Analysis
-
max time kernel
135s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
a984e304a598fff974fbe3a0c1ef4daf
-
SHA1
417190ed75f70a5c2b0d2ff9e1eaadefcca77d16
-
SHA256
8b0666ef182baa4dae0544a16567cd999aec3392ad71c95741dcc6a5f3f8153e
-
SHA512
bef8e50a90e9e1b6f1a1d426b07d75fe7dfdc9409bf57df6603796d20c8b1d0727eb6ab1a18db0099243b4e0c92b192ef4aaba5a0f8b94651a5f9bd04285d1e7
-
SSDEEP
24576:2sCS7MMLKRW+MkWhYQS8JyEm9R8BngdS0mqog23ItPltyTCYY/H6:2Ba2xOhPJyP9OBm5metPlYTY/H6
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002346d-14.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation IJG.exe -
Executes dropped EXE 3 IoCs
pid Process 4992 Install.exe 5016 IJG.exe 2296 Tcpview.exe -
Loads dropped DLL 2 IoCs
pid Process 5016 IJG.exe 2296 Tcpview.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IJG Start = "C:\\Windows\\SysWOW64\\YEMIJC\\IJG.exe" IJG.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\YEMIJC\ IJG.exe File created C:\Windows\SysWOW64\YEMIJC\IJG.004 Install.exe File created C:\Windows\SysWOW64\YEMIJC\IJG.001 Install.exe File created C:\Windows\SysWOW64\YEMIJC\IJG.002 Install.exe File created C:\Windows\SysWOW64\YEMIJC\IJG.exe Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tcpview.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 5016 IJG.exe Token: SeIncBasePriorityPrivilege 5016 IJG.exe Token: SeIncBasePriorityPrivilege 5016 IJG.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5016 IJG.exe 5016 IJG.exe 5016 IJG.exe 5016 IJG.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 916 wrote to memory of 4992 916 a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe 84 PID 916 wrote to memory of 4992 916 a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe 84 PID 916 wrote to memory of 4992 916 a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe 84 PID 4992 wrote to memory of 5016 4992 Install.exe 86 PID 4992 wrote to memory of 5016 4992 Install.exe 86 PID 4992 wrote to memory of 5016 4992 Install.exe 86 PID 916 wrote to memory of 2296 916 a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe 87 PID 916 wrote to memory of 2296 916 a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe 87 PID 916 wrote to memory of 2296 916 a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe 87 PID 5016 wrote to memory of 212 5016 IJG.exe 100 PID 5016 wrote to memory of 212 5016 IJG.exe 100 PID 5016 wrote to memory of 212 5016 IJG.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a984e304a598fff974fbe3a0c1ef4daf_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\YEMIJC\IJG.exe"C:\Windows\system32\YEMIJC\IJG.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\YEMIJC\IJG.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Tcpview.exe"C:\Users\Admin\AppData\Local\Temp\Tcpview.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
875KB
MD5924b4de5dbd1714c0c391e081a765db2
SHA1530299c9c0914abf97a75c7df1c3ae4f9f794f8c
SHA2565dd08bd38c985a7fbd25ae223d9d77398ed0b8fcd4917493278bcd684cb468fb
SHA51279ab99f336a13e3ea74987c6ff6bd114598f0128c841429f85d6f89c205dee7e75e96ad4ec5bf77641b48c83c967c2ed4ea69b834146ae32e86ce51391abe301
-
Filesize
292KB
MD5e567d97018bec01adf3ef18492d41617
SHA15213e144a7cf5e0d7faafa0584a58ba43c702fef
SHA25651c2307fdb7f1481581c97ac47bf954d6d5424f1a4f3f0d06e8169df21ed30cf
SHA5125047e19dd1a90538d72580943c0ab47feb7c093e276b7013ca1e711100f5e8c088782b8cc92142981351c927e0013aa79c6384e85b48f5c233fba7f36133eaf0
-
Filesize
61KB
MD57a5612cc859be918c5767487f8a6815a
SHA1a855d3a3e6336ac0508a8099e8ace14680394c36
SHA256643419bc7e3a46ecdd7196858b3489c806c5edc486b513ce58519a109544c9d1
SHA51231c541870dbc695c34d132c4232accc2fe511f30188a4db33d5c41758cf5af00a4906b55b0a208b5848436313fd3d8ccf6be7f1af62ecedd3a5c4c301dc5e11d
-
Filesize
43KB
MD5b2bcd668abf17ee408d232cc636614b2
SHA1c354f941121515536c4f0d9ae49ed1a9b28534b4
SHA256563f5e99f0beb961ecf6a8284bf41fee3e85d6f63cdff1669438f5a2168bfd99
SHA512ba1be164de5919ae45f4bedfebe7e7799626b457f07b42fc43b8912f2932955833617b45e147e2e4d406f57f57f50c1869aa611db18a569919395e42fa53a702
-
Filesize
1KB
MD5c6e93a6deb7d7dcbda1b7bcd9b77d78c
SHA107d7af65a60f97d7ca90d04c3fbf7422ca17276a
SHA256fd9f9b907f9b0fac19a4c1ca0d2e149843c55a43817da1429fc8182a4a4f4c66
SHA512be15509bdcc32c6da2f65eb017166566f1ec10ba07847ea5379b88cc3530b8bc9d776acf36c75bfabfc9199627a92e9c1555a2fcc5009fbeeec4d358fd11c198
-
Filesize
1.5MB
MD5a9ea3f61a57b36cde9953afd91f18d34
SHA1e7e931b96b6e39b64a2a38d704bbe9561a234cbc
SHA256accbdc6de9b6b671e6dc5bda9f1f983fbfcaa07467fbf6eabd25b9d5314d82ec
SHA5120a6a42a772a3afd66233d9d3abb962b3a8cbf3d6e0e719352795b6441a148617dbe788991f0cead29d4b1540726504c9c56bebd9836ae6263b82a121fafd89fc