Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 23:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe
-
Size
1.3MB
-
MD5
64a386e5175a4a56c40192adcf2e4f41
-
SHA1
c0b2470820265bbb7b1c98b6364d9848a60cd730
-
SHA256
af4ed0c318abf3e1a4dc26a8874eeafed5b5902c86d4b6e3242a70fd4f41102c
-
SHA512
b8f3c8421e26c229f02584b13d2f90df58e7ff1a736582dc10e2364fa426673b8a16622f7aa0791da3b8a29d66a6a3762f728afe6548fde6da1a19e9eb10b3c2
-
SSDEEP
24576:t64MVTC2dbHbcH1Dtw9fjhNtqcloYjCMyQQBho+q4pSJV29Vfszo4Z5rPcLfu/Mh:t64MTCa7y1hwJN7zbuMyPu+gJVSEd5rp
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b81-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe -
Executes dropped EXE 1 IoCs
pid Process 1552 DTD.exe -
Loads dropped DLL 2 IoCs
pid Process 1552 DTD.exe 4000 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DTD Start = "C:\\Windows\\SysWOW64\\AVMEKS\\DTD.exe" DTD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\AVMEKS\DTD.001 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe File created C:\Windows\SysWOW64\AVMEKS\DTD.002 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe File created C:\Windows\SysWOW64\AVMEKS\AKV.exe JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe File created C:\Windows\SysWOW64\AVMEKS\DTD.exe JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe File opened for modification C:\Windows\SysWOW64\AVMEKS\ DTD.exe File created C:\Windows\SysWOW64\AVMEKS\DTD.004 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTD.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2676 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1552 DTD.exe Token: SeIncBasePriorityPrivilege 1552 DTD.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1552 DTD.exe 1552 DTD.exe 1552 DTD.exe 1552 DTD.exe 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE 2676 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4000 wrote to memory of 1552 4000 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe 82 PID 4000 wrote to memory of 1552 4000 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe 82 PID 4000 wrote to memory of 1552 4000 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe 82 PID 4000 wrote to memory of 2676 4000 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe 83 PID 4000 wrote to memory of 2676 4000 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe 83 PID 4000 wrote to memory of 2676 4000 JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64a386e5175a4a56c40192adcf2e4f41.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\AVMEKS\DTD.exe"C:\Windows\system32\AVMEKS\DTD.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Quotation.xlsx"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191KB
MD5be477786a126f5f1f52cb2d3948f9ab0
SHA1daf553b4fec750833ae3fe040c01cafa4e06ca13
SHA25644262ec48dc79a4b87afaeb04a1ed4ee5b54da1e51befca6a44ac704f3db1957
SHA512b4f8273dc1c034fd7f21a5801f5c4ffbe7830da5a14a088b9b980e4ea21fc57fa9cff08dda3a479bd7a8380719fe87cd0117ef0ce089c486329d1a51088349cb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD50588426afbb47f43409891d8bf403b7e
SHA13b4b6bf32cc6ed241cec0f24b5ccf8eb3ad88d6d
SHA256f77639967ab89544df9ff698d3b25c10d7e43a254d9a68fd164038af5a9a1138
SHA5127bdf9b7570b8d8a589e40cc7a47fcb696f30baaf4b7518e9149092305109a54ce1b21ffbfdf250c360076e247b2b6bd37c840689d8c983677f0c36d4a8964361
-
Filesize
456KB
MD551507d91d43683b9c4b8fafeb4d888f8
SHA1ead2f68338da7af4720378cd46133589fc9405ba
SHA25671b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b
SHA512a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
1KB
MD537b5242db43391629865f006f0a8f6f9
SHA1e04d6bed1db2afcb4c827af0ee2ae68be90a7e60
SHA2567fdc8e0309a3b2e7f4271fe1962144a95316d2074bbec2e2b0353fb715d62fbb
SHA512ecaff5fb1d3b57df715be16ef477a1ac899e4ac7a7ce67719ad2565eb124507492ae2172309b8f2e932bd52c1c7032ecccdad340aefd13e0a0db3d5c47ebb5e3
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9