Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2025, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0505ccc80e3056626130cf980849c308.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0505ccc80e3056626130cf980849c308.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0505ccc80e3056626130cf980849c308.exe
-
Size
1.1MB
-
MD5
0505ccc80e3056626130cf980849c308
-
SHA1
8e6e8f69a87d778e4f57769f935026bfa889635e
-
SHA256
26c17c514f67beae054cbaf91cdd1d61edfce9ac5c955db105bf1e8fc9f6ba49
-
SHA512
19242a1419468e803234084b54ee74e2b81ccd835b804aa0239aaf7df8d78350872df6505dcdb9f374e5523bd77edf81262ce586dc9ff90a480615b09fbcbfac
-
SSDEEP
24576:fH0KuTdySd6Wk9XthnKe2UPcVTO3m3lYJKjrM/Y7GBHYDxBKaj:fH0RTdyr9XtyU0g3m3vGqK
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b7e-8.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_0505ccc80e3056626130cf980849c308.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation CRA.exe -
Executes dropped EXE 1 IoCs
pid Process 3496 CRA.exe -
Loads dropped DLL 1 IoCs
pid Process 3496 CRA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\KJFHSC\CRA.004 JaffaCakes118_0505ccc80e3056626130cf980849c308.exe File created C:\Windows\SysWOW64\KJFHSC\CRA.001 JaffaCakes118_0505ccc80e3056626130cf980849c308.exe File created C:\Windows\SysWOW64\KJFHSC\CRA.002 JaffaCakes118_0505ccc80e3056626130cf980849c308.exe File created C:\Windows\SysWOW64\KJFHSC\AKV.exe JaffaCakes118_0505ccc80e3056626130cf980849c308.exe File created C:\Windows\SysWOW64\KJFHSC\CRA.exe JaffaCakes118_0505ccc80e3056626130cf980849c308.exe File opened for modification C:\Windows\SysWOW64\KJFHSC\ CRA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0505ccc80e3056626130cf980849c308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CRA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 3496 CRA.exe Token: SeIncBasePriorityPrivilege 3496 CRA.exe Token: SeIncBasePriorityPrivilege 3496 CRA.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3496 CRA.exe 3496 CRA.exe 3496 CRA.exe 3496 CRA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5108 wrote to memory of 3496 5108 JaffaCakes118_0505ccc80e3056626130cf980849c308.exe 83 PID 5108 wrote to memory of 3496 5108 JaffaCakes118_0505ccc80e3056626130cf980849c308.exe 83 PID 5108 wrote to memory of 3496 5108 JaffaCakes118_0505ccc80e3056626130cf980849c308.exe 83 PID 3496 wrote to memory of 2040 3496 CRA.exe 100 PID 3496 wrote to memory of 2040 3496 CRA.exe 100 PID 3496 wrote to memory of 2040 3496 CRA.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0505ccc80e3056626130cf980849c308.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0505ccc80e3056626130cf980849c308.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\KJFHSC\CRA.exe"C:\Windows\system32\KJFHSC\CRA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\KJFHSC\CRA.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD53a96acb4dc45307f05fc177cf07742aa
SHA1f8d198305383ac8c1ef2c359a898d1d4f431576b
SHA25614a550138c38cb91d2b9967dfd607bc4a46c6fa6d267a6f5e1c0131162d1527d
SHA5123cba04fc5e3b85c4a7a33bda3ef96091e9763b1db6a76c2ad50a809ebc2232752c331807074b6ab1490182f97d052d24b6e550a74991f65c0b4cea557db87a0f
-
Filesize
61KB
MD5d19ec1c0bd415150fb4d3edf925d9a6e
SHA18df56e86d2459be9cf4b3d8f55bce9b4e1806bf6
SHA2562c0bd5f9a0ba273e594ca613970c6c6ef32c2ad10a1757c77645d267f37a9e68
SHA512b3815767c350c67c5b9823539e71fdefe7b33504b19beeeda6063cc29cfdaaec9767eef4b4919216beab86170da629c8e57e1d7bf6f41dd3cf43331570b021d0
-
Filesize
43KB
MD576a1d9ae4d761069b795d6e891855aa5
SHA11540e9abb812497007aee9885d1ea35e810defff
SHA25602a1f41970ded0a4fb834db6ced2f54b432a29048831de7793bc0aa459970567
SHA5124dc3af04fa7494ea67ef4f44bdb3c681d01ef8cd2ad37c98e5a1b41d7ef10efff1bf55c167f7faac9b0298773a5864d06fb860fee5724463f8eef2c1a978bbfa
-
Filesize
1KB
MD5024cd5f347daec249765f2794c9cbf65
SHA1498f2077566023edb82e58ff06b1809efb4f9891
SHA2567d720c03c8dc1e06718d4a177a6c807555a48ca5be2d9ba9b8367a3a65871dd8
SHA512ae546242d3808f6632e3cb2e54f2798e8c22a03bcd43e0dd26d02c7aa449469b31f5fc6cd2a4e3dda34654824b5ed8ef74ddc7a282f3483f5b8d8ab755acf06e
-
Filesize
1.7MB
MD59be3091aa81569ce6ae396c39a4bdd9e
SHA1805d6fa574027836c13bdd1fae956fd55c0002e9
SHA25674d1f43449380ab7960d9655d897d413010a2171e201ea7c8039a3c9a671fd46
SHA512e1627ecb79a5e4a5fafa1f31fe4c22c5f899eb4f0ea2887da9090b42d3ecba1a0540829b42064aad2779346dad493e25ad428703b932448c1d5973d46b6ba4e0