Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 09:23
Static task
static1
Behavioral task
behavioral1
Sample
cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe
-
Size
478KB
-
MD5
cc3e2de7d845f88c9ab555d83e08447f
-
SHA1
7c3c5dbc1af107fc49d12167236d53034794532b
-
SHA256
74a40d435577c42fb797e8e69a7f05cbd80392bf3e2ef02adc7ece271a3c08de
-
SHA512
9469254918594d4b544a608f321b21017d1df1a07630eb70c19efcc93e111e7f22e1f5f7bac86d96f34a594f45eb8b1c31cdefad38157a3522d6e1b24326bc2b
-
SSDEEP
12288:fLL6kSm3hmglja7RjlRi2BdYCwAaaDP8NM/GQ+9RBqg:669M7RxRiQHaaT/G3jBqg
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c95-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3212 system32IUYF.exe -
Loads dropped DLL 4 IoCs
pid Process 3148 cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe 3212 system32IUYF.exe 3212 system32IUYF.exe 3212 system32IUYF.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32IUYF Agent = "C:\\Windows\\system32IUYF.exe" system32IUYF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\system32IUYF.exe cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe File created C:\Windows\system32AKV.exe cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe File created C:\Windows\system32IUYF.009 system32IUYF.exe File opened for modification C:\Windows\system32IUYF.009 system32IUYF.exe File created C:\Windows\system32IUYF.001 cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe File created C:\Windows\system32IUYF.006 cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe File created C:\Windows\system32IUYF.007 cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32IUYF.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3212 system32IUYF.exe Token: SeIncBasePriorityPrivilege 3212 system32IUYF.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3212 system32IUYF.exe 3212 system32IUYF.exe 3212 system32IUYF.exe 3212 system32IUYF.exe 3212 system32IUYF.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3212 3148 cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe 83 PID 3148 wrote to memory of 3212 3148 cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe 83 PID 3148 wrote to memory of 3212 3148 cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cc3e2de7d845f88c9ab555d83e08447f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\system32IUYF.exe"C:\Windows\system32IUYF.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b7ea0bc4bb833ab77dce179f16039c14
SHA1b05cc205aa6ffc60a5316c1d5d3831def5a60c20
SHA256e7bc62fb964bacd8e3189f22a8d64a27bddeb90007a38da3d3e6b58f6d8a2dba
SHA5125a4ad9b469c7502a930158ca2db814b0b84880b2658a6a6dcca9fee60e6c8dc5f8a3c8d09e280a026d63e3d48b5291074827d16f3e680ce87645d8aad996a652
-
Filesize
418B
MD57e09b3bc1554c54ea3b18b980fc3b7c6
SHA1ef3b82f7359aaa57ecb581dd098150ae505b1e7c
SHA25654ba70e7bc1920909f7e37b22e2eef7af542be79955b8782a960edc0393e0a51
SHA512dc2ec7a2760be2f9baf4803e5e45104f684143ef6178d3e8afc21a40ac86302d0df7b96fd313f44fb7f58695215055f95bfba0186bd76c3a9736b2152d6ec6e4
-
Filesize
7KB
MD587ccf7eb039971590aac6f254b2c788a
SHA13095496ffd364b32cdbe63ba4dd2f477fd848515
SHA25659973b04dd9bec56a7ff9d898fda25e9214ee7652f2687ba409b435ae07e554b
SHA512d5f9f7855725021522fae819a855d3d2d2cf028b0ea3ac191ad02039cbb688af42b191a1ec4f1868365e2f7de36acca2b7ba3bee0a7b8447820c4521e942d8d2
-
Filesize
5KB
MD581938df0dbfee60828e9ce953bdf62e6
SHA1b1182a051011e901c17eab2e28727bec8db475fb
SHA256982e2e47e8af4384a6b71937fb4e678a61fbc354f6816204e14a01d325529a98
SHA51264ebe41c17f55f725aeb946b1a7843ad27062490a3e9cc49df7ecb3e5e408444c766236642986cbe499e876e91d1d95d4aafe7d044fda3f5370bbe5f71532143
-
Filesize
471KB
MD5912c55621b4c3f0fb2daef5b4f4f5f4c
SHA1735701c75569b7563950508afc8948b52e7bf4b2
SHA25641ecb7a6e3e9c32ce1bbfdff8fe381f6c21fc1f601f7e9be9fcfa2678d2420a0
SHA51265a08579e959d4beebb5ad026cab451d381e147621be8a0707baca748eaee22050c020e3d54f312376eaf6f20a1fc3713e5e07cc9d4ee7f32b7c17dc15c80d05