Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 14:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe
-
Size
584KB
-
MD5
b7dc72142d729772324a6c50491addf1
-
SHA1
b6afc2e9059082723ff577eab9e73e1127e6f586
-
SHA256
f389a3334af3364d1920b4cb7fe291141db441672c98c1ffb1ebff94bdce0a93
-
SHA512
63f3ac8bff6dba8cf97dd0785a343b7c6af6c044e5821108dd752655f950262c110a5b06c41ba565e4fb1d66c7b0846a5a1036c27c70653291bd9c9766522294
-
SSDEEP
12288:LEtCVqAH3JdNJ7HlrwfkHopxFgtnCPyuvmPG0bagWhatcREy1kQ:CCwYJdrHl90eZCLmPG0bqhlREy1k
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016de8-20.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2396 Install.exe 2300 TWXO.exe -
Loads dropped DLL 9 IoCs
pid Process 2396 Install.exe 2396 Install.exe 2396 Install.exe 2396 Install.exe 2396 Install.exe 2300 TWXO.exe 2300 TWXO.exe 2300 TWXO.exe 2300 TWXO.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TWXO Agent = "C:\\Windows\\SysWOW64\\28463\\TWXO.exe" TWXO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463 TWXO.exe File created C:\Windows\SysWOW64\28463\TWXO.001 Install.exe File created C:\Windows\SysWOW64\28463\TWXO.006 Install.exe File created C:\Windows\SysWOW64\28463\TWXO.007 Install.exe File created C:\Windows\SysWOW64\28463\TWXO.exe Install.exe File created C:\Windows\SysWOW64\28463\key.bin Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TWXO.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E} TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0 TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\0 TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\HELPDIR\ TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\VersionIndependentProgID\ = "MSVidCtl.MSVidStreamBufferV2Source" TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\ProgID\ TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\Programmable\ TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\FLAGS TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\Version\ TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\0\win32 TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\0\win32\ TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\FLAGS\ TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\Version TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\Implemented Categories TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\InprocServer32 TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\TypeLib TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\InprocServer32\ = "C:\\Windows\\SysWOW64\\MSVidCtl.dll" TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\ TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\121" TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\VersionIndependentProgID TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\VersionIndependentProgID\ TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD} TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\ProgID TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\TypeLib\ TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\Version\ = "1.0" TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\ = "Exewesa Vebiw Object" TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\InprocServer32\ TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\ProgID\ = "MSVidCtl.MSVidStreamBufferV2Source.1" TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\Programmable TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\FLAGS\ = "0" TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\TypeLib\ = "{31264849-AAFA-F605-917C-40BEF869358E}" TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B006A9A-58E9-4B49-B5B9-2DEDFA92A7AD}\Implemented Categories\ TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\ TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\ = "GrooveDiscussionToolDataDelegate" TWXO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\0\ TWXO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31264849-AAFA-F605-917C-40BEF869358E}\1.0\HELPDIR TWXO.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2300 TWXO.exe Token: SeIncBasePriorityPrivilege 2300 TWXO.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2300 TWXO.exe 2300 TWXO.exe 2300 TWXO.exe 2300 TWXO.exe 2300 TWXO.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2396 2984 JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe 30 PID 2984 wrote to memory of 2396 2984 JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe 30 PID 2984 wrote to memory of 2396 2984 JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe 30 PID 2984 wrote to memory of 2396 2984 JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe 30 PID 2984 wrote to memory of 2396 2984 JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe 30 PID 2984 wrote to memory of 2396 2984 JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe 30 PID 2984 wrote to memory of 2396 2984 JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe 30 PID 2396 wrote to memory of 2300 2396 Install.exe 31 PID 2396 wrote to memory of 2300 2396 Install.exe 31 PID 2396 wrote to memory of 2300 2396 Install.exe 31 PID 2396 wrote to memory of 2300 2396 Install.exe 31 PID 2396 wrote to memory of 2300 2396 Install.exe 31 PID 2396 wrote to memory of 2300 2396 Install.exe 31 PID 2396 wrote to memory of 2300 2396 Install.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7dc72142d729772324a6c50491addf1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\28463\TWXO.exe"C:\Windows\system32\28463\TWXO.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566KB
MD52af18dd44920a6bebed2f548f1755135
SHA162eeffb45206364a72455c2db154fba1dd34460b
SHA256b671f8776d85823476a65a869caaa9975a1af609c59283b600f2a2e6609b7f75
SHA5121400fca61ea7f68e7ac59cbd3df8eeba0541ad4be59930e9369287b171eeec98b3b68530b023be8206123d7b1eaf9432ec49b9202e157c9a016b1f1490fddeaf
-
Filesize
398B
MD579d3e3a5a68e57e744b6220beac437f2
SHA150ec0616a38a939b3240ea282cf0b3590c345fc3
SHA25643497b111caa6e97ca7a082b59c70e474f7fe5bb61097e278a5019e059e4cc97
SHA512d4ccd613ab68f32ae8455076cf54606a1de91215d31d36ab6b974055790c32444ce27152330e045232a3515922b7758711e0bd22867b2839d4bb5042e87e4184
-
Filesize
8KB
MD55153b016d36928c296131c5c8e669446
SHA1c444f61a2dc49ede6a2325f26d76af66de5989d2
SHA2564c52ec0d5d4cad21ed134af76f64c3cb44b826594641f44487e4625f5bc96f59
SHA512c9084ff30f1f023b1f9cd00dc66cdbf846e95993093163c3e71a13535ccfc79d59be5b28a78ccfa6b0a82389b08b157676d71a9ccca2c170369080feac386f09
-
Filesize
5KB
MD580bbc7ace13d97396bd7b1abbaf4008b
SHA1d013c0def603915675b1e0ce5877d413cdaf6523
SHA25618dbfb27d4b10501e8426db1a78df8247f6570656d183f78b061d7db4c7865ae
SHA512bc7afd0e730f432852d374812827077574181928aa97c25d8170ce1b766677383360bf2bb21afc51e8168eb3f6539ce8499c4002d86190f27d4836da3f907919
-
Filesize
105B
MD527c90d4d9b049f4cd00f32ed1d2e5baf
SHA1338a3ea8f1e929d8916ece9b6e91e697eb562550
SHA256172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb
SHA512d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae
-
Filesize
4KB
MD5557e0039dc13a0453af7ca9373a0d301
SHA150efb19b1b1eddd10ddb4c2ff23d18cccba92dfe
SHA25654850e4c8644c042b15dab73a15135105ff84a240d26d1476c8b80d176a341fc
SHA512d96fdc89ddbcd8459966c9548d3243a0fa319f8be2f418b4e17f313fb3f86d32dd7f254a035641f35e35ed849832773c0d1fe34ff362761309c64e959c025a98
-
Filesize
648KB
MD55530832fa82582288ce640f73a4915a0
SHA1c40673ed59a61dd3b39f8ed6d0e1345838d98e44
SHA2566f7daff3caf7f24a00e08e4ed414b4d23e13d2cac4657ad7a071d9cbeb42cb88
SHA512ee2a2dc3c85a13b39f15a276f842afab8d341aacb457c1750b8bf0fa46b03a3bfabeff5be6439f3edf2c428d504ecabf07a399ebbdb09a75693309b55903775c