Analysis
-
max time kernel
67s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-02-2025 00:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe
-
Size
800KB
-
MD5
08b39db6c2a5199ae0efa34f5c731640
-
SHA1
5530b023c441b87830fdb26ac62f5c6967595888
-
SHA256
ca337b131437beaa4a076b55300b5539d3099346c91c01641f8154db09fc046c
-
SHA512
56005fc6c86e5c0bf9870e59bf4988e7cf41684d2bf949fd1983aaf79da3169887a014cbfcc401d1fb027049351719b9018056e06a1210126c743df4f468933c
-
SSDEEP
24576:WOXjVYkHUom27yO7MzIrfekb3fgMC4yTm9S:WiVjgrkbfQSo
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0009000000018b71-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 780 WMAT.exe -
Loads dropped DLL 4 IoCs
pid Process 2660 JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe 2660 JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe 780 WMAT.exe 780 WMAT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WMAT Agent = "C:\\Windows\\SysWOW64\\28463\\WMAT.exe" WMAT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\WMAT.001 JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe File created C:\Windows\SysWOW64\28463\WMAT.007 JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe File created C:\Windows\SysWOW64\28463\key.bin JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe File created C:\Windows\SysWOW64\28463\AKV.exe JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe File created C:\Windows\SysWOW64\28463\WMAT.009 WMAT.exe File created C:\Windows\SysWOW64\28463\WMAT.006 JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe File created C:\Windows\SysWOW64\28463\WMAT.exe JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe File opened for modification C:\Windows\SysWOW64\28463 WMAT.exe File opened for modification C:\Windows\SysWOW64\28463\WMAT.009 WMAT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\TypeLib WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\ = "Melohnez Iheboz Awohosa Object" WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\ WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0 WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\0\ WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\FLAGS WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\VersionIndependentProgID\ WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3} WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\0\win32 WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\41" WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\FLAGS\ WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\TypeLib\ WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\Version\ WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\InprocServer32\ WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\ProgID\ = "Office14.Authz.1" WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\Version WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83} WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\InprocServer32 WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\TypeLib\ = "{35C67284-27EC-98B6-361C-13079FFD8CA3}" WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\VersionIndependentProgID WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\ProgID\ WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\ WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\ProgID WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\VersionIndependentProgID\ = "Office14.Authz" WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\ = "GrooveProjectDashboardPendingItemDataDelegate" WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\0 WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\InprocServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\AUTHZAX.DLL" WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\0\win32\ WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\HELPDIR\ WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16F17241-DC61-42E6-47BD-DFB06E8A9C83}\Version\ = "1.0" WMAT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\FLAGS\ = "4" WMAT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{35C67284-27EC-98B6-361C-13079FFD8CA3}\1.0\HELPDIR WMAT.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 780 WMAT.exe Token: SeIncBasePriorityPrivilege 780 WMAT.exe Token: SeIncBasePriorityPrivilege 780 WMAT.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 780 WMAT.exe 780 WMAT.exe 780 WMAT.exe 780 WMAT.exe 780 WMAT.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2660 wrote to memory of 780 2660 JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe 29 PID 2660 wrote to memory of 780 2660 JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe 29 PID 2660 wrote to memory of 780 2660 JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe 29 PID 2660 wrote to memory of 780 2660 JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe 29 PID 780 wrote to memory of 1020 780 WMAT.exe 30 PID 780 wrote to memory of 1020 780 WMAT.exe 30 PID 780 wrote to memory of 1020 780 WMAT.exe 30 PID 780 wrote to memory of 1020 780 WMAT.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_08b39db6c2a5199ae0efa34f5c731640.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\28463\WMAT.exe"C:\Windows\system32\28463\WMAT.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\WMAT.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:1020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD5d2366486acd1a1e7512b0024ea3c7bdb
SHA1c9a4948a2902c899fbc8f51755a745b220f26265
SHA2567142651f09fa4a93574850904e21ac8c99dd4e4aff728e2ba68188a459f53461
SHA51250c77906a2175ab488198e2d240d6d8178a189369fc93ff5099e59e1114f8ac1b5496e639d128a60626403b2303a60c51d6f8abae886d90ec2eef03617eeabd5
-
Filesize
436B
MD5f213c2ef2616795e5ffb22aa1fd67377
SHA15e789f0fb782285214655bc88d9de3a8cfff7c29
SHA256b05f971e971d01fb5e0c6e21dbfb86f729477a51b136deab54a8ba23cfa449d0
SHA512f5bf1822700e61408c9420802b313279dfaf395c251bedc02cccf7e155bb2a26f3270618b56d724fe5e021f627cf2de3736be8df037442f4dc89ab12cfd02827
-
Filesize
8KB
MD531854a50b294dd312eb7fa9eb1c99537
SHA1e0b1682a001e15d0e0e1c1ca732cafb5c80b3160
SHA2562fe2d55aae2deef38a37c9679d74ecf05699d6919760794f69583b43b7fe308c
SHA5120482a4981ba242d4e931bd8b9eb5d606492cffb7609fb69fb349ed19c7a9e36a7e240e5ebe759505d253c5e72fb771612a76419c36fb035987a166569a5111c2
-
Filesize
5KB
MD5603451f504bedb28c3a7bae4c89abf24
SHA1cbfe12186b54663f60663c349739c7a49950c44e
SHA256e4d6577ea390274308877284b6d0cd6672aeb0e76c9c9847ac59c0964f050d13
SHA512136e28e288b3ce26b37c82b078a3440e3232c0f874d7d33e8e6fb6eadfd0024b9009448500c716523b81f142fa3bebf7d11f1dd3e8e6143867b06335eb5f9612
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
Filesize
4KB
MD5f1cf9fcbddeadabb738de497ffefdced
SHA17385a7c87e245da89cc5ef8f9295678c1566f25d
SHA256086083bc73b14286f9c3c29df8b8dc6f014d8b084267fbaeee0af56344d1f779
SHA5123a3b9d279b4c131ef3f358e0163f60ec9e60160a2cc45488adb915fea6642f3df5d35da2ccb6983d790401d237fbc808829f42c42ef958e7a0eac98fc33bb3f6
-
Filesize
648KB
MD5ce568bcaf7285124f764aff92f5079d4
SHA1886f698e2239cf615f12b503853a5fa28c53aefc
SHA25659d7d6de8a9e2d5535703d22c36888889530fd011d7f71cf034e93e36e7527af
SHA5129f6e3496930cb5dd9c9403acc865bc94f63f64af49a27ffeedbc9d9082d50bff4a7a772bb98d4a2719f0ecae144393de9cc273ba83ae00abe347b0be0d7c9866