Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-02-2025 09:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe
-
Size
277KB
-
MD5
f67c64be8bb93db370723315f4ac0a1f
-
SHA1
6d8dd3d3066841c5d339c92ed5954aa1a682b448
-
SHA256
dd7cd42fc5c87a3a4f218aad6bd571167aa8d10108f636ec0b4d835f80ccb7b9
-
SHA512
98e5e7ab18c9fdf80bbc540d1dc0d65970053255e72837533e90c0c7b34eafd677a6f78dd793484b11edcc58354caa0f4f110b430cbf98812a7219ee6bcc7531
-
SSDEEP
6144:lYQW71WfrbnGYV5HBUk2YvMbxKWPsHSpN8eiSBBmKRAkDc1Pps:lA71IrbGYVhB4Yv+KWrG1T1Bs
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00070000000162f6-9.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2776 CKM.exe 2768 gerador.exe -
Loads dropped DLL 7 IoCs
pid Process 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 2776 CKM.exe 2776 CKM.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\CKM.001 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe File created C:\Windows\SysWOW64\CKM.006 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe File created C:\Windows\SysWOW64\CKM.007 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe File created C:\Windows\SysWOW64\CKM.exe JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 CKM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CKM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gerador.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2776 CKM.exe Token: SeIncBasePriorityPrivilege 2776 CKM.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2776 CKM.exe 2776 CKM.exe 2776 CKM.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2776 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 30 PID 3028 wrote to memory of 2776 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 30 PID 3028 wrote to memory of 2776 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 30 PID 3028 wrote to memory of 2776 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 30 PID 3028 wrote to memory of 2768 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 31 PID 3028 wrote to memory of 2768 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 31 PID 3028 wrote to memory of 2768 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 31 PID 3028 wrote to memory of 2768 3028 JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe 31 PID 2768 wrote to memory of 2596 2768 gerador.exe 33 PID 2768 wrote to memory of 2596 2768 gerador.exe 33 PID 2768 wrote to memory of 2596 2768 gerador.exe 33 PID 2768 wrote to memory of 2596 2768 gerador.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\CKM.exe"C:\Windows\system32\CKM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\gerador.exe"C:\Users\Admin\AppData\Local\Temp\gerador.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c PAUSE3⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
465KB
MD5a122e22f41c8c1085689c681b60236fa
SHA174e3014b096096a410ae7959820e5d6e454c8886
SHA256711f68e1abb0d104139ab76ed8bc585c8dfe48748affd846f2d966d6e28c1f93
SHA5127012ac4981206c684b24d94a9efe067ec13e47901992ec683e7822ec419617aa70d4ebfb705c7b49cbbb3e9d1cd4732c779b2017e37fbdf78151b30bef1ef03d
-
Filesize
1KB
MD5e6708c4f916c110f33197f1972263a8a
SHA13a27fa93856fd6348aeb1aa19f1968404534bc79
SHA2569fd8742ab2130bef54ffffce201b190f782a5a7fd4559e651db3c6fa4d5d97a7
SHA5129fcb14ccde9f9016a08fe10097083adaf45aec4b5e44debdbd91785b345e4c571a6ef2d0f792277df4facdc535c241b53ecf0b466f6a32260bd85678026a5298
-
Filesize
4KB
MD582dcd329190d327df8cc558ddb7bd796
SHA160692ef3d251e4be19445f3c37acaabd43e5153a
SHA25688930ac9efc89f62bf2d9c7d967956591fa1f3ee886cabe799c41d252647285d
SHA51276b094cf5baefe39d478445dcd5f3fbaa5ccca80abe9774c5aa9cf852cea5da37d052190968bb6f41cbd9cc6865a6b85492b4a606ac4607ac07c7f14be149d5a
-
Filesize
6KB
MD5d82e272edfbadabf6f82fc5018ce97fc
SHA188beb0c2463678910d4c726e1207ec08d7f3b00f
SHA256604434efc6c026f83708a5473aa993775649d69828315b8eafd33b58999292cd
SHA5128663a9900b4ab8912d1aeec930e0a088bb90a46a7c575f62a9f8f7d1dc4bdfec9ffffe9ea71f5d00125b3e113864cffdee4632352d17c36f73d8bc571733231d
-
Filesize
4KB
MD53a64783e94ab53902afd1ce21dc63379
SHA14933f4cdbd10630f0cf54952251e7d14c3ecd8ee
SHA256ebb2b9682502e81881c647e30575c75d202d6185c7b182003c0eea8717b26dbf
SHA5121178f0288b38b4509fca4fb1693671b2dbe4ca73cddc1679053f6680556c099691f2690c2298ea16285ad94ad8008ee1b5cebae25724d69b7dcb90ba67431e52
-
Filesize
244KB
MD51cc2de0847d50813932844efcd3eac9c
SHA178799db1a7e289503fe4160d16c487fb8d45db74
SHA256d2b114a49c9941d0888d0e215f1e1b00949271877d247421c0fa85f8e7c3261b
SHA512b66cb6c931b1d541579f9c4f5ad3ee71b7ef884bf5ede2a77e8120356813f5aab8790cbced26671cc4ba77383196660ac51496a221d80ecb984ed2931c093c1c