Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 09:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe
-
Size
482KB
-
MD5
0c5a12e93af6e1594435f9b025833c63
-
SHA1
f76b1f498f820f5e56c79213045a74f11affd21e
-
SHA256
d9a935bb14b63e3da4db302d8daa2ceaa76a18fb55f16ad13ffe5e2cba8d4165
-
SHA512
55688a86ebf329bc16d57af95b09071965dc50529dbbd27f31a41057d1bf16a535857eb3dfe158d95871ba0e2c5a7f6c2b2f1cc9bfc12a8cfe4093ee66841863
-
SSDEEP
12288:FlheTArYwitbntPe68+gZykqbVjSiGIgTiOZMJjNSghm8ea:YuYwi5S+gZykewF2JjQgdea
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b71-12.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation HVDR.exe -
Executes dropped EXE 1 IoCs
pid Process 4728 HVDR.exe -
Loads dropped DLL 5 IoCs
pid Process 3124 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 4728 HVDR.exe 4728 HVDR.exe 4728 HVDR.exe 2280 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HVDR Agent = "C:\\Windows\\SysWOW64\\Sys32\\HVDR.exe" HVDR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\HVDR.001 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File created C:\Windows\SysWOW64\Sys32\HVDR.006 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File created C:\Windows\SysWOW64\Sys32\HVDR.007 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File created C:\Windows\SysWOW64\Sys32\HVDR.exe JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File created C:\Windows\SysWOW64\Sys32\AKV.exe JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe File opened for modification C:\Windows\SysWOW64\Sys32 HVDR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2280 4728 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HVDR.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 4728 HVDR.exe Token: SeIncBasePriorityPrivilege 4728 HVDR.exe Token: SeIncBasePriorityPrivilege 4728 HVDR.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4728 HVDR.exe 4728 HVDR.exe 4728 HVDR.exe 4728 HVDR.exe 4728 HVDR.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4728 3124 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 82 PID 3124 wrote to memory of 4728 3124 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 82 PID 3124 wrote to memory of 4728 3124 JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe 82 PID 4728 wrote to memory of 1684 4728 HVDR.exe 95 PID 4728 wrote to memory of 1684 4728 HVDR.exe 95 PID 4728 wrote to memory of 1684 4728 HVDR.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c5a12e93af6e1594435f9b025833c63.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\Sys32\HVDR.exe"C:\Windows\system32\Sys32\HVDR.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 11563⤵
- Loads dropped DLL
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\Sys32\HVDR.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4728 -ip 47281⤵PID:836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55a159e9341f65fc570232248b8cf51cb
SHA131905d6404692e9f31b58b15075348942612f375
SHA256399cf2fca877cfb6258f0b18db3526acefa3725619c4fa63b238fb5dbe390f66
SHA512a020905c4c15443f81f77f86db3e0ecca19c48dceb5b8608435054fcff56580a175c0f64a2eacc00e6c14c6537b5e07fd41a89e4602157d012fd6e056054d9bf
-
Filesize
389KB
MD5433e840b522e28f86377e1df7cb80baf
SHA1c200505662ba78caae3c4a054c3ca7d62e97be93
SHA2569cb577e77dad05b03969fcf2118ed26fa6ad3bce1d9659fa0934b942c76581f0
SHA512c5dc790a5b40062481bc978c28fc3279236b60b9b907c6dd03fbd4bf52f9bebc3ab38bf0ac0de1f455a4db28639bedaececaad8e7f096f624d3916cf0f362ffc
-
Filesize
510B
MD5109add6e6be4ff769348a4d481fe3cce
SHA1a4b32ec890b7b38e51057d725ede1cda8ec50de1
SHA256aa915790d4d0401e7824d3ec3dfe535db424e8c991a91dd400ae8889f6319b10
SHA512ffa8f931205449e785916bcd3b1091de271d39479dd8fe6233142b4042369157f68be83adfc9d796846a8536e3616add9fb620a360d87cece31b818f513fbf2f
-
Filesize
7KB
MD527534bc0f73b5de819de58995aa1e622
SHA10ac11c296a1daef49f4672a668a20091563866c9
SHA2564c7dc5430b1dc5d402767578402dbc3d824c4ff4be4222b3c24036e45bb9eccd
SHA512f14f9e358507ad49607b22e6da96805178fd23cda5302479ea1c8ef2901bc9fecd02123da9ac9f2043764c9d1f5730c074777fd706e7fdc24b094b0bebf520c1
-
Filesize
5KB
MD5fe107515338fbde5e5307c4f76b96bb1
SHA1df6c1ad7f99bc25243c38fa602c308ccbd09ec85
SHA25626381a466fed113a110752d96640d5c8144a2e4d385b175a17a8f224e459214b
SHA5126adae86847423c72250b5bcdc993d3312ccd46fa0b08702990b352f7b188c55a0a067c0493b191582ac5520d360f3e7ef6788fa48cfcf4d191aa12209786fed6
-
Filesize
475KB
MD5c9ae34faba6dc2ef692069a94baa6d83
SHA11d55c106f34258b8c8b7194bc8a5dbe4781fdd24
SHA25651ca7c0303f667b8cd35dce598c6a9ebc4ccd5da7e37150ad7c01a2cd1d05d0c
SHA5127dbce735aff17ae324ee54c9638995f22f778261d277affe5af763bde37d3918b575f1cb7a4b4323c8b2a6d49c2a918c980224e27136087d82d782ddc1b8ecbf