Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 00:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe
-
Size
855KB
-
MD5
693e62ce74a5697fefa3e5172a4f3101
-
SHA1
5397828537a28db5c14f8d322a7e8549cdfa312c
-
SHA256
554bb492450cd14c8a3b111be828d4d819da96f72338a9902a96663aeae3644a
-
SHA512
60c5c99776f2988b4f247d55ba51e641f3cb4baccc5da8603e50b8f832dd4098d790eea4479e3bf383a8ad8741cac255b661a82fac7a66c9af5a9ddab14a8707
-
SSDEEP
24576:PAZjVYovuomCVwuxIsLnbZOw4aZfqp0Pjjm3p9OsFRi:PANrNBGsPZ+eHm3pYsFRi
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb2-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe -
Executes dropped EXE 2 IoCs
pid Process 4120 MVGN.exe 5076 w3w.exe -
Loads dropped DLL 7 IoCs
pid Process 3648 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe 4120 MVGN.exe 5076 w3w.exe 4120 MVGN.exe 4120 MVGN.exe 5076 w3w.exe 5076 w3w.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MVGN Agent = "C:\\Windows\\SysWOW64\\28463\\MVGN.exe" MVGN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\MVGN.exe JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe File created C:\Windows\SysWOW64\28463\key.bin JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe File opened for modification C:\Windows\SysWOW64\28463 MVGN.exe File created C:\Windows\SysWOW64\28463\MVGN.001 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe File created C:\Windows\SysWOW64\28463\MVGN.006 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe File created C:\Windows\SysWOW64\28463\MVGN.007 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe -
resource yara_rule behavioral2/files/0x0007000000023cb5-22.dat upx behavioral2/memory/5076-56-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5076-73-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5076-77-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5076-79-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5076-81-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5076-83-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/5076-89-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MVGN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w3w.exe -
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\InprocServer32\ = "%SystemRoot%\\SysWow64\\iasnap.dll" MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\ = "Microsoft ActiveX Data Objects 6.0 Library" MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\0\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\0\win32\ MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\FLAGS MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\ = "Ganam Macalec Class" MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\ProgID MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\0\win32\ = "C:\\Program Files (x86)\\Common Files\\System\\ado\\msado15.dll" MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\Version\ = "1.0" MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\TypeLib\ = "{72DA4BA7-861E-8AFD-CACA-859875F1F022}" MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\InprocServer32 MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\0 MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\0\win64\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\0\win64\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\FLAGS\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\TypeLib\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\0\win32\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\FLAGS\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\FLAGS\ = "0" MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\Version MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\InprocServer32\ MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022} MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\ MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\0\win32 MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\0\win64 MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\0\win32 MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\TypeLib MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\VersionIndependentProgID MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3} MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0 MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\0\win64\ = "C:\\Program Files\\Common Files\\System\\ado\\msado60.tlb" MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\FLAGS MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\0 MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\0\win64\ = "C:\\Program Files\\Common Files\\System\\ado\\msado15.dll" MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\Version\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\VersionIndependentProgID\ = "IAS.PolicyEnforcer" MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\VersionIndependentProgID\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\ProgID\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\0\ MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\0\win32\ = "C:\\Program Files (x86)\\Common Files\\System\\ado\\msado60.tlb" MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.0\FLAGS\ = "0" MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1 MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\ = "Microsoft ActiveX Data Objects 6.1 Library" MVGN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{72DA4BA7-861E-8AFD-CACA-859875F1F022}\6.1\0\win64 MVGN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{307612C7-80D5-49DE-1BAD-6E5F8C34D5D3}\ProgID\ = "IAS.PolicyEnforcer.1" MVGN.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe 5076 w3w.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4120 MVGN.exe Token: SeIncBasePriorityPrivilege 4120 MVGN.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4120 MVGN.exe 4120 MVGN.exe 4120 MVGN.exe 4120 MVGN.exe 4120 MVGN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3648 wrote to memory of 4120 3648 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe 83 PID 3648 wrote to memory of 4120 3648 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe 83 PID 3648 wrote to memory of 4120 3648 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe 83 PID 3648 wrote to memory of 5076 3648 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe 84 PID 3648 wrote to memory of 5076 3648 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe 84 PID 3648 wrote to memory of 5076 3648 JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_693e62ce74a5697fefa3e5172a4f3101.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\28463\MVGN.exe"C:\Windows\system32\28463\MVGN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\w3w.exe"C:\Users\Admin\AppData\Local\Temp\w3w.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f1cf9fcbddeadabb738de497ffefdced
SHA17385a7c87e245da89cc5ef8f9295678c1566f25d
SHA256086083bc73b14286f9c3c29df8b8dc6f014d8b084267fbaeee0af56344d1f779
SHA5123a3b9d279b4c131ef3f358e0163f60ec9e60160a2cc45488adb915fea6642f3df5d35da2ccb6983d790401d237fbc808829f42c42ef958e7a0eac98fc33bb3f6
-
Filesize
262KB
MD5e974a7ed7fa0c096aa1f59ae6d8cce72
SHA124b215e712fa745ac94d033ee7c5a556a5df0dab
SHA256d042a6add7b1547e5165d0c0c0f0eb21ee778b44c27e0a2bbce9f02b79156c0b
SHA512156cfa7b252d8737a4d3fdc3f8095353051d7f15e1293d6c1213de36ea44d526fd94e75765b3a1f75ed83f9b02dd4329b9eab466e9188fea107e622d0c1d6ba4
-
Filesize
396B
MD54756192143ecb44658e427bc09f31134
SHA19442ff0bf1e27e5ef9a72a4dc04d23ebaf821f29
SHA256a0eeccc7dec75908c92d9570a4ed3a0c1a5a860c7e0cc8564a9c0fccb44a98aa
SHA512df3f3fcbc27fc3d52667f298907fe871a4d6133f17c594f822e46430de916707f9378f776141d80063fb036b0caafeb5552112a0833aba74d5a68567b4223e7e
-
Filesize
8KB
MD531854a50b294dd312eb7fa9eb1c99537
SHA1e0b1682a001e15d0e0e1c1ca732cafb5c80b3160
SHA2562fe2d55aae2deef38a37c9679d74ecf05699d6919760794f69583b43b7fe308c
SHA5120482a4981ba242d4e931bd8b9eb5d606492cffb7609fb69fb349ed19c7a9e36a7e240e5ebe759505d253c5e72fb771612a76419c36fb035987a166569a5111c2
-
Filesize
5KB
MD5603451f504bedb28c3a7bae4c89abf24
SHA1cbfe12186b54663f60663c349739c7a49950c44e
SHA256e4d6577ea390274308877284b6d0cd6672aeb0e76c9c9847ac59c0964f050d13
SHA512136e28e288b3ce26b37c82b078a3440e3232c0f874d7d33e8e6fb6eadfd0024b9009448500c716523b81f142fa3bebf7d11f1dd3e8e6143867b06335eb5f9612
-
Filesize
648KB
MD5ce568bcaf7285124f764aff92f5079d4
SHA1886f698e2239cf615f12b503853a5fa28c53aefc
SHA25659d7d6de8a9e2d5535703d22c36888889530fd011d7f71cf034e93e36e7527af
SHA5129f6e3496930cb5dd9c9403acc865bc94f63f64af49a27ffeedbc9d9082d50bff4a7a772bb98d4a2719f0ecae144393de9cc273ba83ae00abe347b0be0d7c9866
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2