Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe
-
Size
273KB
-
MD5
212f470ff29e79332f622b7417b6795b
-
SHA1
db26c7ffe58d29725f00abe8f4b2e464b1a875d1
-
SHA256
e4764c8c8cfb26192cb174f1d9405fb27981f171fca54dc358b3f1aca8578ad3
-
SHA512
914bb8b77888852faa2c96f9a24ae9d2c178e502e1210f9e87a3330fcc2bf58b1a4548fe70db002d69b97e5ec936c8566f09e3956e9184e1a6e900caccc2a9cd
-
SSDEEP
6144:4rQ6NkJpBTqVKrjNNwR9h0DRINA9jxJ1ba/SqDUvayw/:4rQZJpE+Aw71QDUC5
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023be6-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4228 BETG.exe -
Loads dropped DLL 4 IoCs
pid Process 2452 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe 4228 BETG.exe 4228 BETG.exe 4228 BETG.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BETG Agent = "C:\\Windows\\SysWOW64\\Sys32\\BETG.exe" BETG.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Sys32 BETG.exe File created C:\Windows\SysWOW64\Sys32\BETG.009 BETG.exe File opened for modification C:\Windows\SysWOW64\Sys32\BETG.009 BETG.exe File created C:\Windows\SysWOW64\Sys32\BETG.001 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\BETG.006 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\BETG.007 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\BETG.exe 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BETG.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4228 BETG.exe Token: SeIncBasePriorityPrivilege 4228 BETG.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4228 BETG.exe 4228 BETG.exe 4228 BETG.exe 4228 BETG.exe 4228 BETG.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2452 wrote to memory of 4228 2452 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe 85 PID 2452 wrote to memory of 4228 2452 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe 85 PID 2452 wrote to memory of 4228 2452 212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\Sys32\BETG.exe"C:\Windows\system32\Sys32\BETG.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD52bbb6ffc878515a79478917c5af03a9c
SHA152532ea393f3a623c05b2cd72a205da41f152c29
SHA25623c8cc69783ab663e036fb0d15c01b3863ff898d5534fa1d02f16c291863f3a5
SHA512be8846674af43f20501e6fe59fbd369d7393e79970ab1a4fc7c516c491939f575c5e07a1cd284287e8663d1ca2f4e6663839a79f798a7453ecd30bb0fbdcc464
-
Filesize
1KB
MD50a0dcefcdf5e8431961dc6461a430e63
SHA1f024475f917667f6f44ce6b7275ab67d386d8c64
SHA256d0c2387f31c03a6593ac8151143aed4fdfcf9cfe4708f9444cc0ac00f25dbcc5
SHA51227b2b39ba903ae86312540e9fb7c575e3527e0a197af98badb16b996527ac4aeb3e9d99b32231b18c8176629a469932b90567c3744ddce115c7e2480ba3aba4a
-
Filesize
502B
MD522f7a14dd559a3fd9835ecbe097468a3
SHA118b1f4febd480e6a808276c33e38db7ce25af287
SHA256ad313e3df9398a096c21cec9cf814936dca1e2f492fb05513887649f07f19144
SHA5126e58f86cb3f9bb9d21c75f78a78259338ab757b6a232f235b1df8eb8d3e585c85c05a55fe38e629eb789329f94791a6e8eabe78f79ca3c1844e858583212ee0e
-
Filesize
7KB
MD5a08026db7b86f2ba69f6317a4a66778b
SHA16afe5979a1ef3ee8b94b6ef4a6bf8a70d641bf62
SHA25690c1300aaa05d24a32f9d01824c611742a10c2bb3e0450504b62282ab658e2f5
SHA512059d6abdb37800f7673d116a0e9a4d2f3e8e7d955a402ef91ca97cf24f3c29121dc36c54599511ac0e04cd2b1467e30fb7b2563e42e2fe43e71560816902207e
-
Filesize
5KB
MD549e240cd2e8fe880e177e208aaf8feea
SHA154e9ee5a7523148542113ee654f00ea13d3ca3d7
SHA256f1b86ba7a2c3aa753966cc67bc5efb4e4badb670b6a0e56ffcfdcbbc379108fc
SHA512e92efd1d0ab3249d6c93b32af0885e22726421055bff36dcf64d307ef2f8aaf2dd06c221342bd5e2a1fadb5d61ac284cd39750cdf1134fd530ba9ff1744d965f
-
Filesize
477KB
MD5db4d88b22f173a37c34477abeea6a789
SHA111c42d2d445c01a408ad947d48927fe2b370aa8c
SHA256251cd62057ee822ad0139fddadd88945ef0951af715eea17ac5faa4b25e17a55
SHA51267501ecf3b474536c3ae0cf68d49672b108b3b509a229f2a8bd4126e2f67228c93e2bbb78379de7dac3bbff6f7495d1d1aeffebb3fa5f8c7a0e29eaac4bce23e