Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/03/2025, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe
-
Size
503KB
-
MD5
7d300f23ef4a1aff0f5c543e9f2d4c73
-
SHA1
cf5e01e9f2dc3b77d04352296e2d7870d5e8e2f9
-
SHA256
26ed26117314bfe364cdfd60727a4202a32a87a89869b80b3e11e4ed00b73cb0
-
SHA512
2c3c9769435cc137498cb7fdaea2d1fbb5274b6e271829640ef182f8231f2a5ea51a991d056b65ba8e87d3c5da2d5c45423409110fccf38b9dbe415d0d85f20b
-
SSDEEP
12288:WlQRUTV5nYr0x7CUPsyoNuEv9z4x3N7M88xmQ8Qv6rrfLMRwuit:YTV5nvMUCuEv9z4dOxmcSXLIS
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000015f2a-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2948 FWPI.exe -
Loads dropped DLL 5 IoCs
pid Process 2624 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe 2624 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe 2624 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe 2948 FWPI.exe 2948 FWPI.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FWPI Agent = "C:\\Windows\\SysWOW64\\28463\\FWPI.exe" FWPI.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463 FWPI.exe File created C:\Windows\SysWOW64\28463\FWPI.001 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe File created C:\Windows\SysWOW64\28463\FWPI.006 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe File created C:\Windows\SysWOW64\28463\FWPI.007 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe File created C:\Windows\SysWOW64\28463\FWPI.exe JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe File created C:\Windows\SysWOW64\28463\AKV.exe JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FWPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2948 FWPI.exe Token: SeIncBasePriorityPrivilege 2948 FWPI.exe Token: SeIncBasePriorityPrivilege 2948 FWPI.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2948 FWPI.exe 2948 FWPI.exe 2948 FWPI.exe 2948 FWPI.exe 2948 FWPI.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2948 2624 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe 30 PID 2624 wrote to memory of 2948 2624 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe 30 PID 2624 wrote to memory of 2948 2624 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe 30 PID 2624 wrote to memory of 2948 2624 JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe 30 PID 2948 wrote to memory of 3056 2948 FWPI.exe 32 PID 2948 wrote to memory of 3056 2948 FWPI.exe 32 PID 2948 wrote to memory of 3056 2948 FWPI.exe 32 PID 2948 wrote to memory of 3056 2948 FWPI.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7d300f23ef4a1aff0f5c543e9f2d4c73.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\28463\FWPI.exe"C:\Windows\system32\28463\FWPI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\FWPI.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD5b87e2e56dbf34fb12705317f4d361c12
SHA13b4a6c2fddaab9f71747437c60dc7ad85661b4fa
SHA2561ed5873542484a3f4c898de6684fc04bc0929e4fc795cd09b4b86f17e817d85a
SHA5129d1bf05a200efda561f3141d3a4c70a347ba2a64fbfb5fb9b432956660b4aabc492f93fa50ba1928a3c408ec048c357a50cb79d12ba6200b28b1aeb98dbc39a0
-
Filesize
412B
MD5f11a7e93f8fa3c25ba5bdc88560d49dc
SHA1ac2f8edfd59f3773c1be787e4742eb71c4a35257
SHA256f494dd09b16e9472642b07c86f4804eade5776a65be427d702f84145d7bff6e2
SHA512839848d20f2c2ea7f509a9fa7ad42023321c96e5b8a31b2e6a96207248b7ffd9023365b572dd6b4a0f81a82b51792992fd7c6d42f0d97bef4e7c5a83bee26d77
-
Filesize
8KB
MD5aae8ccee5d5eed5748d13f474123efea
SHA16da78da4de3b99a55fad00be2ec53a3ad3bd06ae
SHA25610c464d1675774e0282171555d59fb8975ed6c0e6a781182490f48e66823a5b8
SHA512d370e1ffeeb81b3f07b83a9cf1e3b44635fde7aa6ac999bccafece8091dbf96f0a78257bb0e03b3689dc47fb4e96ec7deac7848a43ddef62afc9b8cc665ee8bd
-
Filesize
5KB
MD540685d22d05d92462a2cfc1bba9a81b7
SHA1f0e19012d0ed000148898b1e1264736bed438da8
SHA256cdca1e5bc4c5129caa8eeddf637c820b6241c8790ce1a341e38e8324ae95afa0
SHA51221961d2dd118b45bde4cf00b4570712791a22769d05afb5b6c54355b0aaee9b7f7de00b357845349ef957807452365134d51e11181d2d45f98ed0cc9402de90b
-
Filesize
4KB
MD527092ec75c1839f36bfe900a38acc484
SHA1fe14b750a0ed653246c5f358891f8c1241913bb2
SHA256e6e29699840ae26c452227f9a1c9fd0e3cda0c2413c4255df9fc066c47af0e07
SHA512815477e8681e38dd3110171adbaf06738eb9d63839671a959a296ec1a1fb17d788682dde5e6a1f0bffa3b4deda4577292ffa37ce10b95ad14276ffcd0795ac0b
-
Filesize
473KB
MD5339ae4ce820cda75bbb363b2ed1c06fd
SHA162399c6102cc98ed66cbcd88a63ff870cf7b2100
SHA2561e4a463ac0d463cee1f52f9529474484157c85d671aea1ab5f4173df12de01b6
SHA5125da8b333a839c4b169c6f4c9a1929918f166a895af7818c8223df7ed22279aac3b6ef88f89ee083a4f475f82ec6078f8e9800a9afc9547712245d090636a284a