Analysis
-
max time kernel
136s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe
-
Size
480KB
-
MD5
87f4271ae8d5c67a7211d57c5e1ff1a2
-
SHA1
613cf83a84e324b3c04adf44e21f51dedbf5877d
-
SHA256
e9813b538392c27b58741b0bedc381d4681d414596eb33c4a2aed8f4e5bbc723
-
SHA512
fd03fa91ad489534654c4d6827c879958dea2e0936586df72b26c65ab59ff3b9eefe1ce71a72d46726578509116310678eecebf2f3204972f312b5d403b81139
-
SSDEEP
12288:u1QEAPL0LCySQ0Q1JoyTEYwfqEmQZ1uxrSgtgXq4peHb7gR77:BEAT0izfdnfqEvTuxTd77Yv
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Sys32\JNKW.exe family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exeJNKW.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation JNKW.exe -
Executes dropped EXE 1 IoCs
Processes:
JNKW.exepid process 4524 JNKW.exe -
Loads dropped DLL 5 IoCs
Processes:
87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exeJNKW.exeWerFault.exepid process 4856 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe 4524 JNKW.exe 4524 JNKW.exe 4524 JNKW.exe 880 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
JNKW.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JNKW Agent = "C:\\Windows\\SysWOW64\\Sys32\\JNKW.exe" JNKW.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
Processes:
JNKW.exe87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Sys32 JNKW.exe File created C:\Windows\SysWOW64\Sys32\JNKW.001 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\JNKW.006 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\JNKW.007 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\JNKW.exe 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\AKV.exe 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 880 4524 WerFault.exe JNKW.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exeJNKW.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JNKW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
JNKW.exedescription pid process Token: 33 4524 JNKW.exe Token: SeIncBasePriorityPrivilege 4524 JNKW.exe Token: SeIncBasePriorityPrivilege 4524 JNKW.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
JNKW.exepid process 4524 JNKW.exe 4524 JNKW.exe 4524 JNKW.exe 4524 JNKW.exe 4524 JNKW.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exeJNKW.exedescription pid process target process PID 4856 wrote to memory of 4524 4856 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe JNKW.exe PID 4856 wrote to memory of 4524 4856 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe JNKW.exe PID 4856 wrote to memory of 4524 4856 87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe JNKW.exe PID 4524 wrote to memory of 3964 4524 JNKW.exe cmd.exe PID 4524 wrote to memory of 3964 4524 JNKW.exe cmd.exe PID 4524 wrote to memory of 3964 4524 JNKW.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87f4271ae8d5c67a7211d57c5e1ff1a2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\Sys32\JNKW.exe"C:\Windows\system32\Sys32\JNKW.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 11123⤵
- Loads dropped DLL
- Program crash
PID:880
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\Sys32\JNKW.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:3964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4524 -ip 45241⤵PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD574ff002e34aadbe8a9f7d88d2532c5d5
SHA13c11c399973d2db9a94ad7a089870d026c8c859d
SHA25657d3fc3ef8934afd806d28d705c05637c0bd2d64b91a1a3e87e9bfbbf95f6e8e
SHA512704c6520a7c89e6432776ad31c3334d22db390474c141974fc189c03b84e4618a35707f70f7ab7337bb63775a3cc04c2f70e88d9e3f921cf9ab2116305ed1bde
-
Filesize
391KB
MD575e14e922eeea4674c45a00335c28777
SHA1f3268f7a91e0cef3ac1b03877daa694655e79fa1
SHA256e103b85edbafbacc8e4ac50378ee4812b68ceccd2b6f2066243ac03674030f68
SHA512b2c5e09c041bc235bf1be0a808c92dc5b8256447be95a0fb4bcfe9160123c63d14a4979eea28f5286a0f3f354c59f032c9a24586dfb7067150dae7339314f6fa
-
Filesize
536B
MD55ec6050d273da18b39bdb9f33cae5bc3
SHA19b20dfbb24b0adc7c30ec7cceffb373de6141ef4
SHA2567b2801e8677f1615edd005b6a1e77e843fab84b2779e226eb1de82cedeb92aae
SHA512fad7de77bdea94c31bb871380c558e72adf2e8bae5782d0978d0b2fa2cb54cc23747b6b677ea2b496457fac0d5be863fbaf09c5d09f5aac3ff79a98cd0322d20
-
Filesize
7KB
MD55001bd93dc919785a830ab883eefb04e
SHA1eb4e7b7d42bf4669c1f011fcd0119012cfb957c0
SHA2562027d2ecaa78d0ffdd4234ce531be60f230b8258ae6c001af587f6d73dba771c
SHA51220f6a8fa9e2188aa29d101100edae17d77b4983f3e1dd4696c6fbcd47ef0bbcce392a0733c330dd7a707b0f5bb92720f684b04cdd8c0f1a0b186012001c477d8
-
Filesize
5KB
MD500c2e21155375b96338bf76afea81546
SHA19ec87a26f5a48db97c05b2e3990aedec0adaa999
SHA2566f3c20f654f2f4aee0752b95d72d9f46ebf467422611b30e9baa5ad1d21a4534
SHA512cbaf2efa919def1d351de8ad8b1e30af4bb754db833019f9d998f1c78a844b933b18c41e8764edd1632be2076fd23cd7f302cfaf3f8ed6538bc90db178db422a
-
Filesize
476KB
MD563ea07b550f22b1f5d5d6897f4d92894
SHA18107c9115d45c7857534f0e0b2d9837304f009f2
SHA256729269e2ce40465fa2b512e2dfea0da818a2972070ae6fa57c92893a1276ea01
SHA512c094235f36a1ecf1ce9082a22d34d33153595c91c941fb1e1bd9d3903e2142e6e7603db184dc19248258027e0b8377aa13f523b84a98c74c5645cd3e3c2cdf8c