Analysis
-
max time kernel
96s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe
-
Size
532KB
-
MD5
ee283d674ae8de144068cd0b9ef7086a
-
SHA1
c8d424756c68b15a5a6788ee483a88f19630f805
-
SHA256
9229da6021d04533beea427cf10ffdee55149b361de738490e0289897cd0e300
-
SHA512
259b89197f661177ab0e099b266d33e4fcfd85cba3359ab7af1a98d9543bebf7fcc0cf82523fa9e8ac2f8187c6afb1fdb64d00c0488a9cceed1019e57172d528
-
SSDEEP
12288:e2HERy63FIoJJiA/h0dlI8JZRaV4cSj7Gqqfa:RcxqI8JeOxj7vr
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234f2-12.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation LGSL.exe -
Executes dropped EXE 1 IoCs
pid Process 916 LGSL.exe -
Loads dropped DLL 5 IoCs
pid Process 2216 ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe 916 LGSL.exe 916 LGSL.exe 916 LGSL.exe 2708 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LGSL Agent = "C:\\Windows\\SysWOW64\\28463\\LGSL.exe" LGSL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\LGSL.exe ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\28463 LGSL.exe File created C:\Windows\SysWOW64\28463\LGSL.001 ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\LGSL.006 ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\LGSL.007 ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2708 916 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LGSL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 916 LGSL.exe Token: SeIncBasePriorityPrivilege 916 LGSL.exe Token: SeIncBasePriorityPrivilege 916 LGSL.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 916 LGSL.exe 916 LGSL.exe 916 LGSL.exe 916 LGSL.exe 916 LGSL.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2216 wrote to memory of 916 2216 ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe 82 PID 2216 wrote to memory of 916 2216 ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe 82 PID 2216 wrote to memory of 916 2216 ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe 82 PID 916 wrote to memory of 5108 916 LGSL.exe 95 PID 916 wrote to memory of 5108 916 LGSL.exe 95 PID 916 wrote to memory of 5108 916 LGSL.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee283d674ae8de144068cd0b9ef7086a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\28463\LGSL.exe"C:\Windows\system32\28463\LGSL.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 11203⤵
- Loads dropped DLL
- Program crash
PID:2708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\LGSL.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:5108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 916 -ip 9161⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD59dc64557fcebd521ca4b267da15c2914
SHA1c2247f9e0f0c8d11c7b9ab93f43ed53943d0bdd2
SHA256a49cb9cbab2a60418b2079d4110123682fc980bb6b46ac5ada144797b5fa2cf4
SHA51200241a139ca307c5eb4d89fa8b6296833961091286282c3482746e4a3589ef61e6d007edb6aa6fa1ef812d57bf63a8e495e0db712e17decc77bbae2490cdbe01
-
Filesize
394KB
MD510e53b4b4502bab5358837983b15d83e
SHA12845bb0d6667be127bab7676b6800994239850ce
SHA256e91b458384ad38f5e81766bc7ae213025f27f30c69b72550731159aa60d62910
SHA51235b2071598af5840ed0843e39f81b778660310725975c2b2cc8cd20ad37954bea04c4a2f173cdaffa467e9585b7f573b99fd444f659d11360bd7a8219c851cd7
-
Filesize
504B
MD589f3e61d13be01b096732af2a7507f01
SHA1100a26f586d33234412c267706b72e17bd6d3a18
SHA256120a8fe9c5f7f005c66f83b774cc904c2e4d38acd0a23e319463e4ecb88d6080
SHA51278137b9bd42ae43020182cc4ae5ecabb250ee5efb5856cba0b3f237205f4598998febdf75b916217944e3914d90012d43e2138343f6ce5f52502c623e2163247
-
Filesize
8KB
MD586d96c93965255cef35ca42413188b75
SHA19d77f203267febe047d049584e5c79f1c1801b2d
SHA256b796bd1f5cdb1d1db91c3aca1ac700c015775b9caf2725fbf4b6089a096f21c5
SHA5122db81080a16494ec549f4f39ee382580ba12cd5cbfe31632c8459ba94d767ce1ad3e9c0e6643f80530ae5e316fc42dca05708eeade7ce3c0341d669325cdb095
-
Filesize
5KB
MD5b73942c11844487ca7fc3e78062c8abb
SHA128f4c4159528ccbe9d83b5cd5e157861d11ff04c
SHA2564ba88f8964ee02a395d88974fd43b05610cf520b4ab40f36b3f98715ce1e0984
SHA512d4c782f5abd91b3396b243345f968eb5a705a7aefeedf92e62047309f7ccf223c0825623c184de66e3667c22eb371f0329be97ea70f6d72b54f98b22042e1f9c
-
Filesize
472KB
MD5324154483b20e6f67a3c1486e3fc7c6a
SHA1d6630eb1d8555b48413434b4a5d54c8de819cbf8
SHA256ded1c934280294375d7b926773511e4d5e6c8dbb22b0dd25a80a6b0b3af065d3
SHA51236349f7c53b9989eac63e8c91b7fb009a5a0dce934242ae5956a5e3d3764949a87296adeba81f3da96b5e035f3755b4dd75de2ffa211b7db296313c52f6d478b