Analysis
-
max time kernel
96s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe
-
Size
539KB
-
MD5
dbb0d59aaeb0211ca74f9afbe9dc5c77
-
SHA1
718f2d8dea8f02ae88f0712ca16c7a5cde0f9b8c
-
SHA256
4525078def51388b7bac98705728c60484255077dbdcca1fb0f5661ba0f01520
-
SHA512
63e68948a3b3f45a384d6161077cd40448eb64e536b6e7f8c4ab418c1e566b683147f00b3a2036ae3b550c19481e2c25e624e641c3a0429b810cbdc2dc3f6391
-
SSDEEP
12288:fI/QHMCSnw1+DnszNwJxs5DWBZfiiZF5r0iKE3ym4HAyzjxGw+Osmghr/:5HYw1EmDWvr5rOEagA+5Tj
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234b7-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3984 HLIV.exe -
Loads dropped DLL 1 IoCs
pid Process 3884 dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HLIV Agent = "C:\\Windows\\SysWOW64\\28463\\HLIV.exe" HLIV.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\HLIV.001 dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\HLIV.006 dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\HLIV.007 dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\HLIV.exe dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HLIV.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3884 wrote to memory of 3984 3884 dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe 84 PID 3884 wrote to memory of 3984 3884 dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe 84 PID 3884 wrote to memory of 3984 3884 dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\28463\HLIV.exe"C:\Windows\system32\28463\HLIV.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD519cf467919727d52844f6526ef495371
SHA1107b53f43c923db816c3743896cad71b3795ad5c
SHA256e75ac29f8ac2c921ad6bebc70e53eb462ba2860aca514d9a3ef09ac49007b5b9
SHA5122cd6093b1b78670f1e6ff074de818acaceffcbf94a32d6875c1e42fa980570cf9f3f3d7de53800111503bf7a505fd7b238170095158c5c7bc631781e02ce2095
-
Filesize
458KB
MD5b32fec1ef63f9c2c4c2eacdf439163ed
SHA1541f11ef53115aeb1ee214beb505a7254824de87
SHA25615e4d7edda2c9e41794d7cdf43c735604fbe4c4e7135a9b5efd58f9825d2e078
SHA5120af6fb805634944ead3618617887581d313d4817e26a9990271bfd6f615387ceb31ffa0c4145ce9b59cb3bfe6fdb3b8224f2230e552581734d26e15a79a63a18
-
Filesize
486B
MD5351ef83e7f9d778e0194c7213baa86f3
SHA1169261353d28cd2c352b377247d26b9767fb16ee
SHA25652935358390d5c5ab984363b9a6db5d7a6735695fb81c5d7bc6bd55293305726
SHA5124d80a314a11384e0860d87ec3c5f8de67100b8a6fca2ec488ef280f3a65b96db9469f8c977bcc8d0a3462ce6c82eb5f8f04df6ed13d87e1093df7f9d12197587
-
Filesize
8KB
MD59a45af5044d301aacf2928ea47cb3b6a
SHA135bfa3bd42dfd0a1cf97a56d992a3ca47577bc9d
SHA25671b69ce0cfaa58eb4c9742111b2dfd8fe0f5e1a4b6c38e26121a43eaf18f222b
SHA51252b7ec0f6e9595be59ea3866c71cb5b2f92fb18924bf6860776bc4e8512944bd11e663908c76796f7c18ad7f074bae11c58205b4c8fde750de7a6e88f850a9a5
-
Filesize
5KB
MD59d4055a18afc0de43f275f196748ec9f
SHA1b4078c0569d80c0020f658b727b877ebb0d38838
SHA256bb45a2069543808f0bb8ee15d46efb4476e7ec906b6999acc46f2e0453d25ff4
SHA512229d3e6481e0c1ea9e04c92c177c84380608fceb74f969b56c3d4e8ba2e3525103cdeb46ad1b6d9fd8dbeb4795ca503aefb9327f44af1b8e66a19723d85e621b
-
Filesize
567KB
MD5568f7447183c41c3c9263924e52a4822
SHA1e9e4b24af15d174cd9e3af989d3b3deca98725ee
SHA2565ebddc2b4757c9650a51531203ea4ca28b6a145cade7cc4905c6bc23ae62e88f
SHA512a3d155d5e92771652603a228e140b6aef029d3f99dd6d0da2a05c0d4dd42026dfbb6069f97e904bd6516d1a7752666ded8796f63dcb255451ccbc9a3d17d882d