General
-
Target
JaffaCakes118_be703c6463c6abecf9b40ceb8767f965
-
Size
753KB
-
Sample
250418-rprljsvyhw
-
MD5
be703c6463c6abecf9b40ceb8767f965
-
SHA1
ff01b76ce1d089d9463fc49f0a504e79bad2887a
-
SHA256
915ef27293e400c67ee19313700ddd96e0bd1b9becabd68d50b461d91cfe2941
-
SHA512
9523ae8aedc59e561c13548b35ffceb23b7892cba4894daa6c17d660d58f36fc5a69e39c2e92c3713eb44e561c056e8cd6384952882b0d0fb861946177b750be
-
SSDEEP
12288:/uD68wSJOCJqQfHH6V23nJc2qq24Qy5Z9mm744L9Nd/FB77lwecB3zWuoPXGbdZT:QJOCJfHagJc51q9mmM4L9NdFB/lw1xxZ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_be703c6463c6abecf9b40ceb8767f965.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
JaffaCakes118_be703c6463c6abecf9b40ceb8767f965.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
JaffaCakes118_be703c6463c6abecf9b40ceb8767f965
-
Size
753KB
-
MD5
be703c6463c6abecf9b40ceb8767f965
-
SHA1
ff01b76ce1d089d9463fc49f0a504e79bad2887a
-
SHA256
915ef27293e400c67ee19313700ddd96e0bd1b9becabd68d50b461d91cfe2941
-
SHA512
9523ae8aedc59e561c13548b35ffceb23b7892cba4894daa6c17d660d58f36fc5a69e39c2e92c3713eb44e561c056e8cd6384952882b0d0fb861946177b750be
-
SSDEEP
12288:/uD68wSJOCJqQfHH6V23nJc2qq24Qy5Z9mm744L9Nd/FB77lwecB3zWuoPXGbdZT:QJOCJfHagJc51q9mmM4L9NdFB/lw1xxZ
-
Ardamax family
-
Ardamax main executable
-
Contacts a large (568) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Virtualization/Sandbox Evasion
1