Analysis
-
max time kernel
140s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe
-
Size
560KB
-
MD5
315d4779918d33282cbd9dcda4aa3300
-
SHA1
1955032464ce611bce3a3470e69b301cc1756dca
-
SHA256
2c492268d97b50850b422480ba3b0b015091b7eec63436f43a3c36c1db98e6d9
-
SHA512
ab831762c89bda450b53261a09ea92eb6457919e0013bf844e3807b11161a75c4936dd370fc548d62fd5196927c84ef0f3afbe63483daf6dadcdd998a0551de0
-
SSDEEP
12288:9lhe0vpz6jfiyFeMgOS46ARgpgFv+8DS+lWh1iExSmpXSScpsho:A0vpQfpFeXOCAReg1+Lh7NXSFpCo
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023cbc-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3632 BQWS.exe 1184 MsnBlockChecker.exe -
Loads dropped DLL 4 IoCs
pid Process 876 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe 3632 BQWS.exe 3632 BQWS.exe 3632 BQWS.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BQWS Agent = "C:\\Windows\\SysWOW64\\Sys32\\BQWS.exe" BQWS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\BQWS.007 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\BQWS.exe 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\AKV.exe 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Sys32 BQWS.exe File created C:\Windows\SysWOW64\Sys32\BQWS.001 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\BQWS.006 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BQWS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsnBlockChecker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3632 BQWS.exe Token: SeIncBasePriorityPrivilege 3632 BQWS.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3632 BQWS.exe 3632 BQWS.exe 3632 BQWS.exe 3632 BQWS.exe 3632 BQWS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 876 wrote to memory of 3632 876 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe 86 PID 876 wrote to memory of 3632 876 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe 86 PID 876 wrote to memory of 3632 876 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe 86 PID 876 wrote to memory of 1184 876 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe 87 PID 876 wrote to memory of 1184 876 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe 87 PID 876 wrote to memory of 1184 876 315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe 87 PID 1184 wrote to memory of 4176 1184 MsnBlockChecker.exe 89 PID 1184 wrote to memory of 4176 1184 MsnBlockChecker.exe 89 PID 1184 wrote to memory of 4176 1184 MsnBlockChecker.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\315d4779918d33282cbd9dcda4aa3300_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\Sys32\BQWS.exe"C:\Windows\system32\Sys32\BQWS.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\MsnBlockChecker.exe"C:\Users\Admin\AppData\Local\Temp\MsnBlockChecker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt5542.bat "C:\Users\Admin\AppData\Local\Temp\MsnBlockChecker.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55a159e9341f65fc570232248b8cf51cb
SHA131905d6404692e9f31b58b15075348942612f375
SHA256399cf2fca877cfb6258f0b18db3526acefa3725619c4fa63b238fb5dbe390f66
SHA512a020905c4c15443f81f77f86db3e0ecca19c48dceb5b8608435054fcff56580a175c0f64a2eacc00e6c14c6537b5e07fd41a89e4602157d012fd6e056054d9bf
-
Filesize
149KB
MD50caae7e92de74aa1ae5e2f6649b4e1b1
SHA1d5bbcab2724b31c38b7654553e5deb40191cca56
SHA25640bbd7505f5a5cdcbb9ed58f43a9061801d371bc9ac7f4bbadfe6a63cb0e0426
SHA512d75c46dcad87753e3c8a1877ae85ca29cbfcfb6c779eae53e60aa438e568f758cffd11de91ecd1bcc2a32ef1390aa693490489ee4a18c2be50f6ccfc0564d2e4
-
Filesize
14KB
MD53a54d71ca0740fb1a305f17c966724d1
SHA19bf96b17b7cae4a494a2c13f3c7b17ea97d06e75
SHA2560d2a018baf2f62b98b71badb598a9654a65eaff6ed01f478235497ce95697972
SHA51251ac0c279f70425e5c0ee8e7ae204fed7846e8e47e3a5855a214cbc8e1211d59c2047f43a0ea13577ce00834d6963904fe1b4d99b0a5fb6978cf66876550e58a
-
Filesize
389KB
MD5433e840b522e28f86377e1df7cb80baf
SHA1c200505662ba78caae3c4a054c3ca7d62e97be93
SHA2569cb577e77dad05b03969fcf2118ed26fa6ad3bce1d9659fa0934b942c76581f0
SHA512c5dc790a5b40062481bc978c28fc3279236b60b9b907c6dd03fbd4bf52f9bebc3ab38bf0ac0de1f455a4db28639bedaececaad8e7f096f624d3916cf0f362ffc
-
Filesize
570B
MD5f538e59ce59dbdc4dc4543564de3537f
SHA17acbf8d64dfbb75e8490ddc72b3635e753c26e5d
SHA2564939b725d480693210bceec23b31493b38e16f71e8d7e720e39a465184d951dd
SHA51218d87110c3686a894cc429e5a18e06f520dd94739c3e4efc3ecf50a85333b5c364de5b0fbb66fe76dcc1b965b06b870694d809326331c68555ef0237fff3d549
-
Filesize
7KB
MD527534bc0f73b5de819de58995aa1e622
SHA10ac11c296a1daef49f4672a668a20091563866c9
SHA2564c7dc5430b1dc5d402767578402dbc3d824c4ff4be4222b3c24036e45bb9eccd
SHA512f14f9e358507ad49607b22e6da96805178fd23cda5302479ea1c8ef2901bc9fecd02123da9ac9f2043764c9d1f5730c074777fd706e7fdc24b094b0bebf520c1
-
Filesize
5KB
MD5fe107515338fbde5e5307c4f76b96bb1
SHA1df6c1ad7f99bc25243c38fa602c308ccbd09ec85
SHA25626381a466fed113a110752d96640d5c8144a2e4d385b175a17a8f224e459214b
SHA5126adae86847423c72250b5bcdc993d3312ccd46fa0b08702990b352f7b188c55a0a067c0493b191582ac5520d360f3e7ef6788fa48cfcf4d191aa12209786fed6
-
Filesize
475KB
MD5c9ae34faba6dc2ef692069a94baa6d83
SHA11d55c106f34258b8c8b7194bc8a5dbe4781fdd24
SHA25651ca7c0303f667b8cd35dce598c6a9ebc4ccd5da7e37150ad7c01a2cd1d05d0c
SHA5127dbce735aff17ae324ee54c9638995f22f778261d277affe5af763bde37d3918b575f1cb7a4b4323c8b2a6d49c2a918c980224e27136087d82d782ddc1b8ecbf