Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
f741ddd90dcd1d14e0399c2582857bba
-
SHA1
bec3e9d783a591d1667e8c060868161f3a700ca5
-
SHA256
bddf3f8d7e3246c0eccc53bc2af57ecce1a089bfbb0d4184abbb2153c2794447
-
SHA512
f6f5bb14b550da884f10e78226c1cf42957e17fbd0bd2f5f7bbed1f76ee8b621ebc942265c0e0cba163f58d9b9861a18b7d32b80fba5f700d19ad8e393b4fa56
-
SSDEEP
49152:7GrT6Aj+7Jk6628y+7kBOTOBaWO9fwQr9UPGHWjkerWuFAijtXiS1Wxr:7xAj4/H/+w4T+amQBU+HWjk6XFvpXi1d
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b82-8.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation PQG.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 PQG.exe -
Loads dropped DLL 1 IoCs
pid Process 1684 PQG.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PQG Start = "C:\\Windows\\SysWOW64\\WGEHKG\\PQG.exe" PQG.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\WGEHKG\PQG.001 f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe File created C:\Windows\SysWOW64\WGEHKG\PQG.002 f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe File created C:\Windows\SysWOW64\WGEHKG\AKV.exe f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe File created C:\Windows\SysWOW64\WGEHKG\PQG.exe f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WGEHKG\ PQG.exe File created C:\Windows\SysWOW64\WGEHKG\PQG.004 f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PQG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 1684 PQG.exe Token: SeIncBasePriorityPrivilege 1684 PQG.exe Token: SeIncBasePriorityPrivilege 1684 PQG.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1684 PQG.exe 1684 PQG.exe 1684 PQG.exe 1684 PQG.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4456 wrote to memory of 1684 4456 f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe 82 PID 4456 wrote to memory of 1684 4456 f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe 82 PID 4456 wrote to memory of 1684 4456 f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe 82 PID 1684 wrote to memory of 668 1684 PQG.exe 92 PID 1684 wrote to memory of 668 1684 PQG.exe 92 PID 1684 wrote to memory of 668 1684 PQG.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f741ddd90dcd1d14e0399c2582857bba_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\WGEHKG\PQG.exe"C:\Windows\system32\WGEHKG\PQG.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\WGEHKG\PQG.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD545a56a60fc710085ef72a86ae4de2a44
SHA191133410b770cfc8433b976aa44fc34346e614e6
SHA25682d3a18d8121ad32e61d0c1fc1dabb2073d21ce82431c9d1259e2589aad373e2
SHA512c4322b3b668efd8858ce71e1d80e25f21f75b39d4331d8c88050a8f484e524eac58226dfdbeb89fe569e89a6e93fcbb3300d537666126eb3fbf4fe54136aabbf
-
Filesize
60KB
MD55b79ad0d1d30119158b5ab4147edbd96
SHA16f802d57d49d7063e40b7bebafa8fb1051e0a907
SHA2564ccebd38ac000cbc33a6cfc2e87e900ef64ba4b978f3facfdb5870e217ac3ff7
SHA512497e3eff3c7356cf12efd153b651d1a1ef2cb07302eb5b71dcff0d6732e5273bcff5f82897dff85cdaae0bc159fa9c4588e3bc90ab12521532675bf116757c6b
-
Filesize
43KB
MD5af3efaa90f29f6506693136ae1674fc7
SHA1897aea8f6df7e29d43954512fc390b97c0eb4550
SHA2564658d92f74df5ee142c08157985e25e41f74aaaa4256df9dfc9a011b7c3f0f44
SHA5121a87ce2d0767204b1d636ce70c083c71f5cfa064680218906ff86c233968baca7ef605f2b1d9bfaf8326a8cbff7074ace766604b283c1a2b50d5788038dc9863
-
Filesize
1KB
MD547ac1ecf8bd0542b694001030ca9fe6b
SHA1dfb1aac7b440e04c8270a4e2e35f7cbcd2272257
SHA25635ce1b43633023bae2147fed55d0a7590739c60280056b94c974d8839469a77d
SHA51261ff176d1373ac4a27fa7ccff824f69b270be41a8a085f37012488054f5770ab986b19b31f9e2f717a2b1606c8176a0c1796cbc4694fdae419abbaaf391985eb
-
Filesize
1.7MB
MD578dd492b06d03744d1954781d33775ca
SHA1ef9462193e6ba7be64458ea1be6afcaeadc574b1
SHA256c0664f94e9b2a7817f79b9457c31e524ef72ed7c073e79546d67e857b4637ede
SHA512f88734970018f46b8c4ce350cccf577ac056957e933deb493becbc30b7165834ca68db423850220f8944b364dc97e1423247192faf4f3e4db85cf25c4576eef9