Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 21:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe
-
Size
140KB
-
MD5
a3e4d2bb2ba32428384839bb95328cb7
-
SHA1
d35db8eeae2da93ecc21ca0c63e5c1ee1336c51d
-
SHA256
ac52018b88643cdcf2e7f0bd07c3e4043454a6b5b665f7ab4144281dc2dd27d5
-
SHA512
72f32cd1939c7f259434d4a4e0f658babc4c097633281ec6e110e3560d51097b8f72b65c440673cbe3509dd1269e0facaeb45f868e0b1da33f95c51371a0b861
-
SSDEEP
3072:67uG39Vk4ML6h2F9CbcajLhVRNWgxqqgvepvCE5p+7m:zG3Hxhw0NhVRNWgxJgvGCE506
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016cd7-11.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2476 AKL.exe -
Loads dropped DLL 1 IoCs
pid Process 2064 JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\AKL.001 JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe File created C:\Windows\kh.dll JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe File created C:\Windows\il.dll JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe File created C:\Windows\AKL.exe JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AKL.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2476 AKL.exe 2476 AKL.exe 2476 AKL.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2476 2064 JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe 30 PID 2064 wrote to memory of 2476 2064 JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe 30 PID 2064 wrote to memory of 2476 2064 JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe 30 PID 2064 wrote to memory of 2476 2064 JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a3e4d2bb2ba32428384839bb95328cb7.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\AKL.exe"C:\Windows\AKL.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51de4e23cf8e0c17b68cfc6abfe978da1
SHA169422659a403b8c95aba14342cf92e278305007d
SHA2565f90882d1c69d4e3af1669b924b29998be4f09e001610ca997dfbc48568aba98
SHA512f81abe603f3060add27287cd7ad0e340e009892eb4b186481689275ee2d650435a096aa1e7d718296c0f55bceb667fe571cba440609bf78a66b775b6b265bac2
-
Filesize
268KB
MD52dd44c135c6917583c3a04998da08443
SHA1471143f45afaad9f8f4413e7490783a96364f9a5
SHA256ae2b2c267c4d5a5b73cddda8a65395c1db179bf6b7eefb7a3e51d2df2c6d947e
SHA5124ff49d290ca0a0b300b88b9d7d0568343ccca80990348c14806c2c44fc73a36e2080a5c6adf0de6cf3fae420b74549804fd86f7a79892ff6642cd3b5e9f62e20
-
Filesize
6KB
MD5d3be4406776845e91e661f8c0c5db9ef
SHA1c69c92054a010372db0c5ba02e80645a8afb186b
SHA256811008786b6dca68e508829167f6fb3aaa80e8ce3f8e100aa326d829b4c64bd7
SHA512044bb64633d7437e05f0d6caddba94755e48180c846ee2f5f80cd7a9dcd4afcc5842a2b43d01b483621941766f4f4bd7f9305855fa90052cc7d1f0672f896951
-
Filesize
4KB
MD59b3dcfb9ca7f01932d1bd32e3fab94c2
SHA1fd85f7e9fc7c5fecb64ab2e28ad94068e334fbe6
SHA256874520a6964f859b657edab5e2f9bec7267f4be7f638033ba61bdbc870688c7c
SHA512e63b04404704503856c4efc5738a75d0a05ea366b2c74af175a73fae5282458d8ec475cc15a18b3fe7b77437cd3d0f5a3ae2897f9e3ad763477ec5237c82872c
-
Filesize
4KB
MD547c8159c7c5f9f299c3aeb5995b69314
SHA1df4e3e2d881fdc378094438f359da2686428f84f
SHA256de08d6a12b245d0b6d811762526018b108ae0c92ce7a48a927a0d33783a225c5
SHA512b12d2e8ccb96be66983dd757beba0d5377441eca1b3370beb217339432991190cc4929f4c53e37a9b239ee6b974ccb92d71dc18896606a66d32f14b12e96e266