Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe
-
Size
448KB
-
MD5
7a65b260b401540b5c18606ce470daa2
-
SHA1
708fa40688033c63ddf067bf1882602303a794da
-
SHA256
22ec43703a0abfe2bba89ecd0f7a6f4d128aea3751226981339486897c3e4c4c
-
SHA512
1ae10601c1e95924f0275c6628a3698467eaac7eb79110d75cbbe7087092e0713f9c74154bd82f85e3b9ebff8e71df9a312ee2cdf657a0c72ddb664db6844af8
-
SSDEEP
6144:ARQvKY+tJ+ov44Ku9CiWUvkyqfzR0Obvow4rsC7TkZcjdQjhYGvyK/1Tt/Im7:tK+ov44t5VGzRXesOR0p1Tt/IU
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000019217-28.dat family_ardamax -
Executes dropped EXE 3 IoCs
pid Process 2420 Install.exe 2604 RSBots Auth Generator v4.3.exe 2848 MDLT.exe -
Loads dropped DLL 16 IoCs
pid Process 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 2420 Install.exe 2420 Install.exe 2420 Install.exe 2604 RSBots Auth Generator v4.3.exe 2604 RSBots Auth Generator v4.3.exe 2420 Install.exe 2420 Install.exe 2420 Install.exe 2848 MDLT.exe 2848 MDLT.exe 2848 MDLT.exe 2848 MDLT.exe 2848 MDLT.exe 2604 RSBots Auth Generator v4.3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MDLT Agent = "C:\\Windows\\SysWOW64\\28463\\MDLT.exe" MDLT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\MDLT.006 Install.exe File created C:\Windows\SysWOW64\28463\MDLT.007 Install.exe File created C:\Windows\SysWOW64\28463\MDLT.exe Install.exe File opened for modification C:\Windows\SysWOW64\28463 MDLT.exe File created C:\Windows\SysWOW64\28463\MDLT.001 Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RSBots Auth Generator v4.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDLT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2848 MDLT.exe Token: SeIncBasePriorityPrivilege 2848 MDLT.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 MDLT.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2848 MDLT.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2848 MDLT.exe 2848 MDLT.exe 2848 MDLT.exe 2848 MDLT.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2420 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 30 PID 1752 wrote to memory of 2420 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 30 PID 1752 wrote to memory of 2420 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 30 PID 1752 wrote to memory of 2420 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 30 PID 1752 wrote to memory of 2420 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 30 PID 1752 wrote to memory of 2420 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 30 PID 1752 wrote to memory of 2420 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 30 PID 1752 wrote to memory of 2604 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 31 PID 1752 wrote to memory of 2604 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 31 PID 1752 wrote to memory of 2604 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 31 PID 1752 wrote to memory of 2604 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 31 PID 1752 wrote to memory of 2604 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 31 PID 1752 wrote to memory of 2604 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 31 PID 1752 wrote to memory of 2604 1752 JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe 31 PID 2420 wrote to memory of 2848 2420 Install.exe 32 PID 2420 wrote to memory of 2848 2420 Install.exe 32 PID 2420 wrote to memory of 2848 2420 Install.exe 32 PID 2420 wrote to memory of 2848 2420 Install.exe 32 PID 2420 wrote to memory of 2848 2420 Install.exe 32 PID 2420 wrote to memory of 2848 2420 Install.exe 32 PID 2420 wrote to memory of 2848 2420 Install.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a65b260b401540b5c18606ce470daa2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\28463\MDLT.exe"C:\Windows\system32\28463\MDLT.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
-
C:\Users\Admin\AppData\Local\Temp\RSBots Auth Generator v4.3.exe"C:\Users\Admin\AppData\Local\Temp\RSBots Auth Generator v4.3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390B
MD5bda0ef4a8e8f59da96580d1815bde5c9
SHA1a645ff6a2b5bf5f46dd2d08b81175be49823c827
SHA256d4ab6045fe54dba34ed329024b83303a7c0e1063050521dc6432c57477e04c3b
SHA512137465104923e57e88f51925112a1beba7fdf85d82f89eabda5394ea690de46233c85058bd3ca6d9c1b355414b6b5adf826349c44d486374b8fd5368b8a9c42a
-
Filesize
8KB
MD5aae8ccee5d5eed5748d13f474123efea
SHA16da78da4de3b99a55fad00be2ec53a3ad3bd06ae
SHA25610c464d1675774e0282171555d59fb8975ed6c0e6a781182490f48e66823a5b8
SHA512d370e1ffeeb81b3f07b83a9cf1e3b44635fde7aa6ac999bccafece8091dbf96f0a78257bb0e03b3689dc47fb4e96ec7deac7848a43ddef62afc9b8cc665ee8bd
-
Filesize
5KB
MD540685d22d05d92462a2cfc1bba9a81b7
SHA1f0e19012d0ed000148898b1e1264736bed438da8
SHA256cdca1e5bc4c5129caa8eeddf637c820b6241c8790ce1a341e38e8324ae95afa0
SHA51221961d2dd118b45bde4cf00b4570712791a22769d05afb5b6c54355b0aaee9b7f7de00b357845349ef957807452365134d51e11181d2d45f98ed0cc9402de90b
-
Filesize
4KB
MD527092ec75c1839f36bfe900a38acc484
SHA1fe14b750a0ed653246c5f358891f8c1241913bb2
SHA256e6e29699840ae26c452227f9a1c9fd0e3cda0c2413c4255df9fc066c47af0e07
SHA512815477e8681e38dd3110171adbaf06738eb9d63839671a959a296ec1a1fb17d788682dde5e6a1f0bffa3b4deda4577292ffa37ce10b95ad14276ffcd0795ac0b
-
Filesize
271KB
MD5b590c4afc119ebd9ea00d78cd11cfd92
SHA175036da573ed02c809eb6eee473d117795760981
SHA256ee3013b1146a9fb41a9fac12e4863d48da2f66ace8f09b42d370aaf46f3c7d3c
SHA5123eea0e45bf7607a2b2a3f561124064db898118f4287ea8b95954e494ca4b12cb035fb38717f10c124222ae2aed771ef3766f55424356b5c1150d9bde882a3761
-
Filesize
103KB
MD502df8af30fe5d24e4b7ac48652ab98d6
SHA15a86da75b71502f5e0722f3e2e0216660351799f
SHA25620e266109a97590da668cd6d6f9299b4528f9694b0585c9d835480c8ec6e0168
SHA5124c0ac1c9e8e10e3621067810f8bf4a1d3ca8be030e90821a486a6a76ac5393b7ee1872c1281aaca551cefc7a12794f0902a90ed0028546b0693848baeb2c233d
-
Filesize
473KB
MD5339ae4ce820cda75bbb363b2ed1c06fd
SHA162399c6102cc98ed66cbcd88a63ff870cf7b2100
SHA2561e4a463ac0d463cee1f52f9529474484157c85d671aea1ab5f4173df12de01b6
SHA5125da8b333a839c4b169c6f4c9a1929918f166a895af7818c8223df7ed22279aac3b6ef88f89ee083a4f475f82ec6078f8e9800a9afc9547712245d090636a284a