HVDR.exe"C:\Windows\system32\Sys32\HVDR.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\Sys32\HVDR.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5433e840b522e28f86377e1df7cb80baf
SHA1c200505662ba78caae3c4a054c3ca7d62e97be93
SHA2569cb577e77dad05b03969fcf2118ed26fa6ad3bce1d9659fa0934b942c76581f0
SHA512c5dc790a5b40062481bc978c28fc3279236b60b9b907c6dd03fbd4bf52f9bebc3ab38bf0ac0de1f455a4db28639bedaececaad8e7f096f624d3916cf0f362ffc
-
Filesize
510B
MD5109add6e6be4ff769348a4d481fe3cce
SHA1a4b32ec890b7b38e51057d725ede1cda8ec50de1
SHA256aa915790d4d0401e7824d3ec3dfe535db424e8c991a91dd400ae8889f6319b10
SHA512ffa8f931205449e785916bcd3b1091de271d39479dd8fe6233142b4042369157f68be83adfc9d796846a8536e3616add9fb620a360d87cece31b818f513fbf2f
-
Filesize
7KB
MD527534bc0f73b5de819de58995aa1e622
SHA10ac11c296a1daef49f4672a668a20091563866c9
SHA2564c7dc5430b1dc5d402767578402dbc3d824c4ff4be4222b3c24036e45bb9eccd
SHA512f14f9e358507ad49607b22e6da96805178fd23cda5302479ea1c8ef2901bc9fecd02123da9ac9f2043764c9d1f5730c074777fd706e7fdc24b094b0bebf520c1
-
Filesize
5KB
MD5fe107515338fbde5e5307c4f76b96bb1
SHA1df6c1ad7f99bc25243c38fa602c308ccbd09ec85
SHA25626381a466fed113a110752d96640d5c8144a2e4d385b175a17a8f224e459214b
SHA5126adae86847423c72250b5bcdc993d3312ccd46fa0b08702990b352f7b188c55a0a067c0493b191582ac5520d360f3e7ef6788fa48cfcf4d191aa12209786fed6
-
Filesize
3KB
MD55a159e9341f65fc570232248b8cf51cb
SHA131905d6404692e9f31b58b15075348942612f375
SHA256399cf2fca877cfb6258f0b18db3526acefa3725619c4fa63b238fb5dbe390f66
SHA512a020905c4c15443f81f77f86db3e0ecca19c48dceb5b8608435054fcff56580a175c0f64a2eacc00e6c14c6537b5e07fd41a89e4602157d012fd6e056054d9bf
-
Filesize
475KB
MD5c9ae34faba6dc2ef692069a94baa6d83
SHA11d55c106f34258b8c8b7194bc8a5dbe4781fdd24
SHA25651ca7c0303f667b8cd35dce598c6a9ebc4ccd5da7e37150ad7c01a2cd1d05d0c
SHA5127dbce735aff17ae324ee54c9638995f22f778261d277affe5af763bde37d3918b575f1cb7a4b4323c8b2a6d49c2a918c980224e27136087d82d782ddc1b8ecbf