Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 21:06
Static task
static1
Behavioral task
behavioral1
Sample
25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
25713456cd39bef8601f473fad4c81d2
-
SHA1
bdb37f5e6cff9dc92996afa29093826142dfd5ca
-
SHA256
af6c02fb621efa3d6294d13a090c7fb2024510cc73bfe1aa0959255adc84b0d0
-
SHA512
ff6e80850b3e84acb25c9488cccc9d26d8c2023a06fb81b6e05b41b714e335a06c51a7e7423ae41db50880f40d53ef34ab1929696e4ae15a70ba471b7c90af84
-
SSDEEP
49152:PoTXyVmmSjf1OjSSywGOBSKh1D3n1pHdLHRMZvmL8OfrcL9s6Kpedop8zcTy2ray:G8rSjfk37XTnNjRqvROfrAQpQS4H2r8G
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b62-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 3848 AEA.exe 1616 artmoney737rus.exe 3692 artmoney737rus.tmp -
Loads dropped DLL 3 IoCs
pid Process 3848 AEA.exe 1616 artmoney737rus.exe 3692 artmoney737rus.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AEA Start = "C:\\Windows\\SysWOW64\\AFTDRK\\AEA.exe" AEA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\AFTDRK\AEA.004 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe File created C:\Windows\SysWOW64\AFTDRK\AEA.001 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe File created C:\Windows\SysWOW64\AFTDRK\AEA.002 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe File created C:\Windows\SysWOW64\AFTDRK\AKV.exe 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe File created C:\Windows\SysWOW64\AFTDRK\AEA.exe 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\AFTDRK\ AEA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AEA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language artmoney737rus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language artmoney737rus.tmp -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3848 AEA.exe Token: SeIncBasePriorityPrivilege 3848 AEA.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3848 AEA.exe 3848 AEA.exe 3848 AEA.exe 3848 AEA.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1888 wrote to memory of 3848 1888 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe 86 PID 1888 wrote to memory of 3848 1888 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe 86 PID 1888 wrote to memory of 3848 1888 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe 86 PID 1888 wrote to memory of 1616 1888 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe 87 PID 1888 wrote to memory of 1616 1888 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe 87 PID 1888 wrote to memory of 1616 1888 25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe 87 PID 1616 wrote to memory of 3692 1616 artmoney737rus.exe 88 PID 1616 wrote to memory of 3692 1616 artmoney737rus.exe 88 PID 1616 wrote to memory of 3692 1616 artmoney737rus.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25713456cd39bef8601f473fad4c81d2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\AFTDRK\AEA.exe"C:\Windows\system32\AFTDRK\AEA.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\artmoney737rus.exe"C:\Users\Admin\AppData\Local\Temp\artmoney737rus.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\is-HJMIG.tmp\artmoney737rus.tmp"C:\Users\Admin\AppData\Local\Temp\is-HJMIG.tmp\artmoney737rus.tmp" /SL5="$7003A,1295646,50688,C:\Users\Admin\AppData\Local\Temp\artmoney737rus.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD50fa3b3ed73dc061a9fcf18a1bcbb0b09
SHA14c043c15032a05205a3679f0af4ce4e6a6a60e65
SHA2567ff638f38570f16e927b326dbdd4c160792dc07436035e9433f6e43c96c5a139
SHA512d5edadeeebb45f9a9c0cdae918df277c2842cc42d8add81ee265459c842714dfbb6dc313baca0bed3606197c31e511ed0021dcff84985622fdbe3ef5fdafb98a
-
Filesize
666KB
MD5385aa258a917e2085d16b8477fe7685a
SHA1897d73efffd1c3601cdb4db4d0b747fdaf1b39f2
SHA2565fc2a69c35f5ef706807d20f570bfaf04f03173d50391fe3210d3a46b554cd41
SHA512a244c2beebcffae1cde9c7dc3089a98d8414512a6369f25190e3e869f37a9e87278eb790142fd9f2b998b431d80bcb7071d1fb28eba6e96980908ee9ecd867d4
-
Filesize
61KB
MD57a5612cc859be918c5767487f8a6815a
SHA1a855d3a3e6336ac0508a8099e8ace14680394c36
SHA256643419bc7e3a46ecdd7196858b3489c806c5edc486b513ce58519a109544c9d1
SHA51231c541870dbc695c34d132c4232accc2fe511f30188a4db33d5c41758cf5af00a4906b55b0a208b5848436313fd3d8ccf6be7f1af62ecedd3a5c4c301dc5e11d
-
Filesize
43KB
MD5b2bcd668abf17ee408d232cc636614b2
SHA1c354f941121515536c4f0d9ae49ed1a9b28534b4
SHA256563f5e99f0beb961ecf6a8284bf41fee3e85d6f63cdff1669438f5a2168bfd99
SHA512ba1be164de5919ae45f4bedfebe7e7799626b457f07b42fc43b8912f2932955833617b45e147e2e4d406f57f57f50c1869aa611db18a569919395e42fa53a702
-
Filesize
1KB
MD5942ceb1f859c7c1de714aa9ab0110a0a
SHA1315536015ff280cbbf0c50b32483db4bba1c4e6d
SHA256397b063658ac1570f9197c98570940d6df37d8d39f40dbd3f3f0f2ddbbc7821d
SHA512188bd7ad4c8cecd424ab231566119043a1eb6906efdcd944de3fe74440f60fad0b9bf1cbde01de9454ed99b2185dc284b91f0ce2309894585e1fcbcc05e9285c
-
Filesize
1.5MB
MD5a9ea3f61a57b36cde9953afd91f18d34
SHA1e7e931b96b6e39b64a2a38d704bbe9561a234cbc
SHA256accbdc6de9b6b671e6dc5bda9f1f983fbfcaa07467fbf6eabd25b9d5314d82ec
SHA5120a6a42a772a3afd66233d9d3abb962b3a8cbf3d6e0e719352795b6441a148617dbe788991f0cead29d4b1540726504c9c56bebd9836ae6263b82a121fafd89fc
-
Filesize
466KB
MD54c5711d8a02899113661bdff195d80d5
SHA1263592abea6d60887defb4b1bcb47dbb383edfb6
SHA256661eee852ace18c0fe63548e3ca276866b40dd0dce722f67976b8c4bfdb92195
SHA5124b16ee6c75a169ad02c6b30d08efcd969ba8840adf49f6eeec3abbe8b9f5f288e1b1cfb4431711a74510a6973663335e43d256ae0dcd1a68f55331152a4f64ae