Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe
-
Size
518KB
-
MD5
dfc4076522186734ade1c2ba0ec32173
-
SHA1
a1070c204de5ddd2e1a9cba8e469bd03b0bdb78e
-
SHA256
bbdebf1bc2604098084adff16cc1765bca064e8788c0e048d80fe721fb5456bb
-
SHA512
f66c8e543f3cad56de65db016abb1d83b013acc3b397fe5d205bfae1fa500d3883ca30ea2ba8b4ebe661f43bde39adc9af05acfa7f79e122aeeedcab476c1f52
-
SSDEEP
12288:2IovIQgS6mIUP27DOhm3Os/CXL3+4rATWu/EAn8EGm:65gS7IU+nOFP+4skA8EH
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002345f-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 VMPP.exe -
Loads dropped DLL 1 IoCs
pid Process 4988 dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMPP Agent = "C:\\Windows\\SysWOW64\\28463\\VMPP.exe" VMPP.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\VMPP.007 dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\VMPP.exe dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\VMPP.001 dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\VMPP.006 dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VMPP.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4988 wrote to memory of 2316 4988 dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe 85 PID 4988 wrote to memory of 2316 4988 dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe 85 PID 4988 wrote to memory of 2316 4988 dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\28463\VMPP.exe"C:\Windows\system32\28463\VMPP.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD519cf467919727d52844f6526ef495371
SHA1107b53f43c923db816c3743896cad71b3795ad5c
SHA256e75ac29f8ac2c921ad6bebc70e53eb462ba2860aca514d9a3ef09ac49007b5b9
SHA5122cd6093b1b78670f1e6ff074de818acaceffcbf94a32d6875c1e42fa980570cf9f3f3d7de53800111503bf7a505fd7b238170095158c5c7bc631781e02ce2095
-
Filesize
458KB
MD5b32fec1ef63f9c2c4c2eacdf439163ed
SHA1541f11ef53115aeb1ee214beb505a7254824de87
SHA25615e4d7edda2c9e41794d7cdf43c735604fbe4c4e7135a9b5efd58f9825d2e078
SHA5120af6fb805634944ead3618617887581d313d4817e26a9990271bfd6f615387ceb31ffa0c4145ce9b59cb3bfe6fdb3b8224f2230e552581734d26e15a79a63a18
-
Filesize
472B
MD573edd637ea7208042f3bd5254d457ee7
SHA1076ffd77495a5741a3a7bef24280fd5c6ead5994
SHA25609d0238c895fdf989fe753a1ff8274a20f23a1b87d214666d4d26748421a0431
SHA512a806c50401124b5c886e35137863e6714f8472bc7fd0467f0c1373cd1d806f377c17b112d37e540fe892d3e3931c62716fe395ec53c260a3c53b9d0edee0f845
-
Filesize
8KB
MD59a45af5044d301aacf2928ea47cb3b6a
SHA135bfa3bd42dfd0a1cf97a56d992a3ca47577bc9d
SHA25671b69ce0cfaa58eb4c9742111b2dfd8fe0f5e1a4b6c38e26121a43eaf18f222b
SHA51252b7ec0f6e9595be59ea3866c71cb5b2f92fb18924bf6860776bc4e8512944bd11e663908c76796f7c18ad7f074bae11c58205b4c8fde750de7a6e88f850a9a5
-
Filesize
5KB
MD59d4055a18afc0de43f275f196748ec9f
SHA1b4078c0569d80c0020f658b727b877ebb0d38838
SHA256bb45a2069543808f0bb8ee15d46efb4476e7ec906b6999acc46f2e0453d25ff4
SHA512229d3e6481e0c1ea9e04c92c177c84380608fceb74f969b56c3d4e8ba2e3525103cdeb46ad1b6d9fd8dbeb4795ca503aefb9327f44af1b8e66a19723d85e621b
-
Filesize
567KB
MD5568f7447183c41c3c9263924e52a4822
SHA1e9e4b24af15d174cd9e3af989d3b3deca98725ee
SHA2565ebddc2b4757c9650a51531203ea4ca28b6a145cade7cc4905c6bc23ae62e88f
SHA512a3d155d5e92771652603a228e140b6aef029d3f99dd6d0da2a05c0d4dd42026dfbb6069f97e904bd6516d1a7752666ded8796f63dcb255451ccbc9a3d17d882d