Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe
-
Size
799KB
-
MD5
8a509bb4520c25623e28ae3a6d16091b
-
SHA1
c3873283621afe782f327af5749fbf4a8ef9b662
-
SHA256
1813c39c2f2e1d3584904ba014882fec75e51a50debf4e9670e8a03beacd7964
-
SHA512
ca316bf77db21d73921b6364e57354e83450eae6d98e5e24516c0c21ce9ccc44f4888f09a8eb0fa1ec9db53285089b27fcb3c95859c7cb5a19924412d2f4ed20
-
SSDEEP
24576:FouTWebeT2B1YC+oApJ15P3NIFaZHoy+DyQw:iuTWieiByCP0j5/K89oy+OD
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002358d-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3500 XGQA.exe -
Loads dropped DLL 5 IoCs
pid Process 212 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe 3500 XGQA.exe 3500 XGQA.exe 3500 XGQA.exe 3464 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XGQA Agent = "C:\\Windows\\SysWOW64\\9283\\XGQA.exe" XGQA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\9283\XGQA.exe 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\9283 XGQA.exe File created C:\Windows\SysWOW64\9283\XGQA.001 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe File created C:\Windows\SysWOW64\9283\XGQA.006 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe File created C:\Windows\SysWOW64\9283\XGQA.007 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3464 212 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XGQA.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Web3.5 = "1723378388" XGQA.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4060 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3500 XGQA.exe Token: SeIncBasePriorityPrivilege 3500 XGQA.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3500 XGQA.exe 3500 XGQA.exe 3500 XGQA.exe 3500 XGQA.exe 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE 4060 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 212 wrote to memory of 3500 212 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe 94 PID 212 wrote to memory of 3500 212 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe 94 PID 212 wrote to memory of 3500 212 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe 94 PID 212 wrote to memory of 4060 212 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe 95 PID 212 wrote to memory of 4060 212 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe 95 PID 212 wrote to memory of 4060 212 8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\9283\XGQA.exe"C:\Windows\system32\9283\XGQA.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3500
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ORDER.xls"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 6842⤵
- Loads dropped DLL
- Program crash
PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 212 -ip 2121⤵PID:4040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:81⤵PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5c6bd86e00a5cb9a8a40b87ba9818103d
SHA19a834a3a0399e38bc24a54c0ec586d60d8b5a5c2
SHA256540e028727362a64b7c27253354fe04b9b74caedb2e5a3e9af60d98872ac3c9e
SHA512b9f82601a4f0377f951c4a2cfa36336aa7df53e56fc4b3339db382db7368d95cd6efa625ea394661472c2d100e6ac60b49ed8c8fe60bbde67f7af0ca12f556dc
-
Filesize
16KB
MD5a2497311efe4072dd87abcc06c62f7ba
SHA1d4f6ec9f631a4196f5befc1ffb09f91ca5454b28
SHA25612eed53f4ace0911f3f6689d6d21cafdf669f37877a3edf068ef4ecbc87df511
SHA512e85a0f5b61227c9d9682a5a6857f7b401273ebcd72d36ce44079ea3d93b18adb984492e6b28a7e8fefd766c9e25e7c9fed040dd9b9b943c7f091f49f73d81906
-
Filesize
876B
MD5c737614cc655e215a289b26ed578a07b
SHA190b600621204dea76436b433e0fefd5933bbd995
SHA25605ea0a913670b524687d9885b198da93b68fe75266687e9d76b6d338c356a6fa
SHA51218a7acb2ebea14cc0edfcaefcdc0253ff056f895ba96340e907e258f6005502b47e1fe4387ffb9000bb68ed5715b6c4b4611576ffb3db95f3b7a80a6afb00abe
-
Filesize
60KB
MD53191cbb2f371fb39acf9e97601a6190c
SHA11ac9e4f91097d5ff1a8b7e879115ed73b15fdddd
SHA256c41cf85fa07cbcaeaf549aa51d9501f70563aa2d6772d6f1c768e9ad5cdeafec
SHA512febc17d382f4087ebdb56b031c3029eb2c8113de77d8820e80f62cf149952e97d541f72f945078cd3fdfb46df4b3781a83d487facee2072aaadbc01a37d9d60a
-
Filesize
42KB
MD557dc2ece810bda49bef41d049d295fbf
SHA1d930bc781c2cde133cc549bafc6db8209bd92178
SHA2560fc50d2a9de2d03fe8bea07564816f0f22fb836a8e13fa5f71b0e313e6570ab7
SHA512a213ee00c5caebb9360eea40b06e5dd533aa54b5d117940b72e5dd67a84a9816f13daec806878c5cd6200b88a5a0d72b46cb9a5b37e62ea53dc101b0ced2d413
-
Filesize
1.2MB
MD5011f4de8c53021b41567afbe1ce5807a
SHA14a93acf18f153106e7fe846f22e1aab08485d1c7
SHA2567add4f20a7125bc818db4bc18fe612875b0506ce2a7d69c29ff736e78365d714
SHA51218e2a3ebeab351e362ae38b0780a791a39a59257f3f96b1052fa0761a7f22498c38e235426bf47ee9c4845b9ed652866cfc627446750caece237c07cb253918f