Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe
-
Size
631KB
-
MD5
fc16b8f315aeb8a58e9b3e04e961a26a
-
SHA1
8a5a2343d4caaabd1d25622910595f912a5139a7
-
SHA256
e22cc73ca6292597c56847b093c491761bc87e202826332bdd9804d1ce45cae7
-
SHA512
5339a1b76383a49d75f306fd1dc797b02837d23e5a97e854a9074f48c4a3c9fb21c6f143fafd4e51d36f3efe14360ec150a289888ea91606b845e9946e5b6489
-
SSDEEP
12288:NYYkJgAClFX/FIl1TaRVgJ0sLRlobWf8zMih:e7kral1WVgJ0sLRDxo
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule C:\Windows\system32SMGJ.exe family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
hotkeys0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation hotkeys0.exe -
Executes dropped EXE 3 IoCs
Processes:
hotkeys0.exesystem32SMGJ.exehotkeys1.exepid process 396 hotkeys0.exe 4924 system32SMGJ.exe 3344 hotkeys1.exe -
Loads dropped DLL 7 IoCs
Processes:
hotkeys0.exesystem32SMGJ.exehotkeys1.exepid process 396 hotkeys0.exe 4924 system32SMGJ.exe 3344 hotkeys1.exe 4924 system32SMGJ.exe 4924 system32SMGJ.exe 3344 hotkeys1.exe 3344 hotkeys1.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\hotkeys1.exe upx behavioral2/memory/3344-27-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/3344-38-0x0000000000400000-0x0000000000499000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
system32SMGJ.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32SMGJ Agent = "C:\\Windows\\system32SMGJ.exe" system32SMGJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 4 IoCs
Processes:
hotkeys0.exedescription ioc process File created C:\Windows\system32SMGJ.001 hotkeys0.exe File created C:\Windows\system32SMGJ.006 hotkeys0.exe File created C:\Windows\system32SMGJ.007 hotkeys0.exe File created C:\Windows\system32SMGJ.exe hotkeys0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
hotkeys1.exepid process 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe 3344 hotkeys1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
hotkeys1.exesystem32SMGJ.exedescription pid process Token: SeDebugPrivilege 3344 hotkeys1.exe Token: 33 4924 system32SMGJ.exe Token: SeIncBasePriorityPrivilege 4924 system32SMGJ.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
system32SMGJ.exepid process 4924 system32SMGJ.exe 4924 system32SMGJ.exe 4924 system32SMGJ.exe 4924 system32SMGJ.exe 4924 system32SMGJ.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exehotkeys0.exedescription pid process target process PID 5076 wrote to memory of 396 5076 fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe hotkeys0.exe PID 5076 wrote to memory of 396 5076 fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe hotkeys0.exe PID 5076 wrote to memory of 396 5076 fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe hotkeys0.exe PID 396 wrote to memory of 4924 396 hotkeys0.exe system32SMGJ.exe PID 396 wrote to memory of 4924 396 hotkeys0.exe system32SMGJ.exe PID 396 wrote to memory of 4924 396 hotkeys0.exe system32SMGJ.exe PID 5076 wrote to memory of 3344 5076 fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe hotkeys1.exe PID 5076 wrote to memory of 3344 5076 fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe hotkeys1.exe PID 5076 wrote to memory of 3344 5076 fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe hotkeys1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc16b8f315aeb8a58e9b3e04e961a26a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\hotkeys0.exeC:\Windows\system32\2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32SMGJ.exe"C:\Windows\system32SMGJ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\hotkeys1.exe"C:\Users\Admin\AppData\Local\Temp\hotkeys1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\@3066.tmpFilesize
4KB
MD5d9e02f226fc338d14df200ba9a700625
SHA1414f134a16a309b31e418ed9e08c0c48aaf6e2bc
SHA2568165757efb79acceb9fd0bfae6b2c19b8f087cc0461abb17941d460dbdf2e260
SHA51213c73381602fe2593312d41ab4bc5cd5f922ac651f9e71e3fe3c58e7f0c5c73ecc9d79d61ec46f33a0a81cf73373421eeb510bd99650c0f53af30974ed61b8ca
-
C:\Users\Admin\AppData\Local\Temp\hotkeys0.exeFilesize
270KB
MD5bbf10f650946c7097c21730ec9ac3179
SHA13ddf427b4a664f19313e92212423fdb776f6d9d6
SHA2566b15dd64fb3493d85206bb016905be4a3dd9df6b268fa09ac1370d1ea309530d
SHA5128694c95ffe1a1346275395ba2548b674df94c25666400b2441d01e44d28a62889da6e9f115c5c71b9d9a5601245032d008edd4a098781fa8d54130e06099d00f
-
C:\Users\Admin\AppData\Local\Temp\hotkeys1.exeFilesize
241KB
MD587caa3fd0cd88ecef9fd84655ed627b6
SHA1ffff33abbd125fdafd37ca346118fa732890558b
SHA25696bb8fdb03681379358d8a6bb5ad3af6b7e0f555da74cd200eb2380fe060a06b
SHA512a44584c3f0f11d0b3124b8213c3023b56a7d5f8a2b717aafde52fca50325d05d815faea522a7e29633a8012be9bea561f7a81f8dcbd0cdca78416a859c10f754
-
C:\Windows\system32SMGJ.001Filesize
460B
MD5e6eef13328bb16cbf79da6d5ff4d34f9
SHA1e238a3470717de5d928441b5c86bc30b03262b53
SHA2561c6a672929aa97364a1f2ee4d881c992c5ff9ab9ecd03ff6a45c7b4224e3500a
SHA512cc07a263169e7e792ec8c9d3f820cd70ccada73c22e775b5e8001ac82b6eb259f73f940ae74b8ac26586f893ce7a6a644acfff9498bbf25e4667a7112c47d088
-
C:\Windows\system32SMGJ.006Filesize
7KB
MD532dd7b4bc8b6f290b0ece3cc1c011c96
SHA1b979683868b399c6a6204ebaed9fc9c784a0429a
SHA2566dcce9bbba5c2de47eea3abf7597a9c4fb2e4d358efc3752fa65c169cccfa2a1
SHA5129e0d720799fe816f7d09c8a722b762203b6f12a8625c1c93cd640219ecc35969bd641b4d9e6dc04ab6f95ceb73235a438eb7d48ee9402118db3618b5760551ea
-
C:\Windows\system32SMGJ.007Filesize
5KB
MD5e8155b68775ed29590e14df80fdc0e9f
SHA1ed449da02e648a524004c265f3c37496d2f07f1f
SHA256b39ba894b0a9a3201461ddd9ee9b297928e793dff221a47f019e75c11df631f3
SHA512b14e00c46cf9bed0aca0f85775f624ff064f2d2afe1fa68b61bee5729db73cf9a8eced669c52d7cbb9504ff1b369a9a16a0f36c71a70c13c0bd1eaf5e07ccc11
-
C:\Windows\system32SMGJ.exeFilesize
471KB
MD53c06bbc025b61d2182ef5573f2852bda
SHA1ebc1464c00b13fb5b3f80a59c80b595020e1fe7c
SHA256e7f64e7215284cdeb8ef1eba28733f7aeae7f6977f82809d8de1e76a2e249085
SHA5129d839ada211b85fc1efb1fe7bb3ce66fcf0e8069221d958234649c2ac5dc0f1bd06f1a016f9c727077af36fb46cac5409be9c8a8201d17f689c6b473aa01acdc
-
memory/3344-27-0x0000000000400000-0x0000000000499000-memory.dmpFilesize
612KB
-
memory/3344-31-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/3344-38-0x0000000000400000-0x0000000000499000-memory.dmpFilesize
612KB
-
memory/3344-41-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/4924-28-0x0000000002220000-0x0000000002221000-memory.dmpFilesize
4KB
-
memory/4924-40-0x0000000002220000-0x0000000002221000-memory.dmpFilesize
4KB