Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe
-
Size
788KB
-
MD5
ef67f043e12affd778875c5d9c0c820a
-
SHA1
f373d48646ad50eb240ebe0bfd46954b7101b924
-
SHA256
bec763c6a2785dc6ccaee85ce48f958bcf1e6e7453752eb7e50cbf8c864c06ab
-
SHA512
aa5fb109f91f7b1fe53d86a84c2a6a2039b3b7df70bd4f070685151b364b16faa774d512751162b8a2c311ed47e132acc55502b06b0b47f284c1b544e2d77abc
-
SSDEEP
24576:aoS7J6ngDSrQZ2PvQ9QmQZyx/wff12XtHAZn:6IgW0IP49OZyxofiHW
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023480-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2776 GQTA.exe -
Loads dropped DLL 4 IoCs
pid Process 3056 ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe 2776 GQTA.exe 2776 GQTA.exe 2776 GQTA.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GQTA Agent = "C:\\Windows\\SysWOW64\\28463\\GQTA.exe" GQTA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\key.bin ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\28463 GQTA.exe File created C:\Windows\SysWOW64\28463\GQTA.001 ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\GQTA.006 ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\GQTA.007 ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\GQTA.exe ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GQTA.exe -
Modifies registry class 50 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\InprocServer32\ GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\0 GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\VersionIndependentProgID\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\TypeLib\ = "{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\InprocServer32\ = "%SystemRoot%\\SysWow64\\pla.dll" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\ProgID\ = "PLA.TraceDataProviderCollection.1" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\ = "Microsoft_JScript" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\0\ GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\0\win32 GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\Version\ = "1.0" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\LocalServer32\ = "%SystemRoot%\\SysWow64\\plasrv.exe" GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\ProgID GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\VersionIndependentProgID GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\ = "Afaxoq.Ipewokig.Iqefoza Object" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\ProgID\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\FLAGS\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\0\win64\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\Version\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\0\win32\ = "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\Microsoft.JScript.tlb" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\0\win64\ = "C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Microsoft.JScript.tlb" GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\LocalServer32 GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\LocalServer32\ GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D} GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0 GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\0\win64 GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\FLAGS\ = "0" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\TypeLib\ GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\0\win32 GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0 GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\FLAGS GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\ = "Microsoft_JScript" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\FLAGS\ = "0" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\0\win32\ = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\Microsoft.JScript.tlb" GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\0\win64 GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\FLAGS GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\0\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\0\win32\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\0\win64\ = "C:\\Windows\\Microsoft.NET\\Framework64\\v2.0.50727\\Microsoft.JScript.tlb" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\0\win64\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\0\win32\ GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\FLAGS\ GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A} GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\InprocServer32 GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\ GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\8.0\0 GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\TypeLib GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\VersionIndependentProgID\ = "PLA.TraceDataProviderCollection" GQTA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4BB2350-5936-EFF5-B08E-35A0CE943C2D}\a.0\ GQTA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DC65DC59-1100-43B7-39A8-D2AC8B511E1A}\Version GQTA.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2776 GQTA.exe Token: SeIncBasePriorityPrivilege 2776 GQTA.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2776 GQTA.exe 2776 GQTA.exe 2776 GQTA.exe 2776 GQTA.exe 2776 GQTA.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2776 3056 ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe 82 PID 3056 wrote to memory of 2776 3056 ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe 82 PID 3056 wrote to memory of 2776 3056 ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef67f043e12affd778875c5d9c0c820a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\28463\GQTA.exe"C:\Windows\system32\28463\GQTA.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD536400e746829504282eb26b364826aa9
SHA1d39ea9da98be0c331fd71002645f4f40664288a2
SHA256c7ab756437211f6e0e3dcd7482bc67cb910e504345902049eb8abe34a656deb0
SHA5125fe8fae2f5fcbd42c72cc8f6dd70aeec0afd94af5cfd905441630755790dc6ed346823ee009c21537b9cdb3b7b7a39eeed933606726ffd891dae47b60465f640
-
Filesize
457KB
MD5f34b87951e1a931e01df1bc9f1b98207
SHA1f3cc94e72bf7e9bf2afa7d8dbfef0ca2087358a1
SHA256e6cf7cdc5895da8a65f8c4a1a1d0d0583218a1c28f66d25dc56fa67f9c34ed5b
SHA512c2438d88489b9ed7c6c875ecde07411a488eac9115358c73f72d7029874f75803ebead03a41692a900648fb2b2be63b7c8b4e3a71984261185b6d5d6d7201641
-
Filesize
508B
MD593e225ad2c85cac2463e59b8d6c36e9e
SHA1a56fb48d99a22acfd4065c46d4af13cc73286464
SHA256a6b31d595b441495ac1d282854413d0c5584a2d33d3b7d89d75064ba636ad10d
SHA512ec4c159ba41ca46d9a138b046b8acbb3acbd073bc81e8592bb045e5a913481145b922b9cad63548131192e865b306d3d7a315a85d950a8c07ea1b5896506f102
-
Filesize
8KB
MD598d22fb2035a26a6b9b7decc0c0ff2fa
SHA143a75cf59fc2f8b59b1d962b4e685249eef816d5
SHA256fd5c03fd9ea47c1e820d19bd307ad7c4e53f4b65d288cb675b05cbe76c9b5c25
SHA5123cb7f765d6f4d1dc08a0087086f3fe243bd8ff9e699607cf1e4177892576665c0c799307751cba16fd3f1482e5abb884090024431be2ce86d4080f1d1134d91f
-
Filesize
5KB
MD515eb312db4b3e208b67082653acb8a02
SHA1b0926b1e1733baa3d7f18d3806916f92704fccff
SHA25672347b6d619bc7204a155486e4d09a62a4a494c35a8121349bfe2fecd5af99a8
SHA5127e8d451bc9d1e83615db15d6cdf68230cdd333fa38362979f0408dc80bf680859a2bc3fc09c494805731317b0f136c3227226092f1bcc31c2c80cb73071aa443
-
Filesize
651KB
MD5b181beaba4204ac3ce7bc8e6f0b74312
SHA14ab13763d2ecdf0968f15a39302aab2b1f0ab462
SHA256f36bad234fd1599dd1398d20bc57499314fe96d5de20074536067b2d3c2b4f2d
SHA512d1aaa2fd25e53986c8ea8213a8a02515927c9e9aa3e4d8077a138a29ba32c807ec81473b672a22ffb6ba26126ccd7e1d310e057ef964d3b21b1672a67af5fd7b
-
Filesize
106B
MD5c86a712d2ad5d8a676202a2076bb2759
SHA1187c84c3c0d24ff5c64c4faa0077f29116ee2369
SHA256d4ba8e5d0de6a6af149864416e0154218270fa9af4993f4d85f4ce2c9c107450
SHA5127fbb0e3aa72f5ed3669a93232fa9ba3630c5b17d01164aefccab5b143b7357d91be5fe556ba95b9295fabdafae855bcb8b4f9899b295a7ce94a91ee6d63c0dcd