Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2025, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe
-
Size
1.2MB
-
MD5
1e914d39ae7d03acaf2afde93f3983b7
-
SHA1
5771ba41fe84a513646e4a32a13132c78a78646f
-
SHA256
2a5a747b4a9f0797b34d3ddd7e6f3350f8a470dbc559c793c3fcb9e3c9e5760e
-
SHA512
8da4cf1544a7009f89734435d345013987c3aa81898686e417512e18cc0272fe69ad9a9df72b1e1df5d93682beb4c412382803e9a60f84cbe7745b5739fede98
-
SSDEEP
24576:J64MVTe8K7aBlto3Wm1vgmh2t1HKWnK3v4r9epDk3b9BCMj1heVweN:J64MTSaMW9mMqv4opAWkeV
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb0-8.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation FYD.exe -
Executes dropped EXE 2 IoCs
pid Process 4364 FYD.exe 3676 4Char Maker by~XT~.exe -
Loads dropped DLL 2 IoCs
pid Process 4364 FYD.exe 3676 4Char Maker by~XT~.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FYD Start = "C:\\Windows\\SysWOW64\\FRYVET\\FYD.exe" FYD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\FRYVET\FYD.004 JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe File created C:\Windows\SysWOW64\FRYVET\FYD.001 JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe File created C:\Windows\SysWOW64\FRYVET\FYD.002 JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe File created C:\Windows\SysWOW64\FRYVET\AKV.exe JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe File created C:\Windows\SysWOW64\FRYVET\FYD.exe JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe File opened for modification C:\Windows\SysWOW64\FRYVET\ FYD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FYD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4Char Maker by~XT~.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 4364 FYD.exe Token: SeIncBasePriorityPrivilege 4364 FYD.exe Token: SeIncBasePriorityPrivilege 4364 FYD.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4364 FYD.exe 4364 FYD.exe 4364 FYD.exe 4364 FYD.exe 3676 4Char Maker by~XT~.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3088 wrote to memory of 4364 3088 JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe 83 PID 3088 wrote to memory of 4364 3088 JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe 83 PID 3088 wrote to memory of 4364 3088 JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe 83 PID 3088 wrote to memory of 3676 3088 JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe 84 PID 3088 wrote to memory of 3676 3088 JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe 84 PID 3088 wrote to memory of 3676 3088 JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe 84 PID 4364 wrote to memory of 1296 4364 FYD.exe 102 PID 4364 wrote to memory of 1296 4364 FYD.exe 102 PID 4364 wrote to memory of 1296 4364 FYD.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e914d39ae7d03acaf2afde93f3983b7.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\FRYVET\FYD.exe"C:\Windows\system32\FRYVET\FYD.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\FRYVET\FYD.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:1296
-
-
-
C:\Users\Admin\AppData\Local\Temp\4Char Maker by~XT~.exe"C:\Users\Admin\AppData\Local\Temp\4Char Maker by~XT~.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58b1b56bc178788dab32b33e74f986fe9
SHA1d1713599fdfc5a16f7431f037c6b9c5bdc69dae5
SHA256e6c070624e48ead4e15c4426be0ebff125da8c6c2f4e8ba0155aa1956a4df020
SHA512ceb54c4061d588249839a49ac47de1496b407d996491c20cffb242e6592665df2c26864d24612c1f88780f418939f4da482bee3f8b13ee513eb44cadc2279f76
-
Filesize
456KB
MD551507d91d43683b9c4b8fafeb4d888f8
SHA1ead2f68338da7af4720378cd46133589fc9405ba
SHA25671b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b
SHA512a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
1KB
MD5b2e1faa4d63035d9404841e58f7b3cc2
SHA17c79f643507cb502c06b30fd5f9e2f4e821d7598
SHA2565fb9fe2a77ad7e94c456cf983a738418cf7ea0163681d2b09b961456ad92702c
SHA51269dd426a0f81696ac12ead5f858038a0a6de838fac2b345fb805ab06ea8cac4056e6f8596bedd967cd16c524056406c69ffed03c7e08ffcb294fae1586c91c52
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9