Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe
-
Size
480KB
-
MD5
2d5ead2821ce04a19cea731273295cb4
-
SHA1
4c577b2d5deabf862e0ff99954a596538f5ca7f8
-
SHA256
558b6026e90c2216185b08efc32a61387dbc3f71ec1ad6ed477b6b5709c4d887
-
SHA512
c9354e01adae5cf166f2c4d89085e988514e84f7caa0d7f5e913c2bb2b8cf456b651bcaec57b67bdd869604f8c8ae01050955a3466a723bf8ed7384478924c40
-
SSDEEP
12288:sRXeXYnRSTKlGG6gbCJWHv0zUAN4TFDSl/OWIVKdbWk:TRTrvoPWf4TFSlHdbWk
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234b3-12.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation IXHQ.exe -
Executes dropped EXE 1 IoCs
pid Process 1364 IXHQ.exe -
Loads dropped DLL 5 IoCs
pid Process 4304 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe 1364 IXHQ.exe 1364 IXHQ.exe 1364 IXHQ.exe 3180 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IXHQ Agent = "C:\\Windows\\SysWOW64\\Sys32\\IXHQ.exe" IXHQ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\IXHQ.006 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\IXHQ.007 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\IXHQ.exe 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\AKV.exe 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Sys32 IXHQ.exe File created C:\Windows\SysWOW64\Sys32\IXHQ.001 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3180 1364 WerFault.exe 84 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 1364 IXHQ.exe Token: SeIncBasePriorityPrivilege 1364 IXHQ.exe Token: SeIncBasePriorityPrivilege 1364 IXHQ.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1364 IXHQ.exe 1364 IXHQ.exe 1364 IXHQ.exe 1364 IXHQ.exe 1364 IXHQ.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4304 wrote to memory of 1364 4304 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe 84 PID 4304 wrote to memory of 1364 4304 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe 84 PID 4304 wrote to memory of 1364 4304 2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe 84 PID 1364 wrote to memory of 1344 1364 IXHQ.exe 92 PID 1364 wrote to memory of 1344 1364 IXHQ.exe 92 PID 1364 wrote to memory of 1344 1364 IXHQ.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d5ead2821ce04a19cea731273295cb4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\Sys32\IXHQ.exe"C:\Windows\system32\Sys32\IXHQ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 11083⤵
- Loads dropped DLL
- Program crash
PID:3180
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\Sys32\IXHQ.exe > nul3⤵PID:1344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1364 -ip 13641⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD533303ca8abef9221cb410b8a232e9fe4
SHA10cdfc25dbf0e9ad7d4585cd9037dc2e6604be00c
SHA2565110301dee966f0f26307ab1b430279d1e4999c2c4a0ea924ff32f1a9ded869a
SHA512da29821045773ba776def985966b62e09e69bb5bf1786b16c2fff6feb68a03b9e22c5f7d081e3dd58d1785cd7ac64736497c043b7cf6c7149c3a54f8ef111800
-
Filesize
391KB
MD5869461e168a87283a8782e70f5d5a3a8
SHA1ab189b5f2682ae66162226b4f646b1e80486c653
SHA256992cb5ea845b2d24c02f4e40873bf4ebd7b58b57ae2e001907228af4879e575b
SHA512e4e77e07eb0ef2adb6d5ebdb9629f4632c417cf3d1a22e4c414b806bfbd259df13f6c88265f9346ed2b22bf67eb3d63924d86767c8508be4abdc9067f15a82ae
-
Filesize
398B
MD59f7572f09e65cac3e5ac1bd44681a392
SHA115d69c868bcb5cc1af17d66e9296308fa1897306
SHA25672915ac2bbd442e911b1fc0384d73052c2889f394e778ffb6007a8f57794d72f
SHA512544adc1098eba15980d14d09d0221964e1cfa5f3f474aab9def58f4385bec456dc4e844a53abb4d7659540140a5a2edd5d986a9e583e4db5cd004e209527541f
-
Filesize
7KB
MD5928cc65dc793834c709a054ca57c19c8
SHA1a1e5d8407199c1bd6a4b274044de640fe0d9e99b
SHA256e3473d81a02ed30e4236591384136f41f17b6a4aae24b5468789644ccd4bf192
SHA512f7c8f7a75c4f8a418630e2ac15676740a902449d9a3c4baf3184409f8701c9caa3e82304d141362d95503f1af6b693eed7b77f690d92ca0162f7ea3ecbc80fdf
-
Filesize
5KB
MD53e1f5d5a06cf97b0495b8d129fbe02e4
SHA1b0de258a813f5edde85004f6865b6ed91f6d6f8f
SHA256f49448fc7c567e64eaeb9cc4dbd3c8021a82b5d9df0a622a439f7b42dc2f26d7
SHA512b0e0b81cb5776d298e96346aa61027c9799a47191c94de50be2209c32747774959d002ddeb98fd15556ee893b0d7bd1f0c8a901469dce4e3acf94e2c4c3e2bfd
-
Filesize
476KB
MD5ef52b540cb404d908338e9cbf7cff283
SHA1778765e1736c0a197685978c3fee7a44e7bde419
SHA25639d8bdb975fbfcbcec8fe63be4e9fe6ce39ae5d23a005118aeffa07b17a3f815
SHA512596b77bf5b15455c326a5a2efd66bc69685eb625e3e211ea0341ad4d8920ada7618a7107e42f2c0963fe6c2d92f2acf47b641ef33071a7c42004e5874d5219a6