Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 12:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe
-
Size
548KB
-
MD5
ab346829a6928d63a8ab9d0f37e551b2
-
SHA1
2b1eaae67209ea87df3ef965d7d9b8b8b5c53e8a
-
SHA256
bdd3814b01416d98afb92b704d388f392ef5405766419948337fc27bb56396e2
-
SHA512
f59c3af1e8c7a07babb5b3bba9290cb6b5f0fb8f606405d79bf71426e0530c1e86e023e70bdf3607979c05c54f8bae2091c0a0823d4ba9a2d9d6d9a09d44c233
-
SSDEEP
6144:2HHX+UD7g3XhqPmlcjFJbj8SlgvDr/2CRyper6S+es8pcHNkixuUIpMZ5VRYL4F/:Wx/x4c5dj8UgvHdYMc0YxuU+MAL4FwBi
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023cbc-34.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ardm_serv.exe -
Executes dropped EXE 3 IoCs
pid Process 1944 ardm_serv.exe 3596 Pinnacle.exe 2492 OUCW.exe -
Loads dropped DLL 7 IoCs
pid Process 1944 ardm_serv.exe 2492 OUCW.exe 2492 OUCW.exe 2492 OUCW.exe 3596 Pinnacle.exe 3596 Pinnacle.exe 3596 Pinnacle.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OUCW Agent = "C:\\Windows\\SysWOW64\\Sys32\\OUCW.exe" OUCW.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\OUCW.001 ardm_serv.exe File created C:\Windows\SysWOW64\Sys32\OUCW.006 ardm_serv.exe File created C:\Windows\SysWOW64\Sys32\OUCW.007 ardm_serv.exe File created C:\Windows\SysWOW64\Sys32\OUCW.exe ardm_serv.exe File created C:\Windows\SysWOW64\Sys32\AKV.exe ardm_serv.exe File opened for modification C:\Windows\SysWOW64\Sys32 OUCW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pinnacle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUCW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ardm_serv.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2492 OUCW.exe Token: SeIncBasePriorityPrivilege 2492 OUCW.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 2492 OUCW.exe 2492 OUCW.exe 2492 OUCW.exe 2492 OUCW.exe 2492 OUCW.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 468 wrote to memory of 736 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 83 PID 468 wrote to memory of 736 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 83 PID 468 wrote to memory of 736 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 83 PID 468 wrote to memory of 1944 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 85 PID 468 wrote to memory of 1944 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 85 PID 468 wrote to memory of 1944 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 85 PID 468 wrote to memory of 3596 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 86 PID 468 wrote to memory of 3596 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 86 PID 468 wrote to memory of 3596 468 JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe 86 PID 736 wrote to memory of 3964 736 cmd.exe 87 PID 736 wrote to memory of 3964 736 cmd.exe 87 PID 736 wrote to memory of 3964 736 cmd.exe 87 PID 1944 wrote to memory of 2492 1944 ardm_serv.exe 88 PID 1944 wrote to memory of 2492 1944 ardm_serv.exe 88 PID 1944 wrote to memory of 2492 1944 ardm_serv.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hit.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Webzen\MU\Config" /f /v "Id" /t "REG_SZ" /d ""3⤵
- System Location Discovery: System Language Discovery
PID:3964
-
-
-
C:\Users\Admin\AppData\Local\Temp\ardm_serv.exe"C:\Users\Admin\AppData\Local\Temp\ardm_serv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Sys32\OUCW.exe"C:\Windows\system32\Sys32\OUCW.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Pinnacle.exe"C:\Users\Admin\AppData\Local\Temp\Pinnacle.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\FirewallControlPanel.dll,ShowWarningDialog "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab346829a6928d63a8ab9d0f37e551b2.exe"1⤵
- Modifies registry class
PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD574ff002e34aadbe8a9f7d88d2532c5d5
SHA13c11c399973d2db9a94ad7a089870d026c8c859d
SHA25657d3fc3ef8934afd806d28d705c05637c0bd2d64b91a1a3e87e9bfbbf95f6e8e
SHA512704c6520a7c89e6432776ad31c3334d22db390474c141974fc189c03b84e4618a35707f70f7ab7337bb63775a3cc04c2f70e88d9e3f921cf9ab2116305ed1bde
-
Filesize
56KB
MD53695122fdf4c13d32dc9bbd962b184db
SHA10cc310847e5a92e8c463c9d6c33a029a12c3f993
SHA2569e2ea0ac3c425dc3b003093a82b1587dc98f285852d5a1cd9261877ffa9975dc
SHA512857aa1c19c1c12fa7c0b5e429c07092868265afe0c6416b788957a0275fde683357c20dd1e58460a71d541f496062d9433c0eb80eec52f3ab29aaa103ed55f9a
-
Filesize
480KB
MD5cd28d44962cee104b6873cf0834d1c1c
SHA165e66fef27740d395add739f1a81f8a3313fceb4
SHA25618e6f4576fccc6846fcacabbcdf1bb20839f2a21032d1b08d2ec852c940f694a
SHA5125d3468d61c4b5b2e9ce1fce2dda1513444a5a36e9425bdaaafd1e1d6614de6cbf0a107da1c9daea6b3b6cb032d13048c4529dc07a64e8bfb3651e5a4b1844aeb
-
Filesize
112B
MD5a9462bae83e7f8dcea82fceb2ecedfb3
SHA168431efa134e92052907ef47e36a866e21878559
SHA256262dd81938d5d3611672c050244b7629e70bbbd93f0bd13e4e33c221027d2b06
SHA51228afafca63aed98f8a6c1efb2111d7284a714d753d81d0ff2fe8970b4ab752c1cd06fa0dbfc703b97059632de9cb01ab0aae9d01cac048166160701d27a716ec
-
Filesize
391KB
MD575e14e922eeea4674c45a00335c28777
SHA1f3268f7a91e0cef3ac1b03877daa694655e79fa1
SHA256e103b85edbafbacc8e4ac50378ee4812b68ceccd2b6f2066243ac03674030f68
SHA512b2c5e09c041bc235bf1be0a808c92dc5b8256447be95a0fb4bcfe9160123c63d14a4979eea28f5286a0f3f354c59f032c9a24586dfb7067150dae7339314f6fa
-
Filesize
488B
MD52085ba972166764ca02393d7870db96d
SHA1f9c2a0e6e212b22d62943e111849e8ac6d9139f4
SHA256301da4d5b175957e1eab0e423b07e868d7a1b7f976845fa4b5024699ce7136a4
SHA5121fb4bb9294246b9398582fc23365e3defdb5c960c007dff33ef930602f50eb3dd1f29eb85ee159a9713604655575fa5239af8a6044ae7fc96026ec97d517c44a
-
Filesize
7KB
MD55001bd93dc919785a830ab883eefb04e
SHA1eb4e7b7d42bf4669c1f011fcd0119012cfb957c0
SHA2562027d2ecaa78d0ffdd4234ce531be60f230b8258ae6c001af587f6d73dba771c
SHA51220f6a8fa9e2188aa29d101100edae17d77b4983f3e1dd4696c6fbcd47ef0bbcce392a0733c330dd7a707b0f5bb92720f684b04cdd8c0f1a0b186012001c477d8
-
Filesize
5KB
MD500c2e21155375b96338bf76afea81546
SHA19ec87a26f5a48db97c05b2e3990aedec0adaa999
SHA2566f3c20f654f2f4aee0752b95d72d9f46ebf467422611b30e9baa5ad1d21a4534
SHA512cbaf2efa919def1d351de8ad8b1e30af4bb754db833019f9d998f1c78a844b933b18c41e8764edd1632be2076fd23cd7f302cfaf3f8ed6538bc90db178db422a
-
Filesize
476KB
MD563ea07b550f22b1f5d5d6897f4d92894
SHA18107c9115d45c7857534f0e0b2d9837304f009f2
SHA256729269e2ce40465fa2b512e2dfea0da818a2972070ae6fa57c92893a1276ea01
SHA512c094235f36a1ecf1ce9082a22d34d33153595c91c941fb1e1bd9d3903e2142e6e7603db184dc19248258027e0b8377aa13f523b84a98c74c5645cd3e3c2cdf8c