Analysis
-
max time kernel
142s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
63b0b905a12190b3831c38dc25cff6fd
-
SHA1
9e48f9b03a9dd27f446ca1d907e29828975254e2
-
SHA256
063f1aa04ea3f7c57453acb350875e6c858b7a3a9bb2a0458c7883e33b062466
-
SHA512
c0e2237aab88033651ef6ebeb4453ccf948d3501aa613db39f6a5e4065bca3dde19958ebc26606875a4ea6b24411b426d8eaf4095b0db00ece36669cea789cab
-
SSDEEP
24576:m8VNOKgr/iO+dw0dUzKsl+qtfagLB/FoLwXDJjA:/VNO+YrzB+gbLB/OwTS
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\28463\NBAR.exe family_ardamax -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Decrypted.exeNBAR.exe63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Decrypted.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation NBAR.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
Decrypted.exeNBAR.exepid process 4320 Decrypted.exe 4232 NBAR.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe -
Loads dropped DLL 5 IoCs
Processes:
Decrypted.exeNBAR.exeWerFault.exepid process 4320 Decrypted.exe 4232 NBAR.exe 4232 NBAR.exe 4232 NBAR.exe 3608 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NBAR.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NBAR Agent = "C:\\Windows\\SysWOW64\\28463\\NBAR.exe" NBAR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 5 IoCs
Processes:
Decrypted.exeNBAR.exedescription ioc process File created C:\Windows\SysWOW64\28463\NBAR.001 Decrypted.exe File created C:\Windows\SysWOW64\28463\NBAR.006 Decrypted.exe File created C:\Windows\SysWOW64\28463\NBAR.007 Decrypted.exe File created C:\Windows\SysWOW64\28463\NBAR.exe Decrypted.exe File opened for modification C:\Windows\SysWOW64\28463 NBAR.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exepid process 392 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3608 4232 WerFault.exe NBAR.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Decrypted.exeNBAR.execmd.exe63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Decrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NBAR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exepid process 392 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe 392 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
NBAR.exedescription pid process Token: 33 4232 NBAR.exe Token: SeIncBasePriorityPrivilege 4232 NBAR.exe Token: SeIncBasePriorityPrivilege 4232 NBAR.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exeNBAR.exepid process 392 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe 4232 NBAR.exe 4232 NBAR.exe 4232 NBAR.exe 4232 NBAR.exe 4232 NBAR.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exeDecrypted.exeNBAR.exedescription pid process target process PID 392 wrote to memory of 4320 392 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe Decrypted.exe PID 392 wrote to memory of 4320 392 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe Decrypted.exe PID 392 wrote to memory of 4320 392 63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe Decrypted.exe PID 4320 wrote to memory of 4232 4320 Decrypted.exe NBAR.exe PID 4320 wrote to memory of 4232 4320 Decrypted.exe NBAR.exe PID 4320 wrote to memory of 4232 4320 Decrypted.exe NBAR.exe PID 4232 wrote to memory of 676 4232 NBAR.exe cmd.exe PID 4232 wrote to memory of 676 4232 NBAR.exe cmd.exe PID 4232 wrote to memory of 676 4232 NBAR.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63b0b905a12190b3831c38dc25cff6fd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"C:\Users\Admin\AppData\Local\Temp\Decrypted.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\28463\NBAR.exe"C:\Windows\system32\28463\NBAR.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 10724⤵
- Loads dropped DLL
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\NBAR.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4232 -ip 42321⤵PID:1028
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5c3679c3ff636d1a6b8c65323540da371
SHA1d184758721a426467b687bec2a4acc80fe44c6f8
SHA256d4eba51c616b439a8819218bddf9a6fa257d55c9f04cf81441cc99cc945ad3eb
SHA512494a0a32eef4392ecb54df6e1da7d93183473c4e45f4ac4bd6ec3b0ed8c85c58303a0d36edec41420d05ff624195f08791b6b7e018419a3251b7e71ec9b730e7
-
Filesize
271KB
MD5b0b0c7a0cf3864031c68afd12835a511
SHA13abdb0f9926837a1523e25c961554f208a7357a9
SHA256ca24cb7636c6716796545ac03852e1df4fa5cf5051d81c9ac497bd8d82acec55
SHA512301b10db8813f454a14751999a5928b4e7dd25ff7720192ac72af462595080945d19cf087076f4a71a014c8a0fef9c9e59dc77e79125be7d70bcd166bbc5bc28
-
Filesize
426B
MD58990b813fa9670e31913d5b3315de34f
SHA1bc5f51fc21ed976ffe33032ef887ee1dc612251b
SHA2565e5ccf865da35ae326da220b42c400ed2c810d6bb74a03993275f2f2a73b3451
SHA512201f1e3ccda080c83f48490cae6b88194b609e3d9c7c4a9c380e49387bd9b111202367e04ebff4b5b762d28d5fff7765a45cbc6711c592b4aef9655aeb2eadad
-
Filesize
8KB
MD543f02e9974b1477c1e6388882f233db0
SHA1f3e27b231193f8d5b2e1b09d05ae3a62795cf339
SHA2563c9e56e51d5a7a1b9aefe853c12a98bf246039aa46db94227ea128f6331782ba
SHA512e22d14735606fe75ee5e55204807c3f5531d3e0c4f63aa4a3b2d4bb6abda6128c7e2816753f2e64400ac6dae8f8ef1e013a7a464dff2a79ad9937c48821a067f
-
Filesize
5KB
MD5b5a87d630436f958c6e1d82d15f98f96
SHA1d3ff5e92198d4df0f98a918071aca53550bf1cff
SHA256a895ad4d23e8b2c2dc552092f645ca309e62c36d4721ebfe7afd2eee7765d4b2
SHA512fd7bae85a86bdaa12fec826d1d38728a90e2037cb3182ad7652d8a9f54c4b322734c587b62221e6f907fce24fcf2e0ae4cce1f5e3d8861661064b4da24bd87ce
-
Filesize
473KB
MD517535dddecf8cb1efdba1f1952126547
SHA1a862a9a3eb6c201751be1038537522a5281ea6cb
SHA2561a3d28ac6359e58aa656f4734f9f36b6c09badadcf9fb900b9b118d90c38a9dd
SHA512b4f31b552ab3bb3dafa365aa7a31f58674ae7ee82ce1d23457f2e7047431430b00abb3b5498491725639daf583b526b278a737168cfdc4e9ec796dfbc14a53d8