Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/03/2025, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe
-
Size
846KB
-
MD5
7e7b955a0ac5591aacb492a6a0339967
-
SHA1
6696fcd1755d312df08322ec573b2e58ed24b564
-
SHA256
d0ec6a99028b91e7b9ad774d2f3d3db698b1e527ea8386960ed29abf8cb3e8cf
-
SHA512
e0c4f7e1d67be201994960385466c790fc3489f71ade782975e5bbaa80d042cac915b9ec7b093cffda318efd8483d37c887f6d6103e4ace81d6c129681f95dfb
-
SSDEEP
24576:DbPTUO2Tjtaa4SoGifmHlPdHr3eUJFoTWM3zsH:D7TUTTxitff2PdHr3Pys
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0006000000018742-5.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2908 FPB.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe 2908 FPB.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FPB Start = "C:\\Windows\\SysWOW64\\JHRXXY\\FPB.exe" FPB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\JHRXXY\FPB.004 JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe File created C:\Windows\SysWOW64\JHRXXY\FPB.001 JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe File created C:\Windows\SysWOW64\JHRXXY\FPB.002 JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe File created C:\Windows\SysWOW64\JHRXXY\FPB.exe JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe File opened for modification C:\Windows\SysWOW64\JHRXXY\ FPB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FPB.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2908 FPB.exe Token: SeIncBasePriorityPrivilege 2908 FPB.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2908 FPB.exe 2908 FPB.exe 2908 FPB.exe 2908 FPB.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2908 2136 JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe 31 PID 2136 wrote to memory of 2908 2136 JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe 31 PID 2136 wrote to memory of 2908 2136 JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe 31 PID 2136 wrote to memory of 2908 2136 JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7e7b955a0ac5591aacb492a6a0339967.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\JHRXXY\FPB.exe"C:\Windows\system32\JHRXXY\FPB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD51d6f0b3843d17046be7669262085fb67
SHA1703b2d00731920b77041908ee4ec44ed10d6f8f9
SHA25688c91de925b84024367fd2a0a2597ef884c16f424771ca1a17780fb4cff7c591
SHA51223c6e8c94908bce7400527c7ad4bdd030074d45c48421140eeee6a9e156571d5a31c4ad7bb0f2042b2dfceab14f36044c433c0b2d4cdee4dfed1dccb9b28188a
-
Filesize
43KB
MD54207e94e5371e60c5a1c8a3a1bf7169a
SHA1469d55baaed9f93dd74bdf41383a760fd8690342
SHA2560caf0bcee50026d048e8c02345be9d6aa387db5245d99c2dcc255c75eccbcec5
SHA512c85ed60aefd0bc7105760df5d969ab606e1d6775de20b11ef14b454fc27f1308e91111786895e42c38b019f286425f980ac113086809ed3c6babc778af5deec1
-
Filesize
618B
MD53372b51ca49cb3e6c6b8707862d2a357
SHA11aa336ade11fa236a1d6bbbdde4a6451e9ebc4cb
SHA256ec43985c259e14bcc9b2626ab1e43ef4f34b31448dabbea329254fa85dc85145
SHA5129087d10a2c2de87778be425b65567169c46d2e6139e30ee2f09373e2b042ea4e0ba31860b93c9d90dfb58fb0eef2415273966c6d8d070d99875c88c26eed1dab
-
Filesize
1.4MB
MD53c0034d74caf9846686a2d93fd3079ac
SHA1949adf7912c74ca8517d70f30b823264a5a7e067
SHA25655750ec7e5c987dbe2585f0e4b1728999b3bb94d5efd458f4aed75efa960855b
SHA5125c25cfbbdb2f794a484a2a1d9a454d9b13ab90cba0313ce995330e97516b422524cd388a357d211addfdfcec06d681edf131a3b98839a3f6d3d9863d97ad1399