Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
edc19b98b1fcadabd7e50373e08793a0
-
SHA1
9162a45f137b9a6d82bba7739eeed417db90a413
-
SHA256
287597cd753fb2bc0daf071f6d746f2cabcbe1da2a4676d720caec50893b8246
-
SHA512
4d6113756512e535e9d968a089c07d6768e9e67a5859ca8ae60b999f23a6c93330bc752f105e82b456567cd8996b05c5fbc3bfda8b64243cbe4c97036c7ad95b
-
SSDEEP
24576:tZxTwAlBpQOoZdtneEcYG2EbNGTVyuk5/4dfr/SwTCPs:tXTwEoZiY4NMlA/4dfewT
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234cc-8.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation XWU.exe -
Executes dropped EXE 1 IoCs
pid Process 1644 XWU.exe -
Loads dropped DLL 1 IoCs
pid Process 1644 XWU.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XWU Start = "C:\\Windows\\SysWOW64\\VPYECO\\XWU.exe" XWU.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\VPYECO\XWU.004 edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe File created C:\Windows\SysWOW64\VPYECO\XWU.001 edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe File created C:\Windows\SysWOW64\VPYECO\XWU.002 edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe File created C:\Windows\SysWOW64\VPYECO\AKV.exe edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe File created C:\Windows\SysWOW64\VPYECO\XWU.exe edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\VPYECO\ XWU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 1644 XWU.exe Token: SeIncBasePriorityPrivilege 1644 XWU.exe Token: SeIncBasePriorityPrivilege 1644 XWU.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1644 XWU.exe 1644 XWU.exe 1644 XWU.exe 1644 XWU.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1644 1308 edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe 82 PID 1308 wrote to memory of 1644 1308 edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe 82 PID 1308 wrote to memory of 1644 1308 edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe 82 PID 1644 wrote to memory of 4496 1644 XWU.exe 92 PID 1644 wrote to memory of 4496 1644 XWU.exe 92 PID 1644 wrote to memory of 4496 1644 XWU.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edc19b98b1fcadabd7e50373e08793a0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\VPYECO\XWU.exe"C:\Windows\system32\VPYECO\XWU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\VPYECO\XWU.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:4496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD5a65c554c77c4607a4efdef07b9503fb9
SHA14faa215bd772deb3223dac1601972fce2f6c05f1
SHA2567d32aa95d682ac91df6efa4efc01e5675f69e72fc9821632006111df44e08d7c
SHA51244be9403aff24e3bdb886a883b7ad8fa06950d969ef1588c4dab43fcc030768d4797fd4ce645ddfe49949d6a97fac5061f2d840ab086b5e43189e5adb441438a
-
Filesize
61KB
MD55901282271c72b6effd11d0ec9c17547
SHA1729945fc0534bd5203dbe02b2dcdf33d0edb84e1
SHA256395e86709d918c7954ee97baaa34634ede86a2af233ac175c15ae3107f2e9a28
SHA51205e92fad30ab5d89ebb6eb33fdc76ef9575dbf4c7d649782fd902010a11505a7499b38a4aceccf46e5f8b31617b730a0436cf821442b59dcdeec71ecc2a90a17
-
Filesize
43KB
MD5c04e0de732e8f56b401e409c4417149c
SHA17b260b3600345fb72af9fd0e4025b4a125c8dd08
SHA2560d359c2c70001f56c14e7e29a12456c82606bb9a46f9db1f8216a9087775dec6
SHA512d9e2bf02bcb144a8c37e05cb2544ca46fe93e1f2b5a4e08832d533ab9348ddb9153b5c36efa4186d625a80af5d546331d740a13f43c5195ccb4829c98eaa69b0
-
Filesize
1KB
MD5889dff204d11d99d677b9cd7d3750693
SHA1f667dc5a95c7ee9116447858da704ec7ae40b383
SHA256059e2b8f498cfdb280d26bd0184a7d973e4bfc9d5e18d94122c419f1cb6079ff
SHA512d5cbf683f73142492378af34961b28ae60dcf87049d72a795e13e06c9e88f9ac510009e31ff653ea0a5a2caf2cf719bb4e05362f2e28207e4cd946bf4060b212
-
Filesize
1.5MB
MD582dc38922620ab6a5850f391584d2657
SHA1ef30f091ff7aa242600f19e87f2b7b0cd7b0764f
SHA256b464e42b8dfef6629030283e19c20bcc69d6d7c1bf9bb7e8df472f762debcea2
SHA5124ec72c1d1599721ee1205f46a74a71fb67801e4d7aa6ca55907c2461a03c41cc3e1333e0b4ed9631b92e2310f45bf27cf865a5cc7ee2507e92f58cdb467023e8