Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
78a39875a0adb110cf3c7de3a0d1384c
-
SHA1
005b0e034adefc7f1b9b1817951db843b5451eb1
-
SHA256
bc5a7972e6052e50bdd90f9354ec544161bfd549b97ac04edd784b9361cfc1de
-
SHA512
a4ccd748a00f43a7559b624602fc6ced33cc48a2381ff7e56866600fda9a1b021530e5bd67d682170b8d34ded3adbf48d9007199d316b1c9b83827b9f1c74910
-
SSDEEP
24576:wU/pT7XFrnzP+55U4bASv6XhV8SBptFNrnNHTwXig6Tu6bvmEgP9:xRT7X1nj+rbASv038SBprNrNwXiNTu6G
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\MUWOCI\HNI.exe family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exeHNI.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation HNI.exe -
Executes dropped EXE 1 IoCs
Processes:
HNI.exepid process 1928 HNI.exe -
Loads dropped DLL 1 IoCs
Processes:
HNI.exepid process 1928 HNI.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
HNI.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HNI Start = "C:\\Windows\\SysWOW64\\MUWOCI\\HNI.exe" HNI.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 8 IoCs
Processes:
HNI.exe78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\MUWOCI\HNI.008 HNI.exe File opened for modification C:\Windows\SysWOW64\MUWOCI\HNI.008 HNI.exe File created C:\Windows\SysWOW64\MUWOCI\HNI.004 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe File created C:\Windows\SysWOW64\MUWOCI\HNI.001 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe File created C:\Windows\SysWOW64\MUWOCI\HNI.002 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe File created C:\Windows\SysWOW64\MUWOCI\AKV.exe 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe File created C:\Windows\SysWOW64\MUWOCI\HNI.exe 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MUWOCI\ HNI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exe78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exeHNI.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HNI.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
HNI.exedescription pid process Token: 33 1928 HNI.exe Token: SeIncBasePriorityPrivilege 1928 HNI.exe Token: SeIncBasePriorityPrivilege 1928 HNI.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
HNI.exepid process 1928 HNI.exe 1928 HNI.exe 1928 HNI.exe 1928 HNI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exeHNI.exedescription pid process target process PID 3752 wrote to memory of 1928 3752 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe HNI.exe PID 3752 wrote to memory of 1928 3752 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe HNI.exe PID 3752 wrote to memory of 1928 3752 78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe HNI.exe PID 1928 wrote to memory of 2004 1928 HNI.exe cmd.exe PID 1928 wrote to memory of 2004 1928 HNI.exe cmd.exe PID 1928 wrote to memory of 2004 1928 HNI.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\78a39875a0adb110cf3c7de3a0d1384c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\MUWOCI\HNI.exe"C:\Windows\system32\MUWOCI\HNI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\MUWOCI\HNI.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
465KB
MD54061e424a7e62d613aa16201364593c9
SHA184e5f41196523eddd24b62670ec8100632dbc933
SHA256d39b682a1de3541ce4858727a3206a0fb78d1e070e4dd60fab43c2537d1adfd9
SHA5123290348c02db1d9125d80b6e240544d51b0805240e113397d85a3fbdf3421172c8dd23e5631525db9258b7eedcdc228df3082041a017c664593eac698773f5fa
-
Filesize
61KB
MD54eb04b9187bbf3e3c33bf95e74eb6262
SHA1ca5dcaea5ef4ba48c0bb06635c0b5abed4f0f342
SHA256cf84d5704b350beaf1f2b46dc44bd372141d7554a8958ce22c0a84a3f21f2fe7
SHA512aeaa608cd4f66ba817a7e8698d17f9801c9cedf99875decff39bc18cebdec3947f02566bdf21d9096e5a6a6b740717ab06d46a2a9605bf8e8fa0fee12fe17e81
-
Filesize
43KB
MD51aed6fee0870288cdb607393fc2f33a1
SHA1584fd8d5ffbced19dd09b8b71cee9026c0ac65c6
SHA25602c4eef7045896258d00077e123719aa256c606f4e38c417965ba5f64d48e180
SHA51215e5b7843b07bcb4a638057b05712c66b285d70ace24ab3a4c125d24d538ace20cfac179accefa417d7790f7a095327affd3cd73d9eacaa632356f95a9fde3b8
-
Filesize
1KB
MD57690a88abc761948e638a6e6f50697ea
SHA12dc45f1f25be26ab783d3a201300c1746b145770
SHA25677f417a2a0f720d3d732fd2586819282b4230fbbf14fa317f413511ee272e1a0
SHA5128ec1287bdffddad148e6d502b062d78bb16b9ebddfd88bb3e4c88c63cb1f9a821adcc6e55b37a40b795ca08f4d7cbbc0230338cb939ea45c40ac8fda4fae2c43
-
Filesize
1.5MB
MD5865b02aa4fb68ac150953986e6f63f1c
SHA1214190642d67f02c349e68f3f3c6ef0e9c2212d7
SHA256fac58547e80a1b9598261b6d2aa5175653831e507c57b6860bc5d04d2e754dff
SHA512473dc55a8a8f11d8445cef9cd8cabf8a9b227a6e47994ecfe9c86d41062641668d858e61b7ade1ad2801c5daa13d0630159b7ad241379e111c83564030c0a40e