Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe
-
Size
537KB
-
MD5
2add35a7d7aacf40f18eed6686986236
-
SHA1
6c2756c45c67bb453a699910d5328d114b2036f0
-
SHA256
ce3a14b420e511b4fb745c2e0d30dfbc2e7425f89ad9ec9e6955eb8f424a44fa
-
SHA512
a0c169d0503037193b534d05cbb2e1b7f9a143976b7893ac6d35cdf1d123952304e1b085c1ab725102fae787c81559ea6ef32c78d1aa793768c48be712d54941
-
SSDEEP
12288:IIMZIrjSacyH/xFgtlyDvjg2aTuVmI7mSB7hFq:XSacyfrMyDLgBuR7Jjq
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b87-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5028 HUAV.exe -
Loads dropped DLL 1 IoCs
pid Process 464 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HUAV Agent = "C:\\Windows\\SysWOW64\\28463\\HUAV.exe" HUAV.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\HUAV.007 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\HUAV.exe 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\HUAV.001 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\HUAV.006 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HUAV.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 464 wrote to memory of 5028 464 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe 85 PID 464 wrote to memory of 5028 464 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe 85 PID 464 wrote to memory of 5028 464 2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2add35a7d7aacf40f18eed6686986236_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\28463\HUAV.exe"C:\Windows\system32\28463\HUAV.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD519cf467919727d52844f6526ef495371
SHA1107b53f43c923db816c3743896cad71b3795ad5c
SHA256e75ac29f8ac2c921ad6bebc70e53eb462ba2860aca514d9a3ef09ac49007b5b9
SHA5122cd6093b1b78670f1e6ff074de818acaceffcbf94a32d6875c1e42fa980570cf9f3f3d7de53800111503bf7a505fd7b238170095158c5c7bc631781e02ce2095
-
Filesize
458KB
MD5b32fec1ef63f9c2c4c2eacdf439163ed
SHA1541f11ef53115aeb1ee214beb505a7254824de87
SHA25615e4d7edda2c9e41794d7cdf43c735604fbe4c4e7135a9b5efd58f9825d2e078
SHA5120af6fb805634944ead3618617887581d313d4817e26a9990271bfd6f615387ceb31ffa0c4145ce9b59cb3bfe6fdb3b8224f2230e552581734d26e15a79a63a18
-
Filesize
498B
MD5b43fdb51d8b4cc0de41eefb1f8922c24
SHA1b53f06d5a6a1c9c66d8102799c88351916243e35
SHA2562658cd28ad1e9e0b9011bea2d72daa74d0d8a984f906123677121bdc35d0b2b1
SHA5129bdc4c2578058c5226020f47d722d92f9bb34cb1bd5181d305e3b06c361b68a502ccead8a32110c10192a0000dfca68a81c43365363d812788ee88866ef601e5
-
Filesize
8KB
MD59a45af5044d301aacf2928ea47cb3b6a
SHA135bfa3bd42dfd0a1cf97a56d992a3ca47577bc9d
SHA25671b69ce0cfaa58eb4c9742111b2dfd8fe0f5e1a4b6c38e26121a43eaf18f222b
SHA51252b7ec0f6e9595be59ea3866c71cb5b2f92fb18924bf6860776bc4e8512944bd11e663908c76796f7c18ad7f074bae11c58205b4c8fde750de7a6e88f850a9a5
-
Filesize
5KB
MD59d4055a18afc0de43f275f196748ec9f
SHA1b4078c0569d80c0020f658b727b877ebb0d38838
SHA256bb45a2069543808f0bb8ee15d46efb4476e7ec906b6999acc46f2e0453d25ff4
SHA512229d3e6481e0c1ea9e04c92c177c84380608fceb74f969b56c3d4e8ba2e3525103cdeb46ad1b6d9fd8dbeb4795ca503aefb9327f44af1b8e66a19723d85e621b
-
Filesize
567KB
MD5568f7447183c41c3c9263924e52a4822
SHA1e9e4b24af15d174cd9e3af989d3b3deca98725ee
SHA2565ebddc2b4757c9650a51531203ea4ca28b6a145cade7cc4905c6bc23ae62e88f
SHA512a3d155d5e92771652603a228e140b6aef029d3f99dd6d0da2a05c0d4dd42026dfbb6069f97e904bd6516d1a7752666ded8796f63dcb255451ccbc9a3d17d882d