Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe
-
Size
1.1MB
-
MD5
77b92172dabe93765f41f8c87ce3b22a
-
SHA1
29414bc4808101da5c994572494b0b863dfcc0fc
-
SHA256
9fb314e4b4e7155a82556cf5102be301d750de3c0615ebe6c4958bc75e2f8f81
-
SHA512
3061211165f6811498184d8b139fd31af166f62c01caff700058f5370172ad67564339517ca191786cc5b30d6e7622bd0672605b793b13aa6b035b5e49f52ce2
-
SSDEEP
24576:gHvZTut444No7By3eK1SuNB4F8wIUp49vZ1JQnjVB4u4QWzK:oBTH4/7fK1g89v4jVZ4Dz
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00070000000190c6-6.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2480 KXU.exe -
Loads dropped DLL 2 IoCs
pid Process 2988 JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe 2480 KXU.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\KXU Start = "C:\\Windows\\SysWOW64\\YPJOWE\\KXU.exe" KXU.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\YPJOWE\ KXU.exe File created C:\Windows\SysWOW64\YPJOWE\KXU.004 JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe File created C:\Windows\SysWOW64\YPJOWE\KXU.001 JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe File created C:\Windows\SysWOW64\YPJOWE\KXU.002 JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe File created C:\Windows\SysWOW64\YPJOWE\AKV.exe JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe File created C:\Windows\SysWOW64\YPJOWE\KXU.exe JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KXU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2480 KXU.exe Token: SeIncBasePriorityPrivilege 2480 KXU.exe Token: SeIncBasePriorityPrivilege 2480 KXU.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2480 KXU.exe 2480 KXU.exe 2480 KXU.exe 2480 KXU.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2480 2988 JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe 30 PID 2988 wrote to memory of 2480 2988 JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe 30 PID 2988 wrote to memory of 2480 2988 JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe 30 PID 2988 wrote to memory of 2480 2988 JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe 30 PID 2480 wrote to memory of 2572 2480 KXU.exe 32 PID 2480 wrote to memory of 2572 2480 KXU.exe 32 PID 2480 wrote to memory of 2572 2480 KXU.exe 32 PID 2480 wrote to memory of 2572 2480 KXU.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\YPJOWE\KXU.exe"C:\Windows\system32\YPJOWE\KXU.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\YPJOWE\KXU.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD5f6135f1f5ade7c3d98846fa547ec9ba7
SHA120decec41ddffba52e3e1723b9470e3e07f842f3
SHA25632fd7962c319d55f6393eea1d8776ee7093c702ab020adee140c660ffe031c97
SHA51289ff4488ebf92f03e21581c198a6d8ba505d24fd84b80861cd56f4fa5537d42207a381b9a9f82fae8ba55a48798a497d90d8c77b5657073faa6843671f895213
-
Filesize
61KB
MD5ae4f3b79ee0f6d870b899b9bd581823a
SHA1b265f7280d80426f3388e7a72b5aa24ce70bdb18
SHA256cd4f22eaa8324ed0d312a6eada7326c468222b3f6c13d31d001731c9fb5c1350
SHA51255c71d7544c9d4cfd00edbc4b509d1c798d6d8d7f5943d389bfd47535d72f131191b479e3853ababc0a21589d7807e051ebe011f788dbaf9ccae2109c885be35
-
Filesize
43KB
MD576b87d21121078dfba09e62fd15e447b
SHA13907c708c6fdf441ed18f5985a278d38d2052fae
SHA25686cf96ce72cf3261cad31e7089702f1a449c07f6a00c470c86cfc895da48a903
SHA51240637e5eb23871273b294d0af58217ce48f1507b004a4db9f644bd778d18d61c216cbdc0eaaf28b6e6e80461a9441cfa8a5c507f711750a9d29bf37be44ac5b1
-
Filesize
1KB
MD5a9acb130ff21f2e2fdb4e8d273221176
SHA154a63edb73ff814cc1b0d929a2a683947efe4aa2
SHA256ab803a7e0ebabfaa985ecd70277f5a2525f538a8584fbaa7348ecb07ed3ef39a
SHA512ed7ceb205373e91c1cf4041c82136b0ac2a94a0ea996c258ace36809f7487d2404168d22503db511e3e82943d59c7622a35de45c52b314475df271fc883abd77
-
Filesize
1.5MB
MD5f378a6c579cbb851d72c6b2db3f58b7c
SHA1ccc48fb1fb5da39184f9609a7b0bbf8e51877861
SHA25630dca50b8f1c8d9cecb2630eaa652b8fc5d2be63431cc4e070fdec97dde2810e
SHA512978a4954f993133408338ce7af6aab60775688f1fad16a60e4c332edef13a9b3d587fd0884fd609d5d30dfefa308385d2349615c90f89152877db9bfc631f456