Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 20:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe
-
Size
747KB
-
MD5
10e062cab2a8915ceeac731374635d35
-
SHA1
96ee390380f56cb55fc71df372871a92b30d4951
-
SHA256
c9eeab7cff2b60e87771737d2d0723175ced0ed121256c799da02883c1e56d30
-
SHA512
13ae7f8add9ba81e3928c1a8e8cd7990d5c4a32144445ee5405069a6e2c434bd4968c1f1e08db18a92d954b44dadc6b35c5779f1fafd6bd4cb355ff69716faa7
-
SSDEEP
12288:FcE973jHV2Ivi1AunsYRtMyq8dcO5fbgALuo+cTHhDDpQti/YNrUUaSoEyHpwXR:f1bviS9YfMW5fciRpq8YNAeoJHY
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c9e-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe -
Executes dropped EXE 1 IoCs
pid Process 4824 NSK.exe -
Loads dropped DLL 4 IoCs
pid Process 1820 JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe 4824 NSK.exe 4824 NSK.exe 4824 NSK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\NSK.exe JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe File created C:\Windows\SysWOW64\NSK.001 JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe File created C:\Windows\SysWOW64\NSK.006 JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe File created C:\Windows\SysWOW64\NSK.007 JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 NSK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSK.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4552 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4552 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4824 NSK.exe Token: SeIncBasePriorityPrivilege 4824 NSK.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4552 vlc.exe 4552 vlc.exe 4552 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4552 vlc.exe 4552 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4824 NSK.exe 4824 NSK.exe 4824 NSK.exe 4552 vlc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1820 wrote to memory of 4824 1820 JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe 83 PID 1820 wrote to memory of 4824 1820 JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe 83 PID 1820 wrote to memory of 4824 1820 JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe 83 PID 1820 wrote to memory of 4552 1820 JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe 84 PID 1820 wrote to memory of 4552 1820 JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10e062cab2a8915ceeac731374635d35.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\NSK.exe"C:\Windows\system32\NSK.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4824
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\cacheroinhydras_10580.rec"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ccfd350414f3804bbb32ddd7eb3f6153
SHA1e91d270b8481d456a3beabf617ef3379a93f1137
SHA2561dabedfe9c7cda2d8aa74c95ba57fb832a4066b20f4051c0330b4422de237eb3
SHA512328e069aaced9217eb9f4b4f20e27cd7ef933427e3388b3a0829089d694ea2280a2e5511a9eb577cec2a7b409cf367b0f17d8654076931648e152936fad810bd
-
Filesize
654KB
MD545f816fa89ad624034b55d8e24dabb00
SHA1d49b9f56d6c81276c6b4858c9b5013d05f16ee3d
SHA256e552144ed1727e34ce40930671357978ff6044369deecfd1a70da1e9528fd42d
SHA512ca2546428b26aef9be45e0a22c9f2e0ad29b459788b0e6244ffbf83cdc91abebe1d6867d2b51ad1fe4b32874cadab8bed64cbb946bbfd32abf45406240b1e37e
-
Filesize
1KB
MD54f380aaa44175528b931db5e8060ffc8
SHA1baee81d3dda943f3c51b4d6387f643a61ddd9c27
SHA256ba5ee279733ba996ea684ca12a35022e90e7c7b9296b7eeeef8c083a7166ca5d
SHA5126aeb289acac52b5b88127d4554f16c3da67d45b3e5fc7611f6ed379977a2a95568a26f4dc3a2341049aa94995a917321609144fd4db5e06dad6b050f0aaaae03
-
Filesize
4KB
MD50868167c8915fb3d87d4e5a775a57ffd
SHA15f223134e003382fd8c191a1f4ca94922f1d802e
SHA2566a28449ee15745e772f877b6133913325400a2ca3dbf829d76cf42e0c8d6da4c
SHA512d9f82239d6990b3dcc261f99f5acf20d71965b08146821575f830698fa07a5ec7ba0553494bb779e427692ada39ed5973489d1077aeec5ddfdf5a73d9c91b058
-
Filesize
6KB
MD55e023770dfb9d9068706facc958c7d66
SHA19cf95074a78239da000452362c2167991970e972
SHA256f16ca7e5533eb28fa882eb500add2a936f8d0a705cfc9f4e6c8f4c522a2cf6db
SHA512a9621e77fe22b054686924cebee3c9a5c448b2f60bd1d4c8a6d6bda161ec270d9a5c76cbe07dcd1d0ee59fdc071de1d271344c629181e14c2c0a54cbac7831af
-
Filesize
239KB
MD52bada91f44e2a5133a5c056b31866112
SHA19fbe664832d04d79f96fa090191b73d9811ef08d
SHA256c742feab59b4e1b7b188b02ed91ab34eaeb83c87ac6babfb5f08649ed2b8cd02
SHA512dc797a06061937f8dd657a34d4373d3069c9c1a6752752516042e5d135fc41257c7a3a6738b3accd626a02f1887476197eca0ab28cf568daf57269cbe9c8eb41