Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
390405fc046ae32cd3054789355dcfcf
-
SHA1
b6df3ec348102f53101a27d2b7b71490d2bbcfe3
-
SHA256
682104fc430fa80720e1cd611a6b563cde1bcc9a3989bb3be824788a72b59ccc
-
SHA512
351fac2477e476b70b655a42b57b43c17c6d2f2ab47c9133e3b2280e2132dd286f98153df53dd7d8307091ed896e4aae8bbc0662054a845dfb3003e89e697461
-
SSDEEP
24576:nGaUTvUwuPTfTMmTjzVbCBlZ7OiyaHv7lcVTkQplZHaGHM0lnZK8G5KQP5:nGrTvULPTfTrzhCFODQKV3h9ALB
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023443-8.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation KUY.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4896 KUY.exe -
Loads dropped DLL 2 IoCs
pid Process 4896 KUY.exe 380 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KUY Start = "C:\\Windows\\SysWOW64\\MITGWG\\KUY.exe" KUY.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\MITGWG\AKV.exe 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe File created C:\Windows\SysWOW64\MITGWG\KUY.exe 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MITGWG\ KUY.exe File created C:\Windows\SysWOW64\MITGWG\KUY.004 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe File created C:\Windows\SysWOW64\MITGWG\KUY.001 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe File created C:\Windows\SysWOW64\MITGWG\KUY.002 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 4896 KUY.exe Token: SeIncBasePriorityPrivilege 4896 KUY.exe Token: SeIncBasePriorityPrivilege 4896 KUY.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4896 KUY.exe 4896 KUY.exe 4896 KUY.exe 4896 KUY.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 380 wrote to memory of 4896 380 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe 85 PID 380 wrote to memory of 4896 380 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe 85 PID 380 wrote to memory of 4896 380 390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe 85 PID 4896 wrote to memory of 4328 4896 KUY.exe 90 PID 4896 wrote to memory of 4328 4896 KUY.exe 90 PID 4896 wrote to memory of 4328 4896 KUY.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\390405fc046ae32cd3054789355dcfcf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\MITGWG\KUY.exe"C:\Windows\system32\MITGWG\KUY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\MITGWG\KUY.exe > nul3⤵PID:4328
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD545a56a60fc710085ef72a86ae4de2a44
SHA191133410b770cfc8433b976aa44fc34346e614e6
SHA25682d3a18d8121ad32e61d0c1fc1dabb2073d21ce82431c9d1259e2589aad373e2
SHA512c4322b3b668efd8858ce71e1d80e25f21f75b39d4331d8c88050a8f484e524eac58226dfdbeb89fe569e89a6e93fcbb3300d537666126eb3fbf4fe54136aabbf
-
Filesize
60KB
MD55b79ad0d1d30119158b5ab4147edbd96
SHA16f802d57d49d7063e40b7bebafa8fb1051e0a907
SHA2564ccebd38ac000cbc33a6cfc2e87e900ef64ba4b978f3facfdb5870e217ac3ff7
SHA512497e3eff3c7356cf12efd153b651d1a1ef2cb07302eb5b71dcff0d6732e5273bcff5f82897dff85cdaae0bc159fa9c4588e3bc90ab12521532675bf116757c6b
-
Filesize
43KB
MD5af3efaa90f29f6506693136ae1674fc7
SHA1897aea8f6df7e29d43954512fc390b97c0eb4550
SHA2564658d92f74df5ee142c08157985e25e41f74aaaa4256df9dfc9a011b7c3f0f44
SHA5121a87ce2d0767204b1d636ce70c083c71f5cfa064680218906ff86c233968baca7ef605f2b1d9bfaf8326a8cbff7074ace766604b283c1a2b50d5788038dc9863
-
Filesize
1KB
MD5b3cc977d0924d844cb85db9ca5e825c0
SHA19a9e43f2c799b211668d6fe7a3d88adff3890f72
SHA2566d6a07734788efc8393671aaa343adb6a56327c2c54d2be61c60ce1f878b11ec
SHA5120a84f1827cc9fe821b91ecd92d4b424e69823720b712fc81ff23730addc7de681e558fafe158edbfa93ed0087d4c6dd86f426a76da450bf9cb3f3ee4ae5bc764
-
Filesize
1.7MB
MD578dd492b06d03744d1954781d33775ca
SHA1ef9462193e6ba7be64458ea1be6afcaeadc574b1
SHA256c0664f94e9b2a7817f79b9457c31e524ef72ed7c073e79546d67e857b4637ede
SHA512f88734970018f46b8c4ce350cccf577ac056957e933deb493becbc30b7165834ca68db423850220f8944b364dc97e1423247192faf4f3e4db85cf25c4576eef9