Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 07:54
Static task
static1
Behavioral task
behavioral1
Sample
825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe
-
Size
503KB
-
MD5
825eef10d648a3e457fc5c5c0282f9ad
-
SHA1
104d982d560991099302eb4d85cce5d02709fda1
-
SHA256
a1cd5999912fc8aab71c72e6854a46c316e92f72712e18925c529f1bd7701ac8
-
SHA512
958b44b8aca36d0e5fb52c6a8c82b5062e9470863a4482e0a501c7f0e82dddc1ae723ceed2047cb7cc7a2e94118e1038b43c6e10029ca3b559cf27e994ae661c
-
SSDEEP
12288:qne9dh6ZeN7qysPgD7FGyUcJUhPGLV/JPR/s2wwv:d9ZN7qX+7IyU5EReKv
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023c33-12.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation LIRE.exe -
Executes dropped EXE 1 IoCs
pid Process 1368 LIRE.exe -
Loads dropped DLL 8 IoCs
pid Process 1200 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe 1368 LIRE.exe 4396 NOTEPAD.EXE 1368 LIRE.exe 1368 LIRE.exe 4396 NOTEPAD.EXE 4396 NOTEPAD.EXE 1820 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LIRE Agent = "C:\\Windows\\SysWOW64\\Sys32\\LIRE.exe" LIRE.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\AKV.exe 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Sys32 LIRE.exe File created C:\Windows\SysWOW64\Sys32\LIRE.001 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\LIRE.006 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\LIRE.007 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\LIRE.exe 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1820 1368 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LIRE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4396 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 1368 LIRE.exe Token: SeIncBasePriorityPrivilege 1368 LIRE.exe Token: SeIncBasePriorityPrivilege 1368 LIRE.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1368 LIRE.exe 1368 LIRE.exe 1368 LIRE.exe 1368 LIRE.exe 1368 LIRE.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1368 1200 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe 84 PID 1200 wrote to memory of 1368 1200 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe 84 PID 1200 wrote to memory of 1368 1200 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe 84 PID 1200 wrote to memory of 4396 1200 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe 85 PID 1200 wrote to memory of 4396 1200 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe 85 PID 1200 wrote to memory of 4396 1200 825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe 85 PID 1368 wrote to memory of 1192 1368 LIRE.exe 102 PID 1368 wrote to memory of 1192 1368 LIRE.exe 102 PID 1368 wrote to memory of 1192 1368 LIRE.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\825eef10d648a3e457fc5c5c0282f9ad_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Sys32\LIRE.exe"C:\Windows\system32\Sys32\LIRE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 11443⤵
- Loads dropped DLL
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\Sys32\LIRE.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Tutorial.txt2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1368 -ip 13681⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52faa832b62991d302b56093477a76363
SHA12a26e0173a78c9c106ea799cce92ea163b44a345
SHA256a2076664d1267efa8b69a307b0cbde8521631f2789e06f5caa96799e7f34de48
SHA51220da18fb1350a441517498a1efeae9a21ead7592f9cdae724973c58385765100a2de5651fa991cdcc4668be777fe26bfba969dbc9706f16a54f5be258a84f347
-
Filesize
61B
MD5c47c45bc16c077e0180c46710ce54d18
SHA1977868f75b7e8fac74a0b49487a5777ec61fe76a
SHA25629c4303eb2e1a9eb84c4297d8c69a1de1411ad429532c308bc7b2f8dd121c1e8
SHA512559d03f1b5fa3c05f2501e1313ece3ff1f0f0b97565dbe8c8dc9302dc10940fa6d87f7d65a2ea1f019ac5fa9cbd111162eaf145bc317d95ce9d2cd3684b99711
-
Filesize
389KB
MD50a4d2002c7355a6c0d8e846fe02e7e89
SHA1cc1bf70d3d718d3d3dc1b43405d36285933feac7
SHA256be2cc3bda4c0e231ebae65a7c79ed1313d422e5fb2f871330080f8ca1792e455
SHA5129e229232bbc8e4faa0ea63e1069000c2e1582a5d7b72abb5535b003d339a0984b08a34a86b36e17dad61277f0456fe98fab2dbcd2db493feee927892ef7cba57
-
Filesize
448B
MD58aa7b74d76efa8c439665222c54d6564
SHA10f19873f53ac5a6f91032b969af8544c80f999fd
SHA25651ca0277014fe3807225507f8e1c7c9aead46f6fc9f0e3f1658c40422683db5e
SHA512ee109a336634aa632c07f2dc02880b6c029b39c8a63d0beea4b7371117639840317dab88d4fe2388c8020b17bc585e8fc342815828421f964255cfad69a772b1
-
Filesize
7KB
MD58013928e1446be1b8e77ca35211fd17e
SHA1c03a6c0516d1763bacc4da535383d3b4ddb506c3
SHA256d82bb0b7a29a9500a79e52b2ea84ea244f250cc7ff25174aa4ed5826d6b9c828
SHA512d5e55bb8dda7f44918bafb16098d39e363237053f84377d5d591d9010b0f14a6eb2260f9dd356e32e133ab2a42c1debed0424fbe7de932d8d363ac8a09a7660f
-
Filesize
5KB
MD5bb3520f108916b0967e74a9167b44925
SHA129dd637355ec7d38955af75775a72ac32903d40c
SHA256f9be7b7c760a59f4d98213f4f80d45e405d1d0ac564d4f880ec820da178d45e5
SHA5127700bf7e8fd15df753bc83b8e243e4b62095824b8bea3f40d7213a5c6307f17d9fbab2f6c737e19ede5330539014ba6c583b25bd2d58b05f05f23683affe1d53
-
Filesize
475KB
MD53d9eaf31ec5138624f1cf21706264bd6
SHA1f2c397f042c38862034333ed3c142a54896e0305
SHA25617c47ecc3481cb85c0336e7bd58f141f54fa1bbe604892c41d3e6a1945b43811
SHA512a849c329950bb015cc32624968c39c9f3f70fb37500e0292bbccb79a6413d4088d68d481e3c8c2ac0b8975b885387abe581d597892d906e357ac573c3525ed9e