Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 11:36
Static task
static1
Behavioral task
behavioral1
Sample
796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe
-
Size
508KB
-
MD5
796ec8c79371010a515f4ff6530cd5e1
-
SHA1
ea6cf1054ced513fe997fa52fdddd30ec742f4fa
-
SHA256
d8d09913222a33936e95b3dcd7643a35b2b2cbcc7d6bcf4de6c065e0da24db07
-
SHA512
0a5095c862308de71deb7d84d92baf57d290218e58ff944f582084866b5d195f0c01b1ada5a432e47cb1c68103b2d23c960c1b1abb3e84a9ded17667e9e2a613
-
SSDEEP
6144:pQEIAXq9oJNOk6QVno9bk1aWSCvZ4hFsxW+yDAx/cn2wtvS2wMO6h0VDY0O/orRF:FfmMidkx9Z4Psxv/02wtvgVcRoeuxKa
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c8a-22.dat family_ardamax -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Exporer32.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation BQSG.exe -
Executes dropped EXE 2 IoCs
pid Process 4444 Exporer32.exe 1864 BQSG.exe -
Loads dropped DLL 5 IoCs
pid Process 4444 Exporer32.exe 1864 BQSG.exe 1864 BQSG.exe 1864 BQSG.exe 3020 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BQSG Agent = "C:\\Windows\\Sys32\\BQSG.exe" BQSG.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Sys32\BQSG.007 Exporer32.exe File created C:\Windows\Sys32\BQSG.exe Exporer32.exe File created C:\Windows\Sys32\AKV.exe Exporer32.exe File opened for modification C:\Windows\Sys32 BQSG.exe File created C:\Windows\Sys32\BQSG.009 BQSG.exe File opened for modification C:\Windows\Sys32\BQSG.009 BQSG.exe File created C:\Windows\Sys32\BQSG.001 Exporer32.exe File created C:\Windows\Sys32\BQSG.006 Exporer32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3020 1864 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exporer32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BQSG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 1864 BQSG.exe Token: SeIncBasePriorityPrivilege 1864 BQSG.exe Token: SeIncBasePriorityPrivilege 1864 BQSG.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1052 796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe 1864 BQSG.exe 1864 BQSG.exe 1864 BQSG.exe 1864 BQSG.exe 1864 BQSG.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4444 1052 796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe 89 PID 1052 wrote to memory of 4444 1052 796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe 89 PID 1052 wrote to memory of 4444 1052 796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe 89 PID 4444 wrote to memory of 1864 4444 Exporer32.exe 90 PID 4444 wrote to memory of 1864 4444 Exporer32.exe 90 PID 4444 wrote to memory of 1864 4444 Exporer32.exe 90 PID 1864 wrote to memory of 4836 1864 BQSG.exe 110 PID 1864 wrote to memory of 4836 1864 BQSG.exe 110 PID 1864 wrote to memory of 4836 1864 BQSG.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\796ec8c79371010a515f4ff6530cd5e1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Sys32\BQSG.exe"C:\Windows\Sys32\BQSG.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 11204⤵
- Loads dropped DLL
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\Sys32\BQSG.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1864 -ip 18641⤵PID:4128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e6d3a1562e0a2d9230e4bfd7e477dffd
SHA1ef5d510e60caef4924eced60c092a63e9233b375
SHA25649ee7df841542ff4fc5232bd8244f06683cc70f8af5f861b94497b504208b3ab
SHA512e6d866daf96ad912d4ad69324d9f89820d15dd2a8d34aba5b3392aa5f6a67931f988080a25fa09067f81024180a3a4c0e211a80405b56e6663481fce7ffa1177
-
Filesize
488KB
MD5d8b7bf10ae61a385f06865821043b223
SHA103e7c152df0edd41fc8d74f26e8edf4f375822e4
SHA2564ce344c14a59465eee6f4ee6d4dae4943268e861a436a84d7f52c98fffd906a9
SHA51250d335f8bdc4a09fc09fcbc9f6b466eaa04796d24d3a89843349abc51f0fb5976ca8c3bc3da39cef1a090a26d514a96777a5b18d180bbd36b603187b5f876ff9
-
Filesize
389KB
MD5f567d932480c03ab1de08b1b72aada97
SHA192c60c8971cf6aa88baf945c61c3a40709c03e02
SHA256565e67c1959c0dec7be32b308681ec7106cde58b1b409cc21cbc642b7a6d627f
SHA5122c9bac11470c2ff211054df00f252c312d6d2e0aea4349b03072934f8ce2623fb365c64c0eb56a08440e4daabd11799e03b158733a9922fc05ebc7782c67b3fe
-
Filesize
354B
MD52a1cdd5db7ea5d8846504a8c0d072a16
SHA1ada1922020ea6fda748cf6f531d9834b94b39ce1
SHA2567889944c39bbd67befb7f608023467c9f88b85a40723cf5070d41b8df8327e99
SHA512fc017a1228774e12eab29d18c0800f9bb1c4e9273734e993652b6f7ba5c0baf47ffc77b40cf68607ec85ee2b42093311cbefe25f0e7afccdfe7a9769bc840cc7
-
Filesize
7KB
MD502d9f210aac7049c13f026ba9898a9bd
SHA1b6aae5e7fae29934042af5f6a6d51a52b51265a1
SHA25643b9f2d721ec6e419b865639dead7ba29202839f967ba172f479977db8ea4e9b
SHA512dda86da60ab27f2c05ebd8e7d4b709771da0edb22ba406336898e4e7e5c2febbfe9d81fb946d6440f6393e0f8c25ae61125e4ff3e8aa168c1e36a63e89999466
-
Filesize
5KB
MD55b9bf404722eac0ff29f1609f4e938ac
SHA14a0dc9cf5f7cb6855b4f2745646c4a3dcf995ba2
SHA25645e39c6673b2e580e6cc01f2213dcc4d93da2eb561c94066506d90ceea8c3522
SHA51250b6689db1e052d39ee1abf3ddab19b64f99ba48460fa75abf5e467d79d99958aa0a9524f3ad0d91d48cfd429ed09cfca068446287d8373974b7583eafc0fd29
-
Filesize
475KB
MD5d0c5feb812ca765b00a3ca0e974fabd2
SHA1c5a4b5aee6b92019552f811d3ceb4fdcee0105fa
SHA256cd2de8b54a5de630e03177a736a35f85a1f8d8367a392ed833fb6fee29c96440
SHA512fb4e5bda23453484f0d0c4cc3bdc1f29a36be56281f558f356b579996bde15290a9dfbbc018ffe86e2304832a2898710f0331b7f3cd181d16930e2abbdfaafe8