Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 07:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe
-
Size
1.2MB
-
MD5
e0c4fb2fe31227a5da453bb02a589fba
-
SHA1
ceacc28e9b878549f6db96cf3dad2949373cc9f6
-
SHA256
abaa95fa3b6678259ec7df1354fc369794699b8319e37f6d3e5ae19adeac7f6c
-
SHA512
86924b3af055290859d7d29a402ed13c82400028957988a6af12a1e3601568f2c280836f14f75170116f13414899bf5dca5634665fa4e2bf679e94fcc5179103
-
SSDEEP
24576:B7mblEFT+c35HxdzEiJFq/5U0cxnG0tiZx3ycyGn/A5sjrVuUxK:BSb1WV3giJFq/qZxnGTxXjrVV
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023ca6-16.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 1868 SYM.exe 368 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1868 SYM.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SYM Start = "C:\\Windows\\SysWOW64\\JDNQHM\\SYM.exe" SYM.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msconfig = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\msconfig.exe" JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\JDNQHM\SYM.004 vbc.exe File created C:\Windows\SysWOW64\JDNQHM\SYM.001 vbc.exe File created C:\Windows\SysWOW64\JDNQHM\SYM.002 vbc.exe File created C:\Windows\SysWOW64\JDNQHM\AKV.exe vbc.exe File created C:\Windows\SysWOW64\JDNQHM\SYM.exe vbc.exe File opened for modification C:\Windows\SysWOW64\JDNQHM\ SYM.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5004 set thread context of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\svchost.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1868 SYM.exe Token: SeIncBasePriorityPrivilege 1868 SYM.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1868 SYM.exe 1868 SYM.exe 1868 SYM.exe 1868 SYM.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 5004 wrote to memory of 3948 5004 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 83 PID 3948 wrote to memory of 1868 3948 vbc.exe 84 PID 3948 wrote to memory of 1868 3948 vbc.exe 84 PID 3948 wrote to memory of 1868 3948 vbc.exe 84 PID 3948 wrote to memory of 368 3948 vbc.exe 85 PID 3948 wrote to memory of 368 3948 vbc.exe 85 PID 3948 wrote to memory of 368 3948 vbc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\JDNQHM\SYM.exe"C:\Windows\system32\JDNQHM\SYM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\svchost.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD527c6d03bcdb8cfeb96b716f3d8be3e18
SHA149083ae3725a0488e0a8fbbe1335c745f70c4667
SHA2562910ebc692d833d949bfd56059e8106d324a276d5f165f874f3fb1b6c613cdd5
SHA5121ea76bd898f96603f3aec695eb7bedcef8b4e1b27253ecb98035ac5ea42745c0da6b5523f8848cb0e6acb58710d8f2973368763e7b3895fa28d999552c9030d3
-
Filesize
456KB
MD521f320807b5479ddb03b1981ca2cc54c
SHA1ae0844c40a3d9027ad0d2a29aa9cb2b1f1ac3c8d
SHA2563d99e3eca8974b98db2e9888c658ba8afbbaed54b2b8e2a925024dca1082e700
SHA5120052c3480f8f627988150de7ac7cb7d63114b290b377da7e9c23a99f390d0a722895966a06caf47a3c6f61dc4721fc514e3e7da0c2c765d67312c245cf0ab04d
-
Filesize
60KB
MD562552c56e9c05aa1112bcf92efa946a2
SHA1b5e08769e234723787587e1b3e781ee62e19b579
SHA2565157138cdbf25cdcf3f085412c8be127199c253e425205a57386434a22ead3c6
SHA51218a399b95baf162b0e34f7fa9b41a0d760958b5adf9d92a4b388794a70efd9a497255ef2cf3c25e794596898e4c7fea47088792d641fad0e65dceb1d6dab974f
-
Filesize
43KB
MD53a7c6b1d26ec2d9d7791acb049d59be9
SHA14b53f01e2ba102a26f17ff4e537ee6a83562618c
SHA256784a603f8ee0550d5d694d8c384d6b70b6b4997c0840259f3483f295778627ea
SHA512f42b42a66822e9e5975252fb7e65634a646e0397aef4e535b7e9d5d7cef9a8dcd651ebced08afd4b26cce58e4f810c18f6fc0c19530c7d0dcb2f57d07cec6ce6
-
Filesize
1KB
MD5e0a8f83d6055c4911daece75bc6c5cfe
SHA1f73c47d2b7f13911447a9f5abb5cd43872868530
SHA2561de057a47ddf6b95c6da1d52934d6eb5e80e6e7c557d135470237ebab0a1824c
SHA512fa6b7366c961f773e2105f96adff59641184fbe7c99aed6377ef9a94f7dc93a3bacc4977547eb5f49325e9a3320f65438c45be1d5a256ed06ea46acbbb4ce1d1
-
Filesize
1.7MB
MD5c6245ca8664ba4c0884e9c5dfb5a5ba9
SHA1b10ec86db035936f2a610acd3594c2cfe414d44e
SHA256be34a2223a8294779aa9dbf8fcbf1434c246756711ee259cfd99378d4f5c1049
SHA512177b2935e6918fdd14ec8e59201e269955de6d65d18f36640356bc8942aae54ffaeffa222358edefcbf1e1a1f47798f50c0fb4217919c3b817bfd82bd0d98c14