Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
9f5923d425dac2dd7d0b17eea269b98c
-
SHA1
130a13a2f109b4888db93130cee2746c1cb10bd3
-
SHA256
90c54934fc5887d22ac8fc84b3873acf00957a700ad83341af90536b31056975
-
SHA512
91940d065d577d2aebb3a2fc7c2899f6741345353954616ea7d90bf08dbd7b017567655ba2a4f3f694e2578836ad3fd5a8e998bf9b3bab9747bda49ae9ac27f7
-
SSDEEP
49152:50pTFz4RZI0s+VGDtLQhx455NcBl9qebx0eufRVRyg:5Gz4RZjPViLQC3N85x0ZZPyg
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023494-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4668 LHV.exe -
Loads dropped DLL 1 IoCs
pid Process 4668 LHV.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LHV Start = "C:\\Windows\\SysWOW64\\BGKTVN\\LHV.exe" LHV.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\BGKTVN\LHV.002 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe File created C:\Windows\SysWOW64\BGKTVN\AKV.exe 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe File created C:\Windows\SysWOW64\BGKTVN\LHV.exe 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\BGKTVN\ LHV.exe File created C:\Windows\SysWOW64\BGKTVN\LHV.004 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe File created C:\Windows\SysWOW64\BGKTVN\LHV.001 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LHV.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4668 LHV.exe 4668 LHV.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4668 LHV.exe Token: SeIncBasePriorityPrivilege 4668 LHV.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4668 LHV.exe 4668 LHV.exe 4668 LHV.exe 4668 LHV.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4668 2512 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe 85 PID 2512 wrote to memory of 4668 2512 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe 85 PID 2512 wrote to memory of 4668 2512 9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f5923d425dac2dd7d0b17eea269b98c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\BGKTVN\LHV.exe"C:\Windows\system32\BGKTVN\LHV.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4668
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD54f60429f20ac507bb61cb45998a73847
SHA1c094a508b75c7c9a83cb04cd1fa9a547ab87fded
SHA25665478b0bded54534eb7e1241a8da267c57b55c3da90adce2880c04b861c6ddc9
SHA512e5f879e4e21051d91f7bf88e77dbbf1c288d595988d55a13ef703e242094e8a762c3262200cf478d55ac91d12cefcdd176646cffaf88439313d8e44b12c5fa91
-
Filesize
61KB
MD50d52ec4abb6e5055a153d97eab5bc2da
SHA1f01f83ac6741d9d53aa43501d456c5b003746fe9
SHA256845e34cf0373b2e959d3d27cfe09d858283dd6a4b335014c3b82e4af1161b321
SHA5125876e5a0401d9520678e733fc89147d6a6d7ef5bf6f8dbbb59276c79f8cf57301a49b3c20861a5696ee36337d6b151c32c3be2abcdb2990301bf0c616ff0be19
-
Filesize
43KB
MD5fab6c7c9f60f3a391f22754e221ba23f
SHA1b885a44fa6a8d6c0f08069f202527de1e93d460e
SHA25611c28e015fb748bf664203c92288252a90aa7119079094d5fed17bc6ebfc803b
SHA51286c368b8d542ec4dde120effcdac80a03118b8296188f3e09dde81883903b6a51a1bb6b981d394e05ff21bdc1cdcda125a427bfdb76aa209e706a58666e342bb
-
Filesize
1KB
MD54c24146644b7cfef39155e6136b2a625
SHA133d0faec8d30803f415af12d9c4929ea873da672
SHA2561b4430bab2fdb45125b82357655a3b21cd33743efb304a5632f7e77232d8c0b8
SHA512b9cd75fc2f810bb826422177ca610655498bf384169c94093cc4b826882f9f7042ed7c045adcdf0cd32f16654b3679505036e857cafe2935d4f3ecfe0fb2b8c9
-
Filesize
1.7MB
MD5cfeee152a39c265c34b5163548f8c59b
SHA15807f521bf8c48e8fb0abb657b6df7d21a533dc4
SHA2560f86eb289dc6b99c7560607e4e8e84b134515cee05becae947056026bfd21844
SHA512b50eafbade678e6a29dcae61e6eb251bcbc26d25427adf313aa7eb654de710d48236f1749e59cd0b19e28967b26a37bde364e584853b9b7f007d89c999d08ecd