Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 06:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe
-
Size
596KB
-
MD5
28d737c36a5928f9905fbcbfc3f176fc
-
SHA1
7cadb3cedeaa6141bdd8d00273d5de0097737bbb
-
SHA256
dd2976c27594b4e40b7dc06e54d8b2f543db95a6afdd7115989aad71b228bf20
-
SHA512
45668a4cde97e989505ae6616734e9c6b8bd8720e543da3bfc7a08dae40c742ea73f1d660ab63a4eebe8315b42ce55fcdb542ce1b05f5c54273d560cb8c840d6
-
SSDEEP
12288:F1PFlJSZtV0IpS2NZ+CzNhhd/JF2r10pnbyZa2FnZJS/tyPgdgUJP:PNOZLJpS2BN9R2pZJOtyeP
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c9d-29.dat family_ardamax -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation rinst.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ar_install.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation inst_ctfmon.exe -
Executes dropped EXE 7 IoCs
pid Process 4372 ar_install.exe 1756 inst_ctfmon.exe 4108 UILT.exe 4784 ctfmon.exe 2000 rinst.exe 3288 ctfmon.exe 4876 svchots.exe -
Loads dropped DLL 19 IoCs
pid Process 4372 ar_install.exe 4108 UILT.exe 4108 UILT.exe 4108 UILT.exe 1756 inst_ctfmon.exe 1756 inst_ctfmon.exe 1756 inst_ctfmon.exe 2000 rinst.exe 2000 rinst.exe 2000 rinst.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4108 UILT.exe 4108 UILT.exe 1756 inst_ctfmon.exe 1756 inst_ctfmon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UILT Agent = "C:\\Windows\\SysWOW64\\YOF\\UILT.exe" UILT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchots = "C:\\Windows\\SysWOW64\\svchots.exe" svchots.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchotshk.dll rinst.exe File opened for modification C:\Windows\SysWOW64\pk.bin svchots.exe File created C:\Windows\SysWOW64\YOF\UILT.006 ar_install.exe File created C:\Windows\SysWOW64\YOF\UILT.exe ar_install.exe File opened for modification C:\Windows\SysWOW64\YOF UILT.exe File created C:\Windows\SysWOW64\svchots.exe rinst.exe File created C:\Windows\SysWOW64\rinst.exe rinst.exe File created C:\Windows\SysWOW64\YOF\UILT.001 ar_install.exe File created C:\Windows\SysWOW64\YOF\UILT.007 ar_install.exe File created C:\Windows\SysWOW64\pk.bin rinst.exe File created C:\Windows\SysWOW64\inst.dat rinst.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ar_install.exe JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe File created C:\Windows\inst_ctfmon.exe JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchots.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inst_ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rinst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ar_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UILT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 rinst.exe 2000 rinst.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 4876 svchots.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4108 UILT.exe Token: SeIncBasePriorityPrivilege 4108 UILT.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4876 svchots.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4108 UILT.exe 4108 UILT.exe 4108 UILT.exe 4108 UILT.exe 4108 UILT.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe 4876 svchots.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4372 4656 JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe 85 PID 4656 wrote to memory of 4372 4656 JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe 85 PID 4656 wrote to memory of 4372 4656 JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe 85 PID 4656 wrote to memory of 1756 4656 JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe 86 PID 4656 wrote to memory of 1756 4656 JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe 86 PID 4656 wrote to memory of 1756 4656 JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe 86 PID 4372 wrote to memory of 4108 4372 ar_install.exe 87 PID 4372 wrote to memory of 4108 4372 ar_install.exe 87 PID 4372 wrote to memory of 4108 4372 ar_install.exe 87 PID 4372 wrote to memory of 4784 4372 ar_install.exe 88 PID 4372 wrote to memory of 4784 4372 ar_install.exe 88 PID 4372 wrote to memory of 4784 4372 ar_install.exe 88 PID 1756 wrote to memory of 2000 1756 inst_ctfmon.exe 89 PID 1756 wrote to memory of 2000 1756 inst_ctfmon.exe 89 PID 1756 wrote to memory of 2000 1756 inst_ctfmon.exe 89 PID 2000 wrote to memory of 3288 2000 rinst.exe 90 PID 2000 wrote to memory of 3288 2000 rinst.exe 90 PID 2000 wrote to memory of 3288 2000 rinst.exe 90 PID 2000 wrote to memory of 4876 2000 rinst.exe 91 PID 2000 wrote to memory of 4876 2000 rinst.exe 91 PID 2000 wrote to memory of 4876 2000 rinst.exe 91 PID 4876 wrote to memory of 768 4876 svchots.exe 108 PID 4876 wrote to memory of 768 4876 svchots.exe 108 PID 4876 wrote to memory of 768 4876 svchots.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\ar_install.exe"C:\Windows\ar_install.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\YOF\UILT.exe"C:\Windows\system32\YOF\UILT.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\ctfmon.exe"C:\Users\Admin\AppData\Local\Temp\ctfmon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4784
-
-
-
C:\Windows\inst_ctfmon.exe"C:\Windows\inst_ctfmon.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ctfmon.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ctfmon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3288
-
-
C:\Windows\SysWOW64\svchots.exeC:\Windows\system32\svchots.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} about:blank5⤵
- System Location Discovery: System Language Discovery
PID:768
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50850d0451f7b387627be1d8448d4e8cc
SHA1f7f346dbb9399a5f3c1e783c66bc82b7110d6f32
SHA256d0f4b9b1c98c68a583e99af328f25220072bf99350407f4d8168cc15714ed9e1
SHA512bb403196ff80b8971486d4a71246de4d4e4b1bbea4505940574ce2d375bc1d55a5ba7606bba9d4b726ad3ef3fe89a1ed377d6d984f2f08fa1f938694fb2f6535
-
Filesize
1KB
MD511ffacd522885e2d4645eb836c9a75e3
SHA174f5fd02421615d02cda770666191d07e35d5f06
SHA256b970efdf7a35305285a81cb7c93630680e3c4c395da25e13b61aae9a063558c9
SHA5121bf7254d196c6d180b682851a9dc6d4d17ec2e0c13dee319b460d23d13ed61c86c61e00818d8ddbdfb72bfe899c3d5997aeb1aa9691d0b5661cbef9572a32bfd
-
Filesize
7KB
MD509bb125ba6fefd2094218121b5935572
SHA1fb7d1366c31f87467fd23e25546611cade20fdea
SHA256413aab1542e3b82c47682a826f1fbabb57f67cd6f17a1a9ffbf94fb2608d906c
SHA512beb1d5f36b3d8a4ac4267accefacb20866fca870dd322b6d98f574e2260c65caddf0fc4d7187ef7f163dd06be365edffabf303e9d94badb369e65cfeed8e1282
-
Filesize
22KB
MD59a00d512f9e1464ad793702cf2b1eda0
SHA139a47a90cd3dd132dbab9f5052dda38dbd7c63f6
SHA25698d257f639ee9df968f77b1f66c78230d07d86e58a7ddf0d306a24af3873dc5b
SHA51218604f20351db1d418f48f2eb023be07588754b428b5d6abb0a7c40d6bf174ce7dcab2ae6e06f22585e12f1bfdb6e408b17bf20e2a7ba137620002ac04b8b4ba
-
Filesize
404KB
MD50c9b3ed8d4103465b06cdbaadb1f0bdc
SHA1ca2ac7aa8fdd6dd00b1baa2b136afc97040cecd4
SHA25618aebca8a04235c238a9d39ccd79c898202e5de7877b22fc80e5dab63eef4951
SHA512b4e786f40144a7f7cfc5b14fa86e1d8264d81838e29af1f87e2e7b2b9b2b4c349b86a477866345a1fa8a5fb7c3480d3141811a2b8ccf8a82e9a6dac66db39673
-
Filesize
21KB
MD5d3a6f7e82f7fa5abfe48a93315eef72a
SHA18e962ef850bbc78b11ee6db13a632aef2243c1ef
SHA256cf27ac55480fb95cd2a6ccbff8cb86bf264d2d519a1c4bd7686869f8a731abf8
SHA512f5fe80d1c3e250bd6331af12db752b98383ae9fefa5173127c2c0af98c4172e56251b19414d0296302b547c9cafc4034a0a3a64356ff9329988fb1b88870422c
-
Filesize
15KB
MD524232996a38c0b0cf151c2140ae29fc8
SHA1b36d03b56a30187ffc6257459d632a4faac48af2
SHA256d2fed8ccae118f06fd948a4b12445aa8c29a3e7bb5b6fe90970fbc27f426f0b0
SHA512c7b855a664d3359c041c68dffe75c118f9b6cef6c91f150686fb51ad63c1b7daa1b37c0a5de04ec078646f83a2bdea695d7d5e283e651135624208c04dc1cab1
-
Filesize
578B
MD5b7663ec1689745f3236ae6dd778d271e
SHA1285043cafe8d36808795d41e838a44fd54ed5c9d
SHA256d168e6b7f7bdf811008a112ac5a5313a8b80af1d0df862e7158c992ea4f8b364
SHA51289ae6a7570fb62906a4af672f5f730acef30f4f66e84fd63963598118bd96e1e0f2f6005a1f3fa7d9934d34e69e3b02405e5e6a7f853b5e0f89a3512a4b9c4d4
-
Filesize
8KB
MD51acf05c81017fb2a272d9c10caeb67f9
SHA1e782df7f04a0146cec392f2200379fc42a4a74ad
SHA256fa5e1d9a2240a678a99a0a11b1d49d6c692bc3ef24a0a1f2cc8f85c1d4e5a894
SHA512c64e5b9c43af483c551b2fd4e143517c79cdef5b4144258f8964695dae3d0e3689194f0be5500369b19d666d0a08b46e15662bc8f1c51e314eee8af54cccb1c3
-
Filesize
5KB
MD51f154a8e3d92b44b66de52ea426c772d
SHA15cca6e4b88dafa2caae56ad98df6ca4bdabbd92f
SHA2566e08d5b0986bd2f6a9f7a981a6d951b9e6b71616ec894a9a3b40a0c12ceb3b95
SHA51206501a567500a05082d03818d33d49f3bf7afcdd5ea6e68ed37f09ed4fe6a945f2e86ce418a86a98d42d436d4b76ffaef2434642c8f2fb24f2f445797e5e8c55
-
Filesize
540KB
MD53fcec6436ceefe496759d5d95a72946d
SHA190741b60963323ccff6aacc4f9a4e947967f3c65
SHA256e9f4f9a93da9c4977f330450aa485665789b5f0d422ede2e67237c64eb975434
SHA51244c675bc06b036c64f364db3198db29a8affce246006f8d51cd8de45c131de575ded4d5e1aefeeccd8c82d52529a3b312379ea524b7e49d662249a61c71aab06
-
Filesize
7KB
MD5fd71c9da6e02190d3745888f43fdb36c
SHA1bf21c2caf604e39f42ae9a6a29aad008f7ffe5c7
SHA2563d1c6121696e14149fb74b47c4f17eb7a77baef3a465216fd071a503896f4d5d
SHA512cf8cd13af95126853cc180d317cf49c370ca042d076ce4a9c7326d35f855f5bbd3bb372eb3f8c363b4164855c7f206c3b8b1c241e01d3bad9c8018cfa5f0c0e7
-
Filesize
404KB
MD52f5d609d4500a45255b90ce7b8f7d3c0
SHA1085cb5756eb14c645b190da6d86c9689f0143b7b
SHA2563afba7546ef28d94b4ec8842f390d9a91e550b739e4c90927f7887903fc34cf5
SHA51287c482bfa3aafff1e9cb5f52aeeb95e6af4053ffb3eb0240ff9d5336e19720c7b4dd983af2a2847cc61520cac9b4fc7f25a720329164c33d69fc0958b2d3dcff
-
Filesize
21KB
MD5a11068817ba83d7b8c61a5c53c5a72ab
SHA1cf4685ae095d5b1e92062c9d299cf9d250b6bab2
SHA2560ee6154256e55de7d451e729c590f5bbf65479503099c3dfeaa10deac6fe4901
SHA512a5ef2ec37eaf688c1fa926349227d25de1c5568c5630e56f8e5e3104ae6ee45275de8599d33d164cd2fc7c5b5dd853433e4228ff553d83228ae3f925446e9bae
-
Filesize
298KB
MD58b9935e635a508afa6ecc522d2e98f75
SHA12266b8da85fcf058b345a2d613d1ef9860a0cb52
SHA2569ba7a0b29b1d119cfdedda7d0edb940ae2021ad0996e478b11f3b71b94adf1ca
SHA512405b904aaa882e7887704bd16b8d2146b97ad33534aaf408269721f092c021eb96136841df807f13144b08a04db4c495703971c17dec3ede84e62677d2556e4f
-
Filesize
278KB
MD582844572ec3f7763ef1dca7881eb6783
SHA17d7ee81b263da2babcc778beb97a809508a64926
SHA256a65c858866f4e3855e0f16ff4ed907ee61a80c89b2d51b957a8fabd2e3aa206f
SHA512dffb6d237a74252d0c0a43c7f2b71fb2e2e8d44e4b081a5a60dbb9d9d83829abfb41b5825e2e79e8c7b727f02b4e09c43b3ef83ab5f97413d4993263fcd48a90