Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 08:42
Static task
static1
Behavioral task
behavioral1
Sample
bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe
-
Size
407KB
-
MD5
bc98eb45f61df303243ab468a6b37672
-
SHA1
cde4984c768bd308caa2e7e6ac36a04056f508af
-
SHA256
5daaaa06072b6fb686b65ee3e5c3b003bf638b159c016a5df693d5d88c991cb3
-
SHA512
315a0e71460563e21c373ed4b3702df8d77bbe073fe548bbe730e585d3459782c1a4358f817abb49febc37c403fd7843976dd748d0ca5deb61a53c2f4a11fe0f
-
SSDEEP
12288:E3axEwt22zTNybUfIBYzRi1y9Tn6P727c:E3arjzRGAIBXQn6P72Y
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023ca4-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1356 NKM.exe 3892 Project1.exe -
Loads dropped DLL 5 IoCs
pid Process 3712 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe 1356 NKM.exe 1356 NKM.exe 1356 NKM.exe 3892 Project1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\NKM.001 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe File created C:\Windows\SysWOW64\NKM.006 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe File created C:\Windows\SysWOW64\NKM.007 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe File created C:\Windows\SysWOW64\NKM.exe bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 NKM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NKM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Project1.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3892 Project1.exe Token: SeSecurityPrivilege 3892 Project1.exe Token: SeTakeOwnershipPrivilege 3892 Project1.exe Token: SeLoadDriverPrivilege 3892 Project1.exe Token: SeSystemProfilePrivilege 3892 Project1.exe Token: SeSystemtimePrivilege 3892 Project1.exe Token: SeProfSingleProcessPrivilege 3892 Project1.exe Token: SeIncBasePriorityPrivilege 3892 Project1.exe Token: SeCreatePagefilePrivilege 3892 Project1.exe Token: SeShutdownPrivilege 3892 Project1.exe Token: SeDebugPrivilege 3892 Project1.exe Token: SeSystemEnvironmentPrivilege 3892 Project1.exe Token: SeRemoteShutdownPrivilege 3892 Project1.exe Token: SeUndockPrivilege 3892 Project1.exe Token: SeManageVolumePrivilege 3892 Project1.exe Token: 33 3892 Project1.exe Token: 34 3892 Project1.exe Token: 35 3892 Project1.exe Token: 36 3892 Project1.exe Token: 33 1356 NKM.exe Token: SeIncBasePriorityPrivilege 1356 NKM.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1356 NKM.exe 1356 NKM.exe 1356 NKM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3712 wrote to memory of 1356 3712 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe 83 PID 3712 wrote to memory of 1356 3712 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe 83 PID 3712 wrote to memory of 1356 3712 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe 83 PID 3712 wrote to memory of 3892 3712 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe 84 PID 3712 wrote to memory of 3892 3712 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe 84 PID 3712 wrote to memory of 3892 3712 bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc98eb45f61df303243ab468a6b37672_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\NKM.exe"C:\Windows\system32\NKM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\Project1.exe"C:\Users\Admin\AppData\Local\Temp\Project1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5055d9be92c48b8dbd29370193b620776
SHA16366eb064050f9415837bfd853ee4a363a3a1baa
SHA25625926f6f362c71844d2163d23f0b9955adb8a7e036bd834391f2eb7dbbfd6bb1
SHA512af46d3da7d63872e768847829df6e9179c7d47c26be17ac4ea48f2e18618c03cad2ae2ff3af805ba6cc8e321bfa305cc2f0e2981d74f9b07e0beb0bffe8c170b
-
Filesize
500KB
MD568c7de33ebf4abe5780891a9fe8b0dcd
SHA125b76ba4cde119d094348dde6343bd0ae929cf72
SHA2561ed1280890b51956b2678ffef615ac3ad11cd8ee4bf1000f8a687ad5544bd027
SHA5125e15435f1e35eaea67da9092bc3f3fcea78a6b5e912ce147346269d28f5aa33ee8e9cca5f468287e9d789af2cf397cae6213647ce58d9f1ef1585d41466e11d1
-
Filesize
1KB
MD58fca2a5173bfc76155a77d874f6e5c42
SHA1e51eacd868dfade5e332b936b822979af8f94735
SHA2562f0e62f31334456aabec88159e8890fe13a7eac4351626db5ac7a622b65e0d62
SHA512f4ac6a3eeb21a96c9e135869a674205a3258f75f96d0662e37f29a77e9889163a7928edc263ce73204de3d2769364f9aff17c24ec42105006a65bffede88e330
-
Filesize
4KB
MD5cf2b6b38e667e7245a19fbd79016de0d
SHA1ae11c687270a39199089f7fc5023271df5d9e4d7
SHA256d97e4fc5143e090951fe1fae771e1edcf7bb01c589c8abd36d58a7d053f983a1
SHA512417316a9f353250939dfd752c8734c1d67cea0f0825802c84ed9f368c370e17634f75ac3d3c7201ddac956e07c055c8df1da70e27365694d57ed64b14e166518
-
Filesize
6KB
MD5a6a4100ecd5848e2c59b4564f544b065
SHA1c966bf4b091cef9ce1ba7fbbfc71cd22b70f75d5
SHA2566e69f705d707b8e2c1f4fb927468420660c91a1292b411b2555b738f0c9fac0b
SHA5120d9f968665a68dfbff5331044f53e3c7a5fa50e1c3876fcce2c5c5538b66a093ce020507f866ee609b369d6ce7b6d30c43e5050a4c1b099f858c8ae252e2fb81
-
Filesize
239KB
MD54f5c5fe12e61562705abc9ed53039f32
SHA1fcd283219c4a765226bde9f38041dd1eaf866b0d
SHA256ed679c963691e4c4eda0e94bc860ad78ca30f274219cf0c5adc468153985055d
SHA512f53e6e7506e6a3ae226f0d085727a7df95b1ff050c96698233ae997ee59752b21a5973c0b13e47106ee945379b84d407ed8ac15065cfe582eb30a2a3f158b740