Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe
-
Size
195KB
-
MD5
f79e4dcc14eb4a917e62b208f4a9abdc
-
SHA1
0626cb3f5449e2c61656ef021a2c35915e990d5c
-
SHA256
086f4688e82bf0a6dff1bb3495aff79b25153c33dadba8ea20bc17072ef20d40
-
SHA512
99e9fd25cec80a83745977a1874c81dbdb190ad65001342953357ea8bdc4b30a2d5a439884c793628b36716781fc14254d5367f6950d234afd00aec576ea71f5
-
SSDEEP
6144:cmpyGqIXypENwC9qKy+8Fs81In9gTK6NrZMVVd3ToOHCx:c6Cp4wC8KyLn1Iy6pT3HCx
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b66-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3808 Retro-Builder.exe -
Loads dropped DLL 4 IoCs
pid Process 1860 f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe 3808 Retro-Builder.exe 3808 Retro-Builder.exe 3808 Retro-Builder.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Retro-Builder.007 f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe File created C:\Windows\SysWOW64\Retro-Builder.exe f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe File created C:\Windows\SysWOW64\Retro-Builder.001 f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe File created C:\Windows\SysWOW64\Retro-Builder.006 f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 Retro-Builder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Retro-Builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3808 Retro-Builder.exe Token: SeIncBasePriorityPrivilege 3808 Retro-Builder.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3808 Retro-Builder.exe 3808 Retro-Builder.exe 3808 Retro-Builder.exe 3808 Retro-Builder.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1860 wrote to memory of 3808 1860 f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe 85 PID 1860 wrote to memory of 3808 1860 f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe 85 PID 1860 wrote to memory of 3808 1860 f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f79e4dcc14eb4a917e62b208f4a9abdc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\Retro-Builder.exe"C:\Windows\system32\Retro-Builder.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5683f1f1e72a9fd91018e379b0f45c646
SHA1e715798afee630bca17bd35e382626399e608788
SHA2560770043fa8f879787c32f97e915295320738b28dc5c7a07a033df6d9ac5b4e50
SHA512490a8fcc256fb97bdaf0ef7a243998338b3796db448874ed85613a087e16a9e1b0105af3deb57e18db253e550e5c8a0fd02dba1e52f4959937ffb6c587e3b8f5
-
Filesize
2KB
MD51e2945e1d4800c284939e90506d34372
SHA1b6a93d662b1d2c608c8ebedaa4770c7b43deec73
SHA256d5f9c3a71803320eea831b834e95d6fe328be321f6a4eb4f011ba3968640aca9
SHA5128f63a194e9cae64bcfbf9ae71587b820375291d776b5e0a0dd2fcf050c910853694ed04b9f7bf278c90acbe09cd19a9adf34456919df56e29381849e3dd2c7a2
-
Filesize
5KB
MD5b8e130b146557e640cb3e198f3d9110e
SHA1c1cbebfce4e3af8ced7d1019586e91c371432d78
SHA2563dbca63a39382e4c25d0b02e668ba72c5c81071bb62937ec939325f1f89926a1
SHA512bc858367e64188c3a365fff4c7986e86d6d666651b2421e3b96fe06836aede073f2228349f66f1836e6ef98bb8e5120354c54a0fb13059e5b875bbf34ed7868f
-
Filesize
4KB
MD5097c525e86f64364479227f1603a0221
SHA1c84897900f59cbff5f607368ceba93bfc5273998
SHA2561b62745c0181f36b7c0227225da12c0d357fd6f14ff8a0ea8484fd4a9c6bf766
SHA512b52b9d51c3bb50fab292c8bf13d2d87694391481742830c266f4512b2e33a16b852cdbf3faea7f5945b60415a12d1d6a0e9319500cb769b12e0a03357f66ef12
-
Filesize
295KB
MD52b8def730c5bab9d9b58e117af9fb84a
SHA1090c2c4f0309895bad639ba1c0af21d1eb70d987
SHA256759f339edba9126cd77ee621e6852f281b9a3190bc4aa17711164bac5ece41a7
SHA512809aa7300e4bef33489f4166fd5b8245a9b9523c9fd908a37b51a0384966f8f036ac09fbca3730bb04b98ff976c17380ddc4c2ed75dbda51350f049b3d0bf48a