Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 12:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe
-
Size
1.2MB
-
MD5
571ef046eab5c379fc64153e4848aca3
-
SHA1
c793a1dff416b5c75921a4f52c39798346884a33
-
SHA256
1634f4106875fbc88eeac1080034e08f85c280710962e7aec71037081361ad37
-
SHA512
ee8524e05627f4a9c9fdae071a0bcc75523fdfebc84ba46f7d80e4b4fa26d8695198d127b5428a66dda96aee77cb2cde9a59a4d480660d622ca41413d6376287
-
SSDEEP
24576:fITTLuMazgpHXiNr3o6TCiTrnyeyPW3EFVCUUKwOPgzw/NqyE:f6TLWghiNrZHTGBNCUUaj/NR
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b84-8.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation PUT.exe -
Executes dropped EXE 1 IoCs
pid Process 4072 PUT.exe -
Loads dropped DLL 1 IoCs
pid Process 4072 PUT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PUT Start = "C:\\Windows\\SysWOW64\\EKYEHA\\PUT.exe" PUT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EKYEHA\ PUT.exe File created C:\Windows\SysWOW64\EKYEHA\PUT.004 JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe File created C:\Windows\SysWOW64\EKYEHA\PUT.001 JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe File created C:\Windows\SysWOW64\EKYEHA\PUT.002 JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe File created C:\Windows\SysWOW64\EKYEHA\AKV.exe JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe File created C:\Windows\SysWOW64\EKYEHA\PUT.exe JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PUT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4072 PUT.exe 4072 PUT.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 4072 PUT.exe Token: SeIncBasePriorityPrivilege 4072 PUT.exe Token: SeIncBasePriorityPrivilege 4072 PUT.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4072 PUT.exe 4072 PUT.exe 4072 PUT.exe 4072 PUT.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3564 wrote to memory of 4072 3564 JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe 82 PID 3564 wrote to memory of 4072 3564 JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe 82 PID 3564 wrote to memory of 4072 3564 JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe 82 PID 4072 wrote to memory of 1688 4072 PUT.exe 92 PID 4072 wrote to memory of 1688 4072 PUT.exe 92 PID 4072 wrote to memory of 1688 4072 PUT.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_571ef046eab5c379fc64153e4848aca3.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\EKYEHA\PUT.exe"C:\Windows\system32\EKYEHA\PUT.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\EKYEHA\PUT.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD564a6cc55dc76d26448c30a8a1885f7cb
SHA1149e467026647e080b4c69ab4f99b2d3c2b4dbe4
SHA2565cbc0ec73c901be4ac182e13f6869f6f8cf0831b9603e542a3919f6a06087640
SHA512de8cd7bea8113871ce8a36966fbaefd02b8ef7b09a8cbb631b4ac353bdf65b27d5630146ed700fd6edbc4276f4368ebad76b772d9b84349ddc2bd6f7127c377d
-
Filesize
61KB
MD5bf311791d2f9ea9c82a8d4764a98c0d8
SHA1405ba2bd110590abd0bf340d12e054405afb011f
SHA256d720cf3d297743da7ab1da528f4c086a29d59ef553e1a96569b49a59831d583b
SHA5128be092f068807767b0065de10f9da386b90d8e587356881ba3391380b953b199e818b527e74b305d7c714fc94cb6f8e66c76d89d1785fa9910aa4cb39c5cada8
-
Filesize
44KB
MD5ce365878123962c3438e349621c10198
SHA15b861d9fc2923c61ef390a0b729a21078aa5fd59
SHA256ba254f6675490a045d4c85a5f46681c175c1321692c20fc808c7c244173dd63f
SHA512efc6f143d5e9244a6635562d7e9a9cea22ab7e7b304e933642a51d66da896e9038208b86c12f6da623a01b9175e73eeb40ab600e6625db3595144bfca1231a76
-
Filesize
1KB
MD54c1729b1570eb0eef2f119c41ed41da8
SHA1b11e3068eee03ce3e29fc6d54277bbbab2686cb5
SHA25644799d58031055406c2c665f5e50c40b8607e1a282df3da6bfcf186a0d349dda
SHA512773ddb74d8b52321a46fa98dd8bd8e1112655937b50b850f66221c45e3c8b22e169b6297fc333a2f9b477a273e887c1337308605d2c248d7cc157e51f54d5d7d
-
Filesize
1.7MB
MD58f7590bbba70748e69612e9e2d5a9f2e
SHA1f3ad9834bc38f33fe501b9076c65ac29d0410578
SHA2562dec3a8fb4a5b198335e7f4a9b611194b0a081abf0c56f9df3f4e2697e69d9e4
SHA512347e9ac793afd627e064ecdfea61c3e2b626ace0ea41928aad93a72567048b8e9bdf773f8a4a59a0d96ce8c08612c542c15982e8051828bef025fea6132838c6