Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 13:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe
-
Size
1.3MB
-
MD5
05dce435f788e5a0860ebc3a3110e613
-
SHA1
0490527b9bcf76f930e1be380b73cb24a8a58064
-
SHA256
612e6d4c2df672a77f8980885d47be99548db9cb2c1dccc46eb9837a79ff588f
-
SHA512
fe4b6100b2cc1cee935563121804300d3c74c51c749cd6ff821893b4925d0de07ec88e1279056a63bb54c49b65628a3ed881dc87a6ec183bcb140cf3f80ec7ba
-
SSDEEP
24576:IQh2wV0DAhhkpT8fwOBszhy6Retsuk4ZJjXOtsD2fV0hJ654CYB6oP1ze8:tow0D4KVrOeyuehHjXUJfcJ8boP1ze8
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000500000001a4bf-631.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2024 Install.exe 3052 YPY.exe -
Loads dropped DLL 7 IoCs
pid Process 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe 2024 Install.exe 2024 Install.exe 3052 YPY.exe 3052 YPY.exe 3052 YPY.exe 3052 YPY.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\YPY Start = "C:\\Windows\\SysWOW64\\SNGQCK\\YPY.exe" YPY.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SNGQCK\ YPY.exe File created C:\Windows\SysWOW64\SNGQCK\YPY.004 Install.exe File created C:\Windows\SysWOW64\SNGQCK\YPY.001 Install.exe File created C:\Windows\SysWOW64\SNGQCK\YPY.002 Install.exe File created C:\Windows\SysWOW64\SNGQCK\AKV.exe Install.exe File created C:\Windows\SysWOW64\SNGQCK\YPY.exe Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YPY.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: 33 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe Token: SeIncBasePriorityPrivilege 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe Token: 33 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe Token: SeIncBasePriorityPrivilege 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe Token: 33 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe Token: SeIncBasePriorityPrivilege 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe Token: 33 2024 Install.exe Token: SeIncBasePriorityPrivilege 2024 Install.exe Token: 33 3052 YPY.exe Token: SeIncBasePriorityPrivilege 3052 YPY.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3052 YPY.exe 3052 YPY.exe 3052 YPY.exe 3052 YPY.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2024 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe 30 PID 2744 wrote to memory of 2024 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe 30 PID 2744 wrote to memory of 2024 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe 30 PID 2744 wrote to memory of 2024 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe 30 PID 2744 wrote to memory of 2024 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe 30 PID 2744 wrote to memory of 2024 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe 30 PID 2744 wrote to memory of 2024 2744 JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe 30 PID 2024 wrote to memory of 3052 2024 Install.exe 31 PID 2024 wrote to memory of 3052 2024 Install.exe 31 PID 2024 wrote to memory of 3052 2024 Install.exe 31 PID 2024 wrote to memory of 3052 2024 Install.exe 31 PID 2024 wrote to memory of 3052 2024 Install.exe 31 PID 2024 wrote to memory of 3052 2024 Install.exe 31 PID 2024 wrote to memory of 3052 2024 Install.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_05dce435f788e5a0860ebc3a3110e613.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\sccaner\03.03.05.2011\2011.05.02T22.50\Virtual\STUBEXE\@APPDATALOCAL@\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\sccaner\03.03.05.2011\2011.05.02T22.50\Native\STUBEXE\@SYSTEM@\SNGQCK\YPY.exe"C:\Windows\system32\SNGQCK\YPY.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\sccaner\03.03.05.2011\2011.05.02T22.50\Native\STUBEXE\@SYSTEM@\SNGQCK\YPY.exe
Filesize17KB
MD5906e2cea7206e21a03d2e52417db1cd2
SHA1cb5a0b20a52c1a3fe754e48a16895d605336536f
SHA256fa9e1cbc98d12788506d00d5530cd6f5394414d6502e2cb7866d3c52edbf4094
SHA512aa468a373bb59feb8c3a2da5656c5dd5e23bc7219bbb8c5209e5bb1183a384f5e7133918b6da209018dadd11d0158f8f38b3b35315eb9a8e1f9fc5824bbce7ea
-
Filesize
448KB
MD5c49125a39e0ae69b1cc77040ba8a9441
SHA192941e9559d9b1a0a944595377b6c5d44b53a6a4
SHA256f7e3d70532b7a0b04bde2fc3a9439b8a95ba7b89eff5f214ef53041a58c97524
SHA512f61f42e500ebdd0559c420f05849265964e58aba7bb2be1095d41dddc1393ccf2191de0ed61d5fefd3957c4890c61fced1497481b76f158a12f7d95e626224c6
-
Filesize
43KB
MD5d977f26d7f7ffcb0f002813b55ff032d
SHA17e17b642dc1286908c18caba6fedb890de8fcc86
SHA2562ce6c66843f0d0f156ae523f25d2cf4c9886fcae7b4f69deefbde4bc5328bf29
SHA512e291f6acf5df88c52eb9232d55eb43fc08cbd423b7ae46148f710de909db49c04fc1d64e05b8e307ddd880134c525188109b94182ca99ea5934b66b9316e9e25
-
Filesize
664B
MD50a90db46135f35a468a6d21c9d5b9587
SHA14d5084b6af695868ebdfc997ffb9febe17379141
SHA25620d575d328db160bd5d01709d7e2e400378b615775857c39a8946cd617fb7d08
SHA512bb4670ec7d4a78e1021ae30202db957ef7ec9a7d6342795941be8df18a8fcff05de9363bbea78e5bca4f2d9c7bc456ad556d9dfc5b3ef16a2820307dcf6f4514
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\sccaner\03.03.05.2011\2011.05.02T22.50\Virtual\STUBEXE\@APPDATALOCAL@\Temp\Install.exe
Filesize17KB
MD521c6f371d1edc7437ee257c6918a6bff
SHA1a3b0a60b48dd370584681c369d1719e49235ea0c
SHA256d50f161aae22f367c9dc9ac590f88628e2c929e69828ab260ae9ade4ff3ee110
SHA512cf351e8d584585a5744c5e5826e67648a817f6cce8293a0c10dc62331f092eb78d189c32fd36ee01e6f1f92feea5370701c233c0fb508ccd301fb1689b81b8cf
-
Filesize
61KB
MD529136121b1c0307a02a8826477995613
SHA14dffe908036a21be56a9caa739ec1bf1cf9bd0ca
SHA256f9dd403e696d2128cafe9a4bab54a28161745934df6d3479a066083a61515402
SHA5122c7077ff82e948b9a9b6b16214dfdd11e222f07fb0a75aec59a9dafc29906907f24e0c625cefd5032321cc7883c00fd0abc7801f185983190f353b6dff2774c7
-
Filesize
1.4MB
MD527a49221ba75a90934342bbe70f6c954
SHA1751e322d6f7e46c132f0f97c56d60344248f1959
SHA256946611f5091452aa46310d3ba8a885e808617b8ae9c57a468f7fe3abda4b052d
SHA5129476f49d2e3c10f3e5cd91313e03405f944bc9887fd65e6c2236caab3a42e2c9a5392d7c34f6c5787a7dc8c3cfd43a3a90a6e052176aa60a43da0327d7ff78d6