Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 22:59
Static task
static1
Behavioral task
behavioral1
Sample
10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
10d45979874eb4499795d8a1e51f2836
-
SHA1
ed0a03845121cb397433226b5ef218b9291f8ea7
-
SHA256
02d47750c5216e8511202b46db7fd20dfff9c81b6cd15ceef93ee301702cd3f2
-
SHA512
de3809c38484ffab72fd3bbab0b1c5e5223e16ccd9da52c300cf3e1b37842a6845cba6137f7938138e477eddc696d156b47a679215b439b34c20fd04fe73b1bc
-
SSDEEP
49152:sygCp6HtAtYNox4cdbTPieMm9aJAesm5eYfUBrwAqANA+IUSGLE26Jd:s/Cp6HtAtSof79KAesmkSerqAKFGo
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234a6-12.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation system32QPSS.exe -
Executes dropped EXE 1 IoCs
pid Process 2556 system32QPSS.exe -
Loads dropped DLL 7 IoCs
pid Process 868 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe 2556 system32QPSS.exe 868 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe 868 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe 2556 system32QPSS.exe 2556 system32QPSS.exe 2992 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32QPSS Agent = "C:\\Windows\\system32QPSS.exe" system32QPSS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\system32QPSS.001 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe File created C:\Windows\system32QPSS.006 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe File created C:\Windows\system32QPSS.007 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe File created C:\Windows\system32QPSS.exe 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe File created C:\Windows\system32AKV.exe 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2992 2556 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32QPSS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3496 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3496 vlc.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: 33 2556 system32QPSS.exe Token: SeIncBasePriorityPrivilege 2556 system32QPSS.exe Token: 33 5032 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5032 AUDIODG.EXE Token: 33 3496 vlc.exe Token: SeIncBasePriorityPrivilege 3496 vlc.exe Token: SeIncBasePriorityPrivilege 2556 system32QPSS.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2556 system32QPSS.exe 2556 system32QPSS.exe 2556 system32QPSS.exe 2556 system32QPSS.exe 2556 system32QPSS.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe 3496 vlc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 868 wrote to memory of 2556 868 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe 82 PID 868 wrote to memory of 2556 868 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe 82 PID 868 wrote to memory of 2556 868 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe 82 PID 868 wrote to memory of 3496 868 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe 83 PID 868 wrote to memory of 3496 868 10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe 83 PID 2556 wrote to memory of 2800 2556 system32QPSS.exe 97 PID 2556 wrote to memory of 2800 2556 system32QPSS.exe 97 PID 2556 wrote to memory of 2800 2556 system32QPSS.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\system32QPSS.exe"C:\Windows\system32QPSS.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 10683⤵
- Loads dropped DLL
- Program crash
PID:2992
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SYSTEM~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\ghn_0001.wmv"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3496
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3dc 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2556 -ip 25561⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d1e6a3b3fec7d6f1d0db1bc02da26d93
SHA1d7da87bdc09c38836cecd0844bfd587172c076f4
SHA256bca04b3b3b4b8b416597ecd653056ec98f88e16a57ef64f2143b09ab892a3730
SHA512327def77c38f293c4e8b4f20a3380bc7c5ba5b72f2431b20f67cbaeb2a4d11c2dd9493e477d36de88d75cf185b8fc2936fd6eee3cfa9bcd5620e0fc054f232f8
-
Filesize
1.9MB
MD58273c4435bd0bd5d1c5dd6e1094e4a64
SHA15556e60360bc2311ae8e1f3b3742a3be74076c99
SHA25668b7b3d76f05e996f4c645a69dda8233114e7366b9a324f7d8a3e01f634a92d1
SHA5122f8d49cbb11d9692d8b2b2f5dc80b051e6d938fe4b8f287447572df4a73acada834f464aae0169033862c0ee703e058d2f9c30db4f5ddfb99fc29f63f7810e27
-
Filesize
404B
MD5466dac75e7a23d24d2a284f59d72cec5
SHA17e3541a7688937d4a67691a1e8d7470ba79fc998
SHA2568a880ed186650af7c01d18cfbed4ce7af88c2a2ecef8ec221526dbe85fcbca14
SHA512eb7613536b565a2bcbf2702e83f0b06d398c5dfbbde915969716424719193710ae2e8088130a98d43c2104e74458e5f714a648c586208603a80d9ac0def857d2
-
Filesize
7KB
MD59bff554f06d83650594d29c02ff22490
SHA15b00b436753479c29403b18256d1be009134f920
SHA25637dc6bab558f611dface5ee2d0cb73f078f1b850de80f4bc5c1e4ebde024c693
SHA512eb98be1e1b86acbe8d36542a42ec73f2357392ece2bca103910be6f5c06b5fbb3b8639cf4b8da03ccf284f09dffece1b12e2882f6f13c5d17ca66a8560e7e572
-
Filesize
5KB
MD5b6f12dd5978a40f15490b637523b0207
SHA1c2a9ae1415e61f59ceaffe91bb5ccde499bcfafd
SHA256097124b7451b236ec652f964aeb3a06a8caf8aa8763db37cc1db16ab91dffe9e
SHA5125baa4a7641cbdd5e6a331f1a5d753ae3d5a2b8e64a6db21ac475176b0d020e6cc79c5ef83fb35003612976d39fcabc3786e46a1b36ca6f91a614995e50c37795
-
Filesize
471KB
MD59db739b6cc6f87cc09aa60428f94551a
SHA1f8dad673918a9f342a90d8c0221423c90ae35fd7
SHA256050dbbfa127d4db9f3fdf7efc1961dc2530a5affd1921818c053d7aaa07f1eda
SHA5120f410d81d92dbeec6bbc17a3f6e296bc8e96544b45e7ca2209d832bcdce1b3993c43c1f1298d77bb03eff94bb0c27a7cb950d599a6572a2e4c929400edde5a2d