Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
27eccbde63f6ff70152f5700ed24299d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
27eccbde63f6ff70152f5700ed24299d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27eccbde63f6ff70152f5700ed24299d_JaffaCakes118.exe
-
Size
345KB
-
MD5
27eccbde63f6ff70152f5700ed24299d
-
SHA1
17fade0059e26df9777293c2de6ea95a4e148fe2
-
SHA256
0422d1fbfdca89d4197b4f1620bf83077339463c200538846754ae4ac57b825e
-
SHA512
8d84381f71a13e1d0febc6b62bcfe986c9a5b269fcab81d5396d7d00b1a0d0cef8b625b835b0be6cd193dc0dc9b4510b96c866093425f423255bea56475a1cfa
-
SSDEEP
6144:gR51w17omW2dW82ZJRovOIzgLm5v4UMohHZcj5kB3Yo3klqW1Hl:QT0djtzgLK4DoykxYo3kZ
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002344f-21.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation 27eccbde63f6ff70152f5700ed24299d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation Install.exe -
Executes dropped EXE 2 IoCs
pid Process 2716 Install.exe 2540 UWEL.exe -
Loads dropped DLL 4 IoCs
pid Process 2716 Install.exe 2540 UWEL.exe 2540 UWEL.exe 2540 UWEL.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UWEL Agent = "C:\\Windows\\SysWOW64\\28463\\UWEL.exe" UWEL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\UWEL.001 Install.exe File created C:\Windows\SysWOW64\28463\UWEL.006 Install.exe File created C:\Windows\SysWOW64\28463\UWEL.007 Install.exe File created C:\Windows\SysWOW64\28463\UWEL.exe Install.exe File opened for modification C:\Windows\SysWOW64\28463 UWEL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2540 UWEL.exe Token: SeIncBasePriorityPrivilege 2540 UWEL.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2540 UWEL.exe 2540 UWEL.exe 2540 UWEL.exe 2540 UWEL.exe 2540 UWEL.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4968 wrote to memory of 2716 4968 27eccbde63f6ff70152f5700ed24299d_JaffaCakes118.exe 85 PID 4968 wrote to memory of 2716 4968 27eccbde63f6ff70152f5700ed24299d_JaffaCakes118.exe 85 PID 4968 wrote to memory of 2716 4968 27eccbde63f6ff70152f5700ed24299d_JaffaCakes118.exe 85 PID 2716 wrote to memory of 2540 2716 Install.exe 86 PID 2716 wrote to memory of 2540 2716 Install.exe 86 PID 2716 wrote to memory of 2540 2716 Install.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\27eccbde63f6ff70152f5700ed24299d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27eccbde63f6ff70152f5700ed24299d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\28463\UWEL.exe"C:\Windows\system32\28463\UWEL.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD527092ec75c1839f36bfe900a38acc484
SHA1fe14b750a0ed653246c5f358891f8c1241913bb2
SHA256e6e29699840ae26c452227f9a1c9fd0e3cda0c2413c4255df9fc066c47af0e07
SHA512815477e8681e38dd3110171adbaf06738eb9d63839671a959a296ec1a1fb17d788682dde5e6a1f0bffa3b4deda4577292ffa37ce10b95ad14276ffcd0795ac0b
-
Filesize
271KB
MD549d437dac67bb4bfc08fc2f361b2bb8c
SHA16e69e0788740348fa8d3ca8f32d92bda9be97f52
SHA2561c1ffbb79f50ebd60c7762e72bb3d14e6dc670adf1f0dfffcd248739e8e4f584
SHA512e90a1b451516dccea06bf9b132e8bc5810d291542ab14b8479f169ac472d113bf6dfcbd6f03609b3089b864bc015d32b18d21c13ea6d312e231e30e9dba0d613
-
Filesize
408B
MD581accaf08dd571b4fd7010b10a08531f
SHA12e395a9c03eecd9672199ddef588c1961a600750
SHA2564c13b94409e19d0839742ca4c88c8a69705afdba35eb4960e654e4acead486c0
SHA512cec379ca888721155ec01aaf98c081b9cc1166de44cec60c5432d61ea2df8d016c990260e7dd73ef16aafb18ca63a3f88d9b3b6308a8a283f3be733abe05420c
-
Filesize
8KB
MD5aae8ccee5d5eed5748d13f474123efea
SHA16da78da4de3b99a55fad00be2ec53a3ad3bd06ae
SHA25610c464d1675774e0282171555d59fb8975ed6c0e6a781182490f48e66823a5b8
SHA512d370e1ffeeb81b3f07b83a9cf1e3b44635fde7aa6ac999bccafece8091dbf96f0a78257bb0e03b3689dc47fb4e96ec7deac7848a43ddef62afc9b8cc665ee8bd
-
Filesize
5KB
MD540685d22d05d92462a2cfc1bba9a81b7
SHA1f0e19012d0ed000148898b1e1264736bed438da8
SHA256cdca1e5bc4c5129caa8eeddf637c820b6241c8790ce1a341e38e8324ae95afa0
SHA51221961d2dd118b45bde4cf00b4570712791a22769d05afb5b6c54355b0aaee9b7f7de00b357845349ef957807452365134d51e11181d2d45f98ed0cc9402de90b
-
Filesize
473KB
MD5339ae4ce820cda75bbb363b2ed1c06fd
SHA162399c6102cc98ed66cbcd88a63ff870cf7b2100
SHA2561e4a463ac0d463cee1f52f9529474484157c85d671aea1ab5f4173df12de01b6
SHA5125da8b333a839c4b169c6f4c9a1929918f166a895af7818c8223df7ed22279aac3b6ef88f89ee083a4f475f82ec6078f8e9800a9afc9547712245d090636a284a