Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe
-
Size
800KB
-
MD5
942c8edf65dffbaf973393ff3178c922
-
SHA1
2cdfd8436d735dfb6352da25a2e1deb47d541f0f
-
SHA256
b4874457f15d53e824b73c9ec4bdfad3d1dc78f2afb2fae2be2ffbae2c694798
-
SHA512
4514883f81b4c876fb680eb1cfe49b777dec006bc353f0c73deca196e7bd870a3bd8c1c01bbb1ea31b0547d3d7d26b3d4d2dc1c0fde91b83ccf0e294d1011270
-
SSDEEP
12288:HEEGg4qB5v6OZX/kc5DauvXlrjN+xoUCTWULERcjSw3FOx96XJGmIlf:WxqBh6Ot/F/XlrR+xlCqUwRGLXJG3lf
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c98-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4252 BWSN.exe -
Loads dropped DLL 4 IoCs
pid Process 3896 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe 4252 BWSN.exe 4252 BWSN.exe 4252 BWSN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BWSN Agent = "C:\\Windows\\SysWOW64\\28463\\BWSN.exe" BWSN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463 BWSN.exe File created C:\Windows\SysWOW64\28463\BWSN.001 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\BWSN.006 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\BWSN.007 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\BWSN.exe 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\key.bin 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BWSN.exe -
Modifies registry class 35 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\0\ BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\TypeLib\ = "{4535D4D4-C9A0-CF86-D562-26E801DB3D18}" BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\FLAGS\ = "0" BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\Version\ BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\ = "Avezici.Ohibazsa.Omafibov Object" BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18} BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\Version\ = "1.0" BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\ProgID\ = "IMRequestRAApp.IMRequestRA.1" BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\Programmable\ BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\VersionIndependentProgID\ = "IMRequestRAApp.IMRequestRA" BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\ BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\VersionIndependentProgID BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\ BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\0 BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\TypeLib BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\LocalServer32\ BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\ProgID BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\Version BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\Programmable BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\FLAGS BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0 BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\tsworkspace.dll" BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\0\win64 BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\0\win64\ = "C:\\Windows\\SysWow64\\tsworkspace.dll" BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\TypeLib\ BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\LocalServer32 BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\LocalServer32\ = "C:\\Windows\\SysWOW64\\RAServer.exe" BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\ = "SSP Workspace 1.0 Type Library" BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\0\win32 BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\0\win32\ BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\0\win64\ BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4535D4D4-C9A0-CF86-D562-26E801DB3D18}\1.0\FLAGS\ BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\VersionIndependentProgID\ BWSN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6} BWSN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B69FE7-7753-4366-D5BF-76FAFC39F7D6}\ProgID\ BWSN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4252 BWSN.exe Token: SeIncBasePriorityPrivilege 4252 BWSN.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4252 BWSN.exe 4252 BWSN.exe 4252 BWSN.exe 4252 BWSN.exe 4252 BWSN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3896 wrote to memory of 4252 3896 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe 83 PID 3896 wrote to memory of 4252 3896 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe 83 PID 3896 wrote to memory of 4252 3896 942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\942c8edf65dffbaf973393ff3178c922_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\28463\BWSN.exe"C:\Windows\system32\28463\BWSN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD570c6ae41897fd3fbc90821be9f6dcafd
SHA1212294333e175cd4e647bd1738cf1e48de41fae2
SHA2566e8e43f1ef95d0dce19434dbeb9576fdbafcfcd8ff2a1d0ada36516b1c11d634
SHA5128822bc940cf1b64e2ec6b318a7f9702c056fcd45da025091609d9e1c455f6d00e2d9413433f827aad63c29212125d100027e43f4adcb235001b269ba0b6f54b3
-
Filesize
457KB
MD519794a23edc7494063603d316165c04f
SHA16b5050be2ffa32cc3dd0d1e53fa2cfe355c59b4e
SHA25620aa8a967c2982acf1afce320284de9b4749fd3326b63c08fad8921720764b3e
SHA5128f782e06cd32844a336548083eeb50d818ba8acbbba042719da7505dd2d239dc133eedcf244c19901bba7424d2eef60a977b6d6795de9baa6d56ad13c3828774
-
Filesize
478B
MD59a84f999b7d6058bbd25fbba6e3a1144
SHA1364762f20a35af416cd19082db108788132e07ab
SHA2563866c0f67b261a077720620fed668b69e680fee3c4f057b2bfb016b230cc0f2a
SHA512958c4d8e9485e0144ed070fac1f92f4bfeef9f9efa8cac6c91ef8462cb178af492cc0ea1995c8e27b8658db458b03adcc1e4926374d9aea278797449a913b63b
-
Filesize
8KB
MD5bc5fd352bfe50a09ffd84c95f697f9b4
SHA1847a869a2b789c2f5c9845340f133b8845976aaa
SHA2561c1bd72088d746302e15ed63f343bdbabae5ff39f1633e8f60ccd8e20dc0863f
SHA512b52e8a1507b037ec2c5704c495bb53f3275a60ea35f02928117cb9dfe4718a78f77077571cd75bbe70c2b8f993251350db832834c509d1af9a20d00cedb5a197
-
Filesize
5KB
MD5110bdf91b758328b3f33b4ab7d9fd480
SHA129d9ea9f08248307ef20c63cd1f02e8a5256d90b
SHA2569cd15a69297174a062f839ee86f2f583f09952475891683a042f56d04bd581b3
SHA51253efa1f722045a4f446e38bd780af1e5212de6052677596a7628eac2aa4a562c9752ae9859ee92530f5b3ac9ab2717777edbabdcb09f3f9ede2ba6063fe4bec7
-
Filesize
648KB
MD5ee07ce6e1da01ee9aa4a9cf523878dd7
SHA15d964e5919146fd2cd410909c03f3aab456cf062
SHA2564ab1e4414b3659a21a5a39b0edd80e967e73140a809f6a8407e46df963ed8f7b
SHA512487eade2e555e270536c1eeaf82ade3436cb8baef5476959a7de0b74df1082ce1b3917a66bc71965e1d4ba95e043706a543b29cfa485d65edc3102a98174e6b3
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2