Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
470341f382ae0d6906699c4cede9f340_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
470341f382ae0d6906699c4cede9f340_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
470341f382ae0d6906699c4cede9f340_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
470341f382ae0d6906699c4cede9f340
-
SHA1
7190106144a3f3e8fa5bf1f374329e949660b853
-
SHA256
cfc15cf897edd6e74a4676aa1811d693fee4fe424f04d2a4d3b5675f5198dccd
-
SHA512
eff1a4c31dee3ff420a402c8ee5af39264ca4896c57b758183385e6a60320de10b69e1ac6655a3930767935cb97d708452e9ad9b49e9355bb2a0d4bf30e12ed3
-
SSDEEP
24576:6ITTHF+2gHp3qN4viAdq7ONHeHQRTaW6vREgS++8uhvjAVVyIzJ0qbrvxsg3g:66TKHp304Tq7FwRyREgSJph6l0JAg
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002346c-27.dat family_ardamax -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 470341f382ae0d6906699c4cede9f340_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation AUN.exe -
Executes dropped EXE 2 IoCs
pid Process 2840 Install.exe 4380 AUN.exe -
Loads dropped DLL 1 IoCs
pid Process 4380 AUN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AUN Start = "C:\\Windows\\SysWOW64\\IUOFJS\\AUN.exe" AUN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\IUOFJS\AUN.001 Install.exe File created C:\Windows\SysWOW64\IUOFJS\AUN.002 Install.exe File created C:\Windows\SysWOW64\IUOFJS\AKV.exe Install.exe File created C:\Windows\SysWOW64\IUOFJS\AUN.exe Install.exe File opened for modification C:\Windows\SysWOW64\IUOFJS\ AUN.exe File created C:\Windows\SysWOW64\IUOFJS\AUN.004 Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4380 AUN.exe 4380 AUN.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 4380 AUN.exe Token: SeIncBasePriorityPrivilege 4380 AUN.exe Token: SeIncBasePriorityPrivilege 4380 AUN.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4380 AUN.exe 4380 AUN.exe 4380 AUN.exe 4380 AUN.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3760 wrote to memory of 2840 3760 470341f382ae0d6906699c4cede9f340_JaffaCakes118.exe 87 PID 3760 wrote to memory of 2840 3760 470341f382ae0d6906699c4cede9f340_JaffaCakes118.exe 87 PID 3760 wrote to memory of 2840 3760 470341f382ae0d6906699c4cede9f340_JaffaCakes118.exe 87 PID 2840 wrote to memory of 4380 2840 Install.exe 88 PID 2840 wrote to memory of 4380 2840 Install.exe 88 PID 2840 wrote to memory of 4380 2840 Install.exe 88 PID 4380 wrote to memory of 2412 4380 AUN.exe 92 PID 4380 wrote to memory of 2412 4380 AUN.exe 92 PID 4380 wrote to memory of 2412 4380 AUN.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\470341f382ae0d6906699c4cede9f340_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\470341f382ae0d6906699c4cede9f340_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\IUOFJS\AUN.exe"C:\Windows\system32\IUOFJS\AUN.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\IUOFJS\AUN.exe > nul4⤵PID:2412
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57ea9c07770240661820a43c283f4b8ad
SHA1e345c61bca763bb1afb6c106bfcb5275e3efa2be
SHA25675a4feadca2da8b21e765d5b65376c5f692b4f2adcb28253999815aa2d648bd2
SHA5127e6ef50c133f668e5f79fac93b591f04e2504fb7cfda07a3b341efe3725ff7ce2e578f345735b12a331d0c0e8dc9fc926dbabf868de3837f4a8869d4b0fc933d
-
Filesize
490KB
MD564a6cc55dc76d26448c30a8a1885f7cb
SHA1149e467026647e080b4c69ab4f99b2d3c2b4dbe4
SHA2565cbc0ec73c901be4ac182e13f6869f6f8cf0831b9603e542a3919f6a06087640
SHA512de8cd7bea8113871ce8a36966fbaefd02b8ef7b09a8cbb631b4ac353bdf65b27d5630146ed700fd6edbc4276f4368ebad76b772d9b84349ddc2bd6f7127c377d
-
Filesize
61KB
MD5bf311791d2f9ea9c82a8d4764a98c0d8
SHA1405ba2bd110590abd0bf340d12e054405afb011f
SHA256d720cf3d297743da7ab1da528f4c086a29d59ef553e1a96569b49a59831d583b
SHA5128be092f068807767b0065de10f9da386b90d8e587356881ba3391380b953b199e818b527e74b305d7c714fc94cb6f8e66c76d89d1785fa9910aa4cb39c5cada8
-
Filesize
44KB
MD5ce365878123962c3438e349621c10198
SHA15b861d9fc2923c61ef390a0b729a21078aa5fd59
SHA256ba254f6675490a045d4c85a5f46681c175c1321692c20fc808c7c244173dd63f
SHA512efc6f143d5e9244a6635562d7e9a9cea22ab7e7b304e933642a51d66da896e9038208b86c12f6da623a01b9175e73eeb40ab600e6625db3595144bfca1231a76
-
Filesize
1KB
MD53d2152eb753394648d75368e5d26da90
SHA1b0492e6e5ef2693d4d0c938da37407794fb4b856
SHA256fcee9bec173c6a8ed947e0d5640e99f8b3b3199e2e325ec3e5da8a8cd1470588
SHA51272df4e01a806241c01c0bf643f733a046b38d6ebf6ff719d592db5a676f15e30e0307b1fa5b714026662f0ecc22c6e339b943306b4cd750f8065d1579d1bf179
-
Filesize
1.7MB
MD58f7590bbba70748e69612e9e2d5a9f2e
SHA1f3ad9834bc38f33fe501b9076c65ac29d0410578
SHA2562dec3a8fb4a5b198335e7f4a9b611194b0a081abf0c56f9df3f4e2697e69d9e4
SHA512347e9ac793afd627e064ecdfea61c3e2b626ace0ea41928aad93a72567048b8e9bdf773f8a4a59a0d96ce8c08612c542c15982e8051828bef025fea6132838c6