Analysis
-
max time kernel
66s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 22:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe
-
Size
459KB
-
MD5
8196260df13d0836acf9f156bdbbd301
-
SHA1
6cb3531f12477e491bfc143a572c63d360dae555
-
SHA256
e5428a80bdf896e482d0bf49f58b79c7b4a5d62c011dd7e86ba80c07df6dea32
-
SHA512
4fb6fbb63e187a8986eee92adb60c8bf842f770acd3af3557111113a564e72f9bab7ac13ad4a2316715e7960ac17e9254fe3c4f1801079c4f280c35de1b39535
-
SSDEEP
12288:X9TU4wk/uFP25o7D/qEyDXhtKV6igjSvL0wG:hU4wQuFP1/bojSvS
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0002000000018334-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2652 QKJE.exe -
Loads dropped DLL 7 IoCs
pid Process 816 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe 816 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe 816 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe 2652 QKJE.exe 2652 QKJE.exe 2932 DllHost.exe 2932 DllHost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Sys QKJE.exe File created C:\Windows\SysWOW64\Sys\QKJE.001 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe File created C:\Windows\SysWOW64\Sys\QKJE.006 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe File created C:\Windows\SysWOW64\Sys\QKJE.007 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe File created C:\Windows\SysWOW64\Sys\QKJE.exe JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QKJE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2652 QKJE.exe Token: SeIncBasePriorityPrivilege 2652 QKJE.exe Token: SeIncBasePriorityPrivilege 2652 QKJE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 QKJE.exe 2652 QKJE.exe 2652 QKJE.exe 2652 QKJE.exe 2932 DllHost.exe 2932 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 816 wrote to memory of 2652 816 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe 30 PID 816 wrote to memory of 2652 816 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe 30 PID 816 wrote to memory of 2652 816 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe 30 PID 816 wrote to memory of 2652 816 JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe 30 PID 2652 wrote to memory of 2044 2652 QKJE.exe 32 PID 2652 wrote to memory of 2044 2652 QKJE.exe 32 PID 2652 wrote to memory of 2044 2652 QKJE.exe 32 PID 2652 wrote to memory of 2044 2652 QKJE.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8196260df13d0836acf9f156bdbbd301.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\Sys\QKJE.exe"C:\Windows\system32\Sys\QKJE.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\Sys\QKJE.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5dee7fbbe3a163996b623428f2947f3f9
SHA15734419a3f2c2744c7ac436c63fc08b9d12bb3b5
SHA256f3c2b9066420773829da704b66049b9055b1fb83161002e38142685e3990a153
SHA512c9a13f610d62bafeb89306095179bbae767e594dc5657914632afbc813d07e947cfee8e0c462a24c82983df08d0df680081b7244793416a1b63c28eca81ae023
-
Filesize
3KB
MD536be37cc14c19a55a6a51ff99547c6d9
SHA1b5c329ab95f2641e8bbcbd6376f1b3d23a2d6371
SHA256d0d581dda42f33bb593f284a857ba0bb1f3bdb01950d8a581690e248a6e2d212
SHA512f05933ec2b846f5452c25008119d36bd16b6bccd04da3e67734d2be306c8c299f8c8ac0af273a576439486ed019076bacc14863c6e5b1bf6a8255287d5e789a9
-
Filesize
5KB
MD52a970556e12272cb5120c41a01263e92
SHA13d1bbf48042a8752c22a1dd5d2aed1f0b324fecf
SHA2568c0888fdce2b7978411fadd409c501a8cc16fe4d03534ec2ba3e98688150f558
SHA5125beb75ffaa1e5008d554804bdee8c2389925eb1272f90a953247e0f03d110bd94894fa03082544b47f0cf7873b23fe76f53954a7bbc63f912151c24978cf0062
-
Filesize
4KB
MD504c70d6df53b4321e0a56e5d86d9a1b1
SHA18ec16da633caa3ea80b702faf5f5882b63c28e7c
SHA25663d77f8aae9c3ebb251e090c65bbf0e3d4578198eeeef31e47c9d369390e3819
SHA5125ad50712679630861bc0ae34d84047785f22d3b068a5fa305e34735c328e8ae8f85b9f179c80fa2f8d3a3792246e26768ec33b52c4211d0104cc86f724b2fb91
-
Filesize
4KB
MD5b9c56fc56da3f3e10a842f6e78fe674d
SHA14bd97b320edf4a6498066800510cfc5bf845eb1c
SHA256925326f170d367540ccfd434c7906ef840ca20083470b14b0a2333a772dc095c
SHA512beb59ef6bff8a73863bcbd4438138b0d02e4ee2efdbb14932b3cb3272ed23413dce5b0447ddb8e85bac83c850579355eeeed2b75e6a45e24185400b046da9bb7
-
Filesize
495KB
MD54d39b155617483976d10154a8f3f2b13
SHA1a7f729fae62207eec31f1be0d50ddd03b4721841
SHA2567c9feea8815ba1556e30704109512cfa793f1e3951195130eaf9abab8ef2613b
SHA51223a52be53514c80ba845d45410cf4ec41008c2b1079d7aa8fb33eb579ec42b4614d0fa976eff8ab3950fd69b3fbe9e02f156b4ff4fa219d64b3f45058b71ccbb