Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
811cbc2f3c61d4bf7d009d00c15f1321
-
SHA1
775a085e2f4771ea67cd75a2b797dc6eedbdb32f
-
SHA256
b40586092deaa8fa14ebb39802a20f2ebada997a075b75744274faa4a9735afe
-
SHA512
4bfbeb25f004a4017a33d2b269893e2bea6ee718911dbc2a76ccb0784dffe16002cce8ce358d36f1bc98a44473a368bd31e01d339c83c07302f35526396ff80d
-
SSDEEP
24576:EesT97/AE/wkXmv/fnwFY9cx0uxGCYyXK/no/HW2xBBqJp9RpY:E3T9f/bKPyY9cRs9wO+B8JpRY
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b6b-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3104 ETI.exe -
Loads dropped DLL 3 IoCs
pid Process 3104 ETI.exe 4568 IEXPLORE.EXE 4568 IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ETI Start = "C:\\Windows\\SysWOW64\\VDFILS\\ETI.exe" ETI.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\VDFILS ETI.exe File created C:\Windows\SysWOW64\VDFILS\ETI.004 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe File created C:\Windows\SysWOW64\VDFILS\ETI.001 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe File created C:\Windows\SysWOW64\VDFILS\ETI.002 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe File created C:\Windows\SysWOW64\VDFILS\AKV.exe 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe File created C:\Windows\SysWOW64\VDFILS\ETI.exe 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ETI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31140665" iexplore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Web3.5 = "1730340247" ETI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1032091491" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1036778992" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000013dbeb74f69550459d232b3693c378ca00000000020000000000106600000001000020000000f18ac18f3e87b26f23fe470abd3d1bc6d1626e0909b5d50b0437b166738ac830000000000e8000000002000020000000b7cdfbfbcac964bef991a176324aacb8c45805316c40e31fa9961c125b2ff09820000000cfd925036a902e00013ad82461a0aefad2deaf1f3d8d623975dc01f7fff647e140000000e9225f395bfa7d757a9147424a2860706034801f5b0c6c72bb97b2914a5403e5d466a21d45b31f99ead0fb3e0396d80108784fc399ce05a9791392a61792be7b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f063133e392bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31140665" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000013dbeb74f69550459d232b3693c378ca000000000200000000001066000000010000200000008ceaee07a533fa8918990a201bb222f446fde1011beab644d654dcd0bc676eff000000000e800000000200002000000071c0c2ca875cfb963d2db90500af150f85fc023c71a60e0117d07544345ffa6c200000004f544e0d3f7e8bfb8f4bb46bb3ad5866c1f4c8cac2955a1a71a9d1dc93994521400000000d8f4e8e8709fd622fc82cc6179a10e71e00ed3e23f44d5e86e5d0ec1bfe4e2bc41ac1d51524be60f00f8644dbf3dc58d8159a905756e55e3348dd9e7efc2d4e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{68CC3F98-972C-11EF-BDBF-520873AEBE93} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10ee093e392bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1032091491" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437105221" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1036778992" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31140665" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31140665" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3104 ETI.exe Token: SeIncBasePriorityPrivilege 3104 ETI.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3708 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3104 ETI.exe 3104 ETI.exe 3104 ETI.exe 3104 ETI.exe 3708 iexplore.exe 3708 iexplore.exe 4568 IEXPLORE.EXE 4568 IEXPLORE.EXE 4568 IEXPLORE.EXE 4568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 112 wrote to memory of 3104 112 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe 85 PID 112 wrote to memory of 3104 112 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe 85 PID 112 wrote to memory of 3104 112 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe 85 PID 112 wrote to memory of 3708 112 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe 86 PID 112 wrote to memory of 3708 112 811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe 86 PID 3708 wrote to memory of 4568 3708 iexplore.exe 87 PID 3708 wrote to memory of 4568 3708 iexplore.exe 87 PID 3708 wrote to memory of 4568 3708 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\811cbc2f3c61d4bf7d009d00c15f1321_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\VDFILS\ETI.exe"C:\Windows\system32\VDFILS\ETI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3104
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\playspan.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3708 CREDAT:17410 /prefetch:23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5ee4ada789158c1e5a14d597cf1d5edd0
SHA19593aee78d30d51ab93d6a29dc4dc873e0d466b6
SHA256903a6d82bf2fe8951104cf90d9f64aab0fbded30a2246e678a80d07868569b4f
SHA512a6214f62e5089512aeaabab7c4bb38e8663fb55d5f4129c57e726723dad10802ec40c3dc836087713b77c1874c12f177bf2b2998fd3e52f4210c1c5307885c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5ac8ea12a9ed52ee2ec41932cd610bc9e
SHA19e3794b2249eec452c97f3aca34b9de18313b610
SHA256fb89605d6c2cc7acaf81c078ebe4d9c3c59837e32a40f043f781dfe2a4b08838
SHA512c4243b095aa057caed13e1dbdb1187ef4ea612f1bd5a8be3c785d18aeb417971590e94e4deeb537abf1ac8d24ac5c0bec98604bddd56406c869ca59fdd6f7128
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
27KB
MD5a728ee12275113e7b77a8378b90ce8ae
SHA1db57240ff5808f63e9e177397666b856d1ec9464
SHA256c8677d9ccafefaf06ba407de0c56748f318894a36ea7fe8ad1c5ffab6ae88723
SHA5125498761864c90a172515fecff5ab529170a890197b330d2436fe33e739cadd4da49760f38403a60e5b4e777bf2f16d5281d9f0e68cd7a27e3a3a3616b8a08f63
-
Filesize
498KB
MD551c1f8be2696047a60425cf4e8370eeb
SHA1c565f5f7ca1eae6af9c7e7d07092031975ddf356
SHA256900f9e42b5157d485000517997655dea2b5a36b249295e16a650ea38a8992de4
SHA512a25712fa2ca973a3d73fc9fd59bd4c4734cb31f1683d0960e86fb0d1f078f011c8c9aebd85b6513f434c4e96cc8dd4367620a9b5c55112b586187ee2fed96c9a
-
Filesize
60KB
MD52bfb29b33b47a062d48c9ad462cc06c2
SHA11b39d2cb07740cfafe6809d30431952e2b7c2a5f
SHA256f5b12e8464198b5c9cb2308e86942ef6d49ad0aeb844b47a385e90f0977d9001
SHA5123521cca90074871f0e28706061e4a6ec8c0abca1c36ac73e860216be46df06c89ec8a5690677c4df0bf451ba2d2374351009a459101de459b71efa3889a043ee
-
Filesize
42KB
MD5afa4b981d51f73aaa544fac1a7108ab3
SHA18dd9f0811c98175b1cf9d73893e03283e020ada2
SHA256456ed6eae6b31494b782f8786d28f22a96f38abcc81e93cc9802dac6bb1b9238
SHA5124e0234d692b5eb91cfe5f2f2926a0b0f49dc43510c695dd6bff78071c86dfad91cbcde3428d4965026fd980c1a353b221b0a3fa35d223d678ef82cfb9e0294e5
-
Filesize
502B
MD546abadb5eeed27330ace63144e5a180c
SHA18976e91b050aebcab3cb2b221e7b3251161590b9
SHA256a770ee0b90f0e9cad9472cc41b3446ad20ea48b98bc54c4a3dc1276f2168bb26
SHA51229cd3e9b0c440316ca9d498d089034a576af8d2e51fafb2c3bb339055583b0803987ea40cc8aa285745ff41ac364b46e523945d6d8556b4c148af2913f0bbe81
-
Filesize
1.3MB
MD593e6298315cf566b520382d6c701dc62
SHA1ab5ee9810535cfee6fb1f751d63cc5a0ed0e256e
SHA256035a7419c78813bae698ee98db9f48302d4de0bd011ac573eb457f65268b702b
SHA5121c37c580578964ea00a3fd193ba04ca81ed2e5cf3e74395e90994b3dd0e22d3c55fb640eb8138af81eef6d88af37459dcc6bb6bd035fc1aaa71476ba4634a8ee