Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
5ddeb9d68b02871cb6cc2eec6a05a9dc
-
SHA1
6aa8e62f9c14616c9440c3f3cadbcf29b575364b
-
SHA256
249302da00ebf44fda53d5441bf6d41ca5da11c6536f473d531cd7159ac852aa
-
SHA512
2b6634fc6c71837f0674e3e8bb066fdb377468301d37c6ff60cf36160b9d2ffed87c4d115ed6c509935de75aa6b78b019560dd6dcfa50fc70bc2fdbdabbd0435
-
SSDEEP
24576:/tTpSpm0+6GDKXKRTBNlhPsSKLZvWE2BnPGtiji3kv5Qua:VT0F1wTuSaZeE2JGiji0hQn
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\YSKIKU\KOX.exe family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exeexplore.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation explore.exe -
Executes dropped EXE 2 IoCs
Processes:
explore.exeKOX.exepid process 848 explore.exe 5096 KOX.exe -
Loads dropped DLL 3 IoCs
Processes:
KOX.exeIEXPLORE.EXEpid process 5096 KOX.exe 5116 IEXPLORE.EXE 5116 IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
KOX.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KOX Start = "C:\\Windows\\SysWOW64\\YSKIKU\\KOX.exe" KOX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 9 IoCs
Processes:
KOX.exeexplore.exedescription ioc process File created C:\Windows\SysWOW64\YSKIKU\KOX.006 KOX.exe File opened for modification C:\Windows\SysWOW64\YSKIKU\KOX.006 KOX.exe File created C:\Windows\SysWOW64\YSKIKU\Web_Oct_19_2024__17_46_27.html KOX.exe File created C:\Windows\SysWOW64\YSKIKU\KOX.004 explore.exe File created C:\Windows\SysWOW64\YSKIKU\KOX.001 explore.exe File created C:\Windows\SysWOW64\YSKIKU\KOX.002 explore.exe File created C:\Windows\SysWOW64\YSKIKU\AKV.exe explore.exe File created C:\Windows\SysWOW64\YSKIKU\KOX.exe explore.exe File opened for modification C:\Windows\SysWOW64\YSKIKU\ KOX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explore.exeKOX.exeIEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KOX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000042e7dba96731da408b68fe0ed5b0a246000000000200000000001066000000010000200000001cbe2fb526d06e7de5430cd9d4c64467fcee13541fd7d553697db27f611cb0f0000000000e8000000002000020000000b4745d86b05ce14414352968c4eef8664096b0d81b603c6f0865e3728c0c5f4e20000000299cd101fe9fa64b258e04b7d6bcb4e224471895d20bb5a7f18eca97f706e5074000000082e57ede9de6c06677048031e813cec8795eb7da3f8f10b6f1be2dc7b8ec199ae68cafe61aaa6c9166c45dd51b904dbdcf79359922a6ae058267ff2c901237f5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40754ae44e22db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3817591459" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436124959" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0F3095F0-8E42-11EF-91C3-EE8B2F3CE00B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3817591459" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31138382" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3821029216" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ba45e44e22db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31138382" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000042e7dba96731da408b68fe0ed5b0a246000000000200000000001066000000010000200000003bd29db925f34e7b289eede8801e59e8b868d815b9c2f2712cced4299c5c20d7000000000e8000000002000020000000704749ef670c3e810837c6eb8a0afae79615a807518ae6acfb67885920ad82e420000000b0559530079f3a639e7f84a2d3c7305b71b2a990cee5f9eab644ce49b3363ab840000000ee6f3fa73e3e0214fcd19e4e318784118c014f72cde6b62f3ec09b7cc584e7db2d9770c137e9a40c2c386eea539cc28d6cd5f206634f3eacd74f70e42ae79081 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31138382" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Modifies registry class 1 IoCs
Processes:
explore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings explore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
KOX.exepid process 5096 KOX.exe 5096 KOX.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
KOX.exedescription pid process Token: 33 5096 KOX.exe Token: SeIncBasePriorityPrivilege 5096 KOX.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4892 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
KOX.exeiexplore.exeIEXPLORE.EXEpid process 5096 KOX.exe 5096 KOX.exe 5096 KOX.exe 5096 KOX.exe 4892 iexplore.exe 4892 iexplore.exe 5116 IEXPLORE.EXE 5116 IEXPLORE.EXE 5116 IEXPLORE.EXE 5116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exeexplore.exeiexplore.exedescription pid process target process PID 1056 wrote to memory of 848 1056 5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe explore.exe PID 1056 wrote to memory of 848 1056 5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe explore.exe PID 1056 wrote to memory of 848 1056 5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe explore.exe PID 848 wrote to memory of 5096 848 explore.exe KOX.exe PID 848 wrote to memory of 5096 848 explore.exe KOX.exe PID 848 wrote to memory of 5096 848 explore.exe KOX.exe PID 848 wrote to memory of 4892 848 explore.exe iexplore.exe PID 848 wrote to memory of 4892 848 explore.exe iexplore.exe PID 4892 wrote to memory of 5116 4892 iexplore.exe IEXPLORE.EXE PID 4892 wrote to memory of 5116 4892 iexplore.exe IEXPLORE.EXE PID 4892 wrote to memory of 5116 4892 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\explore.exe"C:\Users\Admin\AppData\Local\Temp\explore.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\YSKIKU\KOX.exe"C:\Windows\system32\YSKIKU\KOX.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5096
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\google_transparent.gif3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4892 CREDAT:17410 /prefetch:24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5116
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
1.2MB
MD52fd30798987ce0f50d4878c6345b2e79
SHA1fdeb2f45da823345391a51c6007623ab119f487b
SHA256cbf4779ccc484c0335137024b8a5e6670516db2e5da454818c5329919c434142
SHA512f6a978f42c15063aee0022364a9ee3cc495fac879c54b8ffa5d104f93c174d05b5a5facc8346ef781f868f78b7a44a6ed06fe847e51d7f60bca3a80f9b9ef148
-
Filesize
1KB
MD526480db25dd9bdca4e51cec6353a58f2
SHA1b9582b76a53371bda0e5404dfdd708b1a5d7c5cb
SHA2564f3709a793e0938efdf67da9f184c1cffda07f5553f0e4ca8cf41b2de65c67b2
SHA512d0128611b814a6bf65abbee5c28a5a1151f629020b520b83c85830a5a568c95c0e0d3a5cd145040ee7855114a5f348c2de6895df591b1175ed9b2ba55919bc05
-
Filesize
456KB
MD551507d91d43683b9c4b8fafeb4d888f8
SHA1ead2f68338da7af4720378cd46133589fc9405ba
SHA25671b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b
SHA512a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
1KB
MD562000c3c0c763b032a13bfd240c9b449
SHA1149b03cac928398795f3152ce03e82c284f390f3
SHA256db2b5bd4e4cb02e15b2eda82ff815569f4fa42516bc3ee6e5e9036529e0966db
SHA51259c767ca518099b765caefaeca93e5706332f2511db93e976908bf806707f424ef0de9cafb61afcb0107264d3d06cac83751831a3f6b8ad2c82fe44c0f9a632a
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9
-
Filesize
331B
MD5b310b907b30f58acdf9664d97967ddfe
SHA1ae37aae52e4ce8d9c78ab2396277b777cd331f22
SHA2561a3a87cbaca2d823eabd4ff83af21219800bcb9ba65995c93dc4b42c94dc0a72
SHA51214ccce232b18937483a6529a2180db2b19fab5d874493bcd2e81a754a4c77e43f256e076420272d3d97fb403a3aa18f0d4a8fc68d09a1e6ca3858ce3eb77eaf1