Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 15:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe
-
Size
180KB
-
MD5
b8c800c5a22fbeeb183eecb3b5759470
-
SHA1
7eae8e51e36841240c390846c9c1b06df00b6c81
-
SHA256
8e6d2164679243b757ed0a1610e399db7b5b24bcba098926e67f3a49c51fcde7
-
SHA512
c5f138c64f49f1af9349abd36e2d8076c68e6dd92001606d3deec4446dbfea2863bd3418552e931b3b86d7436a428d33650131b7378776f2418f7ed016b94cbb
-
SSDEEP
3072:6Oi3d9hdevZs0QQRGxXBI064TOadCj7XP3tLvsAeqv9hwO5V:grMExixDXXFLkAFhh5V
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c2f-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Control Panel\International\Geo\Nation JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe -
Executes dropped EXE 1 IoCs
pid Process 4432 NSK.exe -
Loads dropped DLL 4 IoCs
pid Process 4276 JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe 4432 NSK.exe 4432 NSK.exe 4432 NSK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\NSK.001 JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe File created C:\Windows\SysWOW64\NSK.006 JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe File created C:\Windows\SysWOW64\NSK.007 JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe File created C:\Windows\SysWOW64\NSK.exe JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 NSK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSK.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4432 NSK.exe Token: SeIncBasePriorityPrivilege 4432 NSK.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4432 NSK.exe 4432 NSK.exe 4432 NSK.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4432 4276 JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe 86 PID 4276 wrote to memory of 4432 4276 JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe 86 PID 4276 wrote to memory of 4432 4276 JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8c800c5a22fbeeb183eecb3b5759470.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\NSK.exe"C:\Windows\system32\NSK.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ccfd350414f3804bbb32ddd7eb3f6153
SHA1e91d270b8481d456a3beabf617ef3379a93f1137
SHA2561dabedfe9c7cda2d8aa74c95ba57fb832a4066b20f4051c0330b4422de237eb3
SHA512328e069aaced9217eb9f4b4f20e27cd7ef933427e3388b3a0829089d694ea2280a2e5511a9eb577cec2a7b409cf367b0f17d8654076931648e152936fad810bd
-
Filesize
1KB
MD53aa4501b2ee6bf155749545663f1b4a4
SHA1d76eb9ee1198ffdc83854dafd571fae20c3f34af
SHA256cc16ab4af9a916b576afc200f553daf4a1656d7af3a9752d1ce171f8c26e7b9a
SHA512e407d56a98f1479eb877e3cda304523e29a8fe3c850e0b63b379a8975e77d596a27b64b1f064e62b5be02fa7c0fff2addc069df087fa1b0053e2d39caff1d4e4
-
Filesize
4KB
MD50868167c8915fb3d87d4e5a775a57ffd
SHA15f223134e003382fd8c191a1f4ca94922f1d802e
SHA2566a28449ee15745e772f877b6133913325400a2ca3dbf829d76cf42e0c8d6da4c
SHA512d9f82239d6990b3dcc261f99f5acf20d71965b08146821575f830698fa07a5ec7ba0553494bb779e427692ada39ed5973489d1077aeec5ddfdf5a73d9c91b058
-
Filesize
6KB
MD55e023770dfb9d9068706facc958c7d66
SHA19cf95074a78239da000452362c2167991970e972
SHA256f16ca7e5533eb28fa882eb500add2a936f8d0a705cfc9f4e6c8f4c522a2cf6db
SHA512a9621e77fe22b054686924cebee3c9a5c448b2f60bd1d4c8a6d6bda161ec270d9a5c76cbe07dcd1d0ee59fdc071de1d271344c629181e14c2c0a54cbac7831af
-
Filesize
239KB
MD52bada91f44e2a5133a5c056b31866112
SHA19fbe664832d04d79f96fa090191b73d9811ef08d
SHA256c742feab59b4e1b7b188b02ed91ab34eaeb83c87ac6babfb5f08649ed2b8cd02
SHA512dc797a06061937f8dd657a34d4373d3069c9c1a6752752516042e5d135fc41257c7a3a6738b3accd626a02f1887476197eca0ab28cf568daf57269cbe9c8eb41