Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
51124cc6f89e453d8e9098bdacd30d1f
-
SHA1
dc18e08db080750af46b63edccef323fd5377b56
-
SHA256
05498caf5ca962612cf02fe4e879c7f61ff0afae4918573b4856349fa1722fe7
-
SHA512
22c9ac9d5cd02709d22938444d806db1a56f6e5cc3867179cdf89e7ddc8cc8ab85d58406a55bde7f19cdd7a8ac5da7db6937e5f8743dc20edad3ec7d9e689a2a
-
SSDEEP
49152:FGrT0r3GEvM8PGpwCfY6MkEbukrMiQ1NwNT4MG:FXr3G8xmwCmd/KNwNEB
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234aa-8.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation UJW.exe -
Executes dropped EXE 1 IoCs
pid Process 3632 UJW.exe -
Loads dropped DLL 1 IoCs
pid Process 3632 UJW.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UJW Start = "C:\\Windows\\SysWOW64\\WPFUSF\\UJW.exe" UJW.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\WPFUSF\UJW.004 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe File created C:\Windows\SysWOW64\WPFUSF\UJW.001 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe File created C:\Windows\SysWOW64\WPFUSF\UJW.002 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe File created C:\Windows\SysWOW64\WPFUSF\AKV.exe 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe File created C:\Windows\SysWOW64\WPFUSF\UJW.exe 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WPFUSF\ UJW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3792 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3792 vlc.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: 33 3632 UJW.exe Token: SeIncBasePriorityPrivilege 3632 UJW.exe Token: 33 3048 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3048 AUDIODG.EXE Token: 33 3792 vlc.exe Token: SeIncBasePriorityPrivilege 3792 vlc.exe Token: SeIncBasePriorityPrivilege 3632 UJW.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe 3792 vlc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3632 UJW.exe 3632 UJW.exe 3632 UJW.exe 3632 UJW.exe 3792 vlc.exe 3792 vlc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1164 wrote to memory of 3632 1164 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe 86 PID 1164 wrote to memory of 3632 1164 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe 86 PID 1164 wrote to memory of 3632 1164 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe 86 PID 1164 wrote to memory of 3792 1164 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe 87 PID 1164 wrote to memory of 3792 1164 51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe 87 PID 3632 wrote to memory of 1392 3632 UJW.exe 101 PID 3632 wrote to memory of 1392 3632 UJW.exe 101 PID 3632 wrote to memory of 1392 3632 UJW.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\51124cc6f89e453d8e9098bdacd30d1f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\WPFUSF\UJW.exe"C:\Windows\system32\WPFUSF\UJW.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\WPFUSF\UJW.exe > nul3⤵PID:1392
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\زوبى+يدعب...3gp"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3792
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e4 0x4501⤵
- Suspicious use of AdjustPrivilegeToken
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD5a511ed721ff603d3ba6cb9247ee86700
SHA1b0ac0b6221cc7106800c8aa0e6b9e07252cd51fe
SHA256c1ba402e628a48268cff7bb9a00dfec23e59b1780c02f1446e19fd15f0ba8fda
SHA512510c0bcc2b10ac37a6e2866722e0916bec66f8086d9dff2338e83655671df7ef2c2dff839bcf1f5e94b8eb20d5fa3276af3965670c83ae16add5a45b6c02ac23
-
Filesize
456KB
MD545a56a60fc710085ef72a86ae4de2a44
SHA191133410b770cfc8433b976aa44fc34346e614e6
SHA25682d3a18d8121ad32e61d0c1fc1dabb2073d21ce82431c9d1259e2589aad373e2
SHA512c4322b3b668efd8858ce71e1d80e25f21f75b39d4331d8c88050a8f484e524eac58226dfdbeb89fe569e89a6e93fcbb3300d537666126eb3fbf4fe54136aabbf
-
Filesize
60KB
MD55b79ad0d1d30119158b5ab4147edbd96
SHA16f802d57d49d7063e40b7bebafa8fb1051e0a907
SHA2564ccebd38ac000cbc33a6cfc2e87e900ef64ba4b978f3facfdb5870e217ac3ff7
SHA512497e3eff3c7356cf12efd153b651d1a1ef2cb07302eb5b71dcff0d6732e5273bcff5f82897dff85cdaae0bc159fa9c4588e3bc90ab12521532675bf116757c6b
-
Filesize
43KB
MD5af3efaa90f29f6506693136ae1674fc7
SHA1897aea8f6df7e29d43954512fc390b97c0eb4550
SHA2564658d92f74df5ee142c08157985e25e41f74aaaa4256df9dfc9a011b7c3f0f44
SHA5121a87ce2d0767204b1d636ce70c083c71f5cfa064680218906ff86c233968baca7ef605f2b1d9bfaf8326a8cbff7074ace766604b283c1a2b50d5788038dc9863
-
Filesize
1KB
MD5b698b427f49bdc94faf6771fc0da0a95
SHA168c8d86d98d1525997c1fd9e6ab44db64dacf010
SHA2567b50890c995fc1709e35f27aefc8acb9d5f190b4cbc211287d248fd5671e2270
SHA512618126a8c17955b450c75e56c2c4b5fb2b037df53b707d256ea54816f24d88c26319082e1d39f9ecbe46b91cd37fec09131f601d69c98470cd4b16a02ec33840
-
Filesize
1.7MB
MD578dd492b06d03744d1954781d33775ca
SHA1ef9462193e6ba7be64458ea1be6afcaeadc574b1
SHA256c0664f94e9b2a7817f79b9457c31e524ef72ed7c073e79546d67e857b4637ede
SHA512f88734970018f46b8c4ce350cccf577ac056957e933deb493becbc30b7165834ca68db423850220f8944b364dc97e1423247192faf4f3e4db85cf25c4576eef9