Analysis
-
max time kernel
105s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2025, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_75c568792986ed590151d4636eec2b28.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_75c568792986ed590151d4636eec2b28.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_75c568792986ed590151d4636eec2b28.exe
-
Size
424KB
-
MD5
75c568792986ed590151d4636eec2b28
-
SHA1
e6ae10d6c0d6dbf260c1cde407c5683d9e69472f
-
SHA256
8d7a45535e6d97ae9e1fc1913effad1ee3d4e42734ffcd0f14ea96d988e417fb
-
SHA512
0062f6f04744f68e75a6a911eac0543e547aa234a5c28a03cc1104d736d9ac2e05939f7436893221a8c1de2710d886143ec6966f9c85b59f38f03e9fcd940ecf
-
SSDEEP
6144:xRdo3kYeO2bYZRaC6CyQk7qIOvFtC2vJuqVAGF8Tq5bDt2vDdwYZFeExu0dF6UWx:xombYKC3IOLb7yqodweeEEaFDWqDe
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000242d3-21.dat family_ardamax -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation JaffaCakes118_75c568792986ed590151d4636eec2b28.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation Installwed20.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation VDKS.exe -
Executes dropped EXE 2 IoCs
pid Process 4932 Installwed20.exe 3704 VDKS.exe -
Loads dropped DLL 5 IoCs
pid Process 4932 Installwed20.exe 3704 VDKS.exe 3704 VDKS.exe 3704 VDKS.exe 4748 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VDKS Agent = "C:\\Windows\\SysWOW64\\28463\\VDKS.exe" VDKS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\VDKS.001 Installwed20.exe File created C:\Windows\SysWOW64\28463\VDKS.006 Installwed20.exe File created C:\Windows\SysWOW64\28463\VDKS.007 Installwed20.exe File created C:\Windows\SysWOW64\28463\VDKS.exe Installwed20.exe File opened for modification C:\Windows\SysWOW64\28463 VDKS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4748 3704 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installwed20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VDKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_75c568792986ed590151d4636eec2b28.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 3704 VDKS.exe Token: SeIncBasePriorityPrivilege 3704 VDKS.exe Token: SeIncBasePriorityPrivilege 3704 VDKS.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3704 VDKS.exe 3704 VDKS.exe 3704 VDKS.exe 3704 VDKS.exe 3704 VDKS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1404 wrote to memory of 4932 1404 JaffaCakes118_75c568792986ed590151d4636eec2b28.exe 87 PID 1404 wrote to memory of 4932 1404 JaffaCakes118_75c568792986ed590151d4636eec2b28.exe 87 PID 1404 wrote to memory of 4932 1404 JaffaCakes118_75c568792986ed590151d4636eec2b28.exe 87 PID 4932 wrote to memory of 3704 4932 Installwed20.exe 88 PID 4932 wrote to memory of 3704 4932 Installwed20.exe 88 PID 4932 wrote to memory of 3704 4932 Installwed20.exe 88 PID 3704 wrote to memory of 5144 3704 VDKS.exe 95 PID 3704 wrote to memory of 5144 3704 VDKS.exe 95 PID 3704 wrote to memory of 5144 3704 VDKS.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_75c568792986ed590151d4636eec2b28.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_75c568792986ed590151d4636eec2b28.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Installwed20.exe"C:\Users\Admin\AppData\Local\Temp\Installwed20.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\28463\VDKS.exe"C:\Windows\system32\28463\VDKS.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 10724⤵
- Loads dropped DLL
- Program crash
PID:4748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\VDKS.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:5144
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3704 -ip 37041⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD527092ec75c1839f36bfe900a38acc484
SHA1fe14b750a0ed653246c5f358891f8c1241913bb2
SHA256e6e29699840ae26c452227f9a1c9fd0e3cda0c2413c4255df9fc066c47af0e07
SHA512815477e8681e38dd3110171adbaf06738eb9d63839671a959a296ec1a1fb17d788682dde5e6a1f0bffa3b4deda4577292ffa37ce10b95ad14276ffcd0795ac0b
-
Filesize
294KB
MD57ee9df4741965d2d0f4bf757f033fac4
SHA1803568ee140eb3348c31f75a453b26b8a9dd6a9f
SHA2569310d2afdfe89f2ed31c25e944cdca379f8d038880b2f5775c45d0d15d436fec
SHA5128ca20cea2d63eec8bed830874793db0d170d306e3706f9637cb295119f7dad93f34f3949288a85cd027c109b3782d1fcf522c2309548a3332559bf688f5c7ca8
-
Filesize
416B
MD56b5c4cd4285e952d51ea2dca68d7f1df
SHA1dfc6c57703ee0c563466f2bd053ea407a631579f
SHA256f28ffee59e1dd027bea4b723809f6240a57035982e07b4f7c75152b3d9c7af55
SHA512a74d078b8371d8f9b94cba104d8aea6d0a67fcd9cf79cbbdb385d9c44a47fbdfa76ef4a53550c78ca52f1d83136e670983c127a7a98f5de2c9a90e5c181519fa
-
Filesize
8KB
MD5aae8ccee5d5eed5748d13f474123efea
SHA16da78da4de3b99a55fad00be2ec53a3ad3bd06ae
SHA25610c464d1675774e0282171555d59fb8975ed6c0e6a781182490f48e66823a5b8
SHA512d370e1ffeeb81b3f07b83a9cf1e3b44635fde7aa6ac999bccafece8091dbf96f0a78257bb0e03b3689dc47fb4e96ec7deac7848a43ddef62afc9b8cc665ee8bd
-
Filesize
5KB
MD540685d22d05d92462a2cfc1bba9a81b7
SHA1f0e19012d0ed000148898b1e1264736bed438da8
SHA256cdca1e5bc4c5129caa8eeddf637c820b6241c8790ce1a341e38e8324ae95afa0
SHA51221961d2dd118b45bde4cf00b4570712791a22769d05afb5b6c54355b0aaee9b7f7de00b357845349ef957807452365134d51e11181d2d45f98ed0cc9402de90b
-
Filesize
473KB
MD5339ae4ce820cda75bbb363b2ed1c06fd
SHA162399c6102cc98ed66cbcd88a63ff870cf7b2100
SHA2561e4a463ac0d463cee1f52f9529474484157c85d671aea1ab5f4173df12de01b6
SHA5125da8b333a839c4b169c6f4c9a1929918f166a895af7818c8223df7ed22279aac3b6ef88f89ee083a4f475f82ec6078f8e9800a9afc9547712245d090636a284a