Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 10:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe
-
Size
525KB
-
MD5
2059c65030633b3301b4b20f50e53204
-
SHA1
8968aa3cf84576bc9510a643592575f44fcf183a
-
SHA256
f40c7e82c800642a7c69b52f256afe2af65445848ff46a440fd1dd917760cc53
-
SHA512
8b4c0a8d461e5496276a903cc076536f4d2a32385d0cdbcb26f9ecb3074659a7c6ea00b9337da4afdba16fd27a63fdc78ae1c64788d463a46c9d2aa40300d9a1
-
SSDEEP
12288:VMtvBNNV4QsSE+lJnkOhcja2drTzdCbveXzaud+yslnQUhclp1QFROQuvCL6:GpBNa2luBXTzdCDyauUyslnQMGp0OQud
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000015f38-9.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2864 CIII.exe 2792 Nuke By Faca.exe -
Loads dropped DLL 5 IoCs
pid Process 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CIII Agent = "C:\\Windows\\SysWOW64\\28463\\CIII.exe" CIII.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\CIII.exe JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe File created C:\Windows\SysWOW64\28463\AKV.exe JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe File created C:\Windows\SysWOW64\28463\CIII.001 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe File created C:\Windows\SysWOW64\28463\CIII.006 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe File created C:\Windows\SysWOW64\28463\CIII.007 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CIII.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nuke By Faca.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2864 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 30 PID 1228 wrote to memory of 2864 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 30 PID 1228 wrote to memory of 2864 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 30 PID 1228 wrote to memory of 2864 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 30 PID 1228 wrote to memory of 2792 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 31 PID 1228 wrote to memory of 2792 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 31 PID 1228 wrote to memory of 2792 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 31 PID 1228 wrote to memory of 2792 1228 JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\28463\CIII.exe"C:\Windows\system32\28463\CIII.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\Nuke By Faca.exe"C:\Users\Admin\AppData\Local\Temp\Nuke By Faca.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD51f639ae71bad51bd172c23dbbe7429c0
SHA1dc506ab2b63ba13f47a9cff898f5f5f218579f5a
SHA256e3514b0b03e61fe8930718ecc2de28a449ff65f5cb3b0b1035c2f0f9f0b76cb2
SHA512a348120898877988dfc3c4fad22e7a4c40da2a8043ec4a466f85fd45da25c0305dd87a038a765f258fc346c8aab826ded33544ef75740d81caf89d34b9cedd14
-
Filesize
400B
MD57057d98c966f18a1b7ccbe555ba890ef
SHA1b481e97510f5b1602363d2b62f26a7b7ab94f668
SHA256251ba1fa7ebc0cf04944efdb8dc0a6251b3a2c9feec51f5d9f81623982d5c6d6
SHA5122ab34ae4bb29922c2ef7f197895e588f995dfb6444ff43c43ac1a9a8bc99f108899076b6ecec1ee7351e88403d6717d742d4d8b2d222d96c2fea870fc6fcb332
-
Filesize
7KB
MD515164d52b6e146554cebef1f0fd791bd
SHA148c56fc4c44f3842229fd29ef9ef9de7f28589be
SHA256c0af2c2cf134da9055fac5d7f7b3d76d481efd9ae205901869c161738b796def
SHA5120dae51d353beb0328a7a8a178ccedc92a6932702d4be3bd885cb3333735f9e6bf88617bf609490dd07e83e79ba5199e27ea4372c1997d862f861815f68cd0763
-
Filesize
5KB
MD50f16c6d06d7a4c7d033020e343808f93
SHA16b132d1c3b5cb177e1df2e46e25ef4e4f16b5a50
SHA256af580dff694d879ae7e7a48967879f1df411ca6f6a35fd770641c4d735b3f0f4
SHA51285dc481faf6f033e30303cdb2c1381bbb1089e835f47b3f643214b53aaefd12d46bf2e4355bd16433cd3987c2062326ba497c8277b2c180c9951d6dfe66e3fc1
-
Filesize
4KB
MD589e9c2aa0adebd97c03807e2522f298d
SHA1c64fec9e26dbd34769eb03aa4ccc09b56762c36b
SHA25604805f006a00755b7ba1a82ee85ceb137a7e1f08ebf1b406d257330a3ad24dbb
SHA5124bcf0a5d1c10fc2a9665a73745f9661559a9c476e970c55b5ab891b5173dcba3e985408a17c0f7aed3a7c38f18ab977769df3ce4249fb25ed30d860a4cc4c45f
-
Filesize
109KB
MD57d26e5a8b7563120207a0429a4672556
SHA16fca914b023d2533275acd3dbd18289a2dce7797
SHA256cd0d9da7bd0a4384a974b30b9b189c5c8be26056a69c90254074dd29d3a8ccc5
SHA51258bc64dd1f6733016e3a9ba8ad42136ab950f3bd3e665cb067eff766b04bf753595addc7ef4e68b29cc756b3da5a1733e54dc82f808a532bfcb8e7ae172ec2e7
-
Filesize
472KB
MD56bba92647895e6060cc561c1fc90332f
SHA14a7a8260c47c7e9080c63ace8984abedd0d7a60e
SHA2567063fdd12e083e24ebe80809fa14c4e3250ff306ad59f02dce9f892bacf8f84b
SHA512503b8b5cbdfaa42ea8e73aabe9a70643eb18cce4ae0b051751980e444220f391f5fd866ebb4703834bf05b6b78434a90099ee47b7da54d0a300e026295cb8c6d