General
-
Target
JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d
-
Size
599KB
-
Sample
250215-zkjzxatnfy
-
MD5
fc55485263d7bdc6e4a3adf3b83bde6d
-
SHA1
bf6180b84513aa6800fde62d514e64be77e21d7a
-
SHA256
d2b82aceb0fefc61e61988de6642e38e8a43794bc7eace500b543a30d2dbbc77
-
SHA512
c350ff934b018cdd0ff1962f9c518eba4a90f8159e397fe2c6724fcd0b0173d7573514842ef73b5ed34b1a1d521ad7c9ff4d2ff10c09bd135e021eff5af3d7c0
-
SSDEEP
12288:+demUOhFb8yUEbU1X8uclpixBspAOUdk/I+QRoP5O:zmUOhZ8ys1sucvSMUdYl4
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe
Resource
win10v2004-20250211-en
Malware Config
Targets
-
-
Target
JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d
-
Size
599KB
-
MD5
fc55485263d7bdc6e4a3adf3b83bde6d
-
SHA1
bf6180b84513aa6800fde62d514e64be77e21d7a
-
SHA256
d2b82aceb0fefc61e61988de6642e38e8a43794bc7eace500b543a30d2dbbc77
-
SHA512
c350ff934b018cdd0ff1962f9c518eba4a90f8159e397fe2c6724fcd0b0173d7573514842ef73b5ed34b1a1d521ad7c9ff4d2ff10c09bd135e021eff5af3d7c0
-
SSDEEP
12288:+demUOhFb8yUEbU1X8uclpixBspAOUdk/I+QRoP5O:zmUOhZ8ys1sucvSMUdYl4
-
Ardamax family
-
Ardamax main executable
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1