Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
f69f1640e8b31b05990e6940c38a9c92
-
SHA1
8c783f9aaf00453892b98b29fbc8e7705719a6c4
-
SHA256
bc6a91bf685fc28ee79f3f983a7a0d5457a414fe329b427de920a07bbbd6f49d
-
SHA512
e16dcfb5ce2d48fb3c102fbeb12573d55df68d51b35c34658b2cb6d1ca990fd18c952cc27414bd7a75990d0a1c8788a1b7563af39bd6ea5be0fe9136cbf9f590
-
SSDEEP
24576:yHvZT0U1eGwNqdkrvYXz4klAiNIpjA6z0QOTdGg5X/5INo:SBTHFwNqdkrgXzPW2WGQOxpXR4
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234e1-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4752 LYJ.exe -
Loads dropped DLL 1 IoCs
pid Process 4752 LYJ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LYJ Start = "C:\\Windows\\SysWOW64\\ATUHFQ\\LYJ.exe" LYJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\ATUHFQ\LYJ.004 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File created C:\Windows\SysWOW64\ATUHFQ\LYJ.001 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File created C:\Windows\SysWOW64\ATUHFQ\LYJ.002 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File created C:\Windows\SysWOW64\ATUHFQ\AKV.exe f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File created C:\Windows\SysWOW64\ATUHFQ\LYJ.exe f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ATUHFQ\ LYJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LYJ.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4436 POWERPNT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4752 LYJ.exe Token: SeIncBasePriorityPrivilege 4752 LYJ.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4752 LYJ.exe 4752 LYJ.exe 4752 LYJ.exe 4752 LYJ.exe 4436 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 460 wrote to memory of 4752 460 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 82 PID 460 wrote to memory of 4752 460 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 82 PID 460 wrote to memory of 4752 460 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 82 PID 460 wrote to memory of 4436 460 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 83 PID 460 wrote to memory of 4436 460 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 83 PID 460 wrote to memory of 4436 460 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\ATUHFQ\LYJ.exe"C:\Windows\system32\ATUHFQ\LYJ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4752
-
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\arriesgate.pps" /ou ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5cf23edb3a9119bbe6fd1ad01244f3a00
SHA17f316eceb5ec656b2535f4d60c30cee5fe7267cd
SHA256c6f7a992e1cd53c9bd0cfbecbfbcee7a1e81728634bd9a294ed70f2046760202
SHA51268fc44ebe13a79782082b482143c82dcc604818087a4c42ac43d3e02de1fd2a60e898fc72b15703544d966309593d20e4c68af11953e155e8f8b8239b87c28ba
-
Filesize
461KB
MD57e335c1258740a5798c2b3eea5a97229
SHA16ce1e98ddc05a4b9e772901c9bc6caae4103267f
SHA256667ab5d791b89216a46f7dd3a1bcb9b7e5f235415a74a9678ca41cec051c462f
SHA5128c190dd139f5459a91c81871f53fc080a81c6397c68cb5b0ee195571012cc8af923b10cd77301da1816f935d36a0587d1c75126f5553005a0f50eb22d3441cb4
-
Filesize
61KB
MD59fca42b7fa3132ded471b886c4bf8a51
SHA186109ac13f8b63bd3467bbf05e39c5cf9bd11d26
SHA256c519bcfc50245700b30cb417478b46810443b03a6447387dd1d0a13966ff00dd
SHA512bbdd590e1bd2971fbc6a462f6501341c0808d658ba3407b051f9d299d9babf0632af092d64c6ad290d4ae5d9db8c367898a064bbea916c516c0a54066ad698ab
-
Filesize
43KB
MD54c30b3e90b3da5619bc0d5f53c025135
SHA1829f487b7c26f6cb8b7f211b2331abbc5229aa61
SHA256b632cedab7ce3d19eebc0d31864dc8c38cd249dcbde299cda818f7026ec294cf
SHA512fd0b36fb43c6b62f6d47455b392276d4e3710b204ef11c70cefed417740a4b5d9357ba37f612f3f87d539175af312ead05bc7a4360fe3e26fd43c56e856e6313
-
Filesize
1KB
MD508cd81bfb032afca0de47eba2065963c
SHA1edea4349eb6946c145133945025b05ab1e1170d9
SHA256d869cfa840b3f3f5b7a3794b2967388eb594783539a79a99b0ca6ec359b3caa0
SHA5129c4603d6f260613660cc898b693dc036ca180fc290172f4355e35b4f77f79b58a44a8e9af88601ef9d45bfee8aef8b9aa9d89c41d87d61aa41c807f2b872d3cf
-
Filesize
1.5MB
MD59c28244f2dbe3a4758b532838b0040c9
SHA14b58bb4033d43ae64af6c18db48d5d25e23f6121
SHA256cb770745d547a27a4b99fdbe27a672135f812b29d94fd2b843d06bb5aa1748aa
SHA51224ed3d4c6aae307a0f1bb1f063b211152644b06d7425a5fe24b09f5f747dd63011451cef3f47cc4985b3316cf1213c056d38768ccb7f44cb2fab28cf4e30e969