Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 13:06
Static task
static1
General
-
Target
JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe
-
Size
1.1MB
-
MD5
b7da29d9e27e60be22fdcf61fde8c978
-
SHA1
98f891934c2dac395d1cf15cb77de7a2f0cfe8ac
-
SHA256
91deb78fd62b66293812a416179a41c618650fddfca52e7899f8465583f9027e
-
SHA512
fbd22b0ee2b79b8656c01ef3d815bcd98ea1ff1c33670c1f4bf242b68b2713b979d06d82cf7c57a1334acacc3cc5567a7cc6932667b431e205a17de6f3b6682f
-
SSDEEP
24576:pbPTz2O40Sf2l4Hq2/TFROq8NyaD/CQkgAht:p7Tz2OhSf2WhTF8zrD/CQkt
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00070000000242e3-7.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe -
Executes dropped EXE 3 IoCs
pid Process 1380 TRP.exe 2716 PerX.exe 5312 TRP.exe -
Loads dropped DLL 3 IoCs
pid Process 1380 TRP.exe 2716 PerX.exe 5312 TRP.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TRP Start = "C:\\Windows\\SysWOW64\\JYISOY\\TRP.exe" TRP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\JYISOY\TRP.004 JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe File created C:\Windows\SysWOW64\JYISOY\TRP.001 JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe File created C:\Windows\SysWOW64\JYISOY\TRP.002 JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe File created C:\Windows\SysWOW64\JYISOY\TRP.exe JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe File opened for modification C:\Windows\SysWOW64\JYISOY\ TRP.exe -
resource yara_rule behavioral1/files/0x00070000000242e4-26.dat upx behavioral1/memory/2716-27-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2716-33-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2716-34-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2716-37-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2716-38-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2716-39-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2716-41-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2716-44-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2716-45-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TRP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PerX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TRP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe 2716 PerX.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1380 TRP.exe Token: SeIncBasePriorityPrivilege 1380 TRP.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1380 TRP.exe 1380 TRP.exe 1380 TRP.exe 1380 TRP.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5392 wrote to memory of 1380 5392 JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe 86 PID 5392 wrote to memory of 1380 5392 JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe 86 PID 5392 wrote to memory of 1380 5392 JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe 86 PID 5392 wrote to memory of 2716 5392 JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe 89 PID 5392 wrote to memory of 2716 5392 JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe 89 PID 5392 wrote to memory of 2716 5392 JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe 89 PID 5732 wrote to memory of 5312 5732 cmd.exe 91 PID 5732 wrote to memory of 5312 5732 cmd.exe 91 PID 5732 wrote to memory of 5312 5732 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7da29d9e27e60be22fdcf61fde8c978.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5392 -
C:\Windows\SysWOW64\JYISOY\TRP.exe"C:\Windows\system32\JYISOY\TRP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\PerX.exe"C:\Users\Admin\AppData\Local\Temp\PerX.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\JYISOY\TRP.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5732 -
C:\Windows\SysWOW64\JYISOY\TRP.exeC:\Windows\SysWOW64\JYISOY\TRP.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5312
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5e974a7ed7fa0c096aa1f59ae6d8cce72
SHA124b215e712fa745ac94d033ee7c5a556a5df0dab
SHA256d042a6add7b1547e5165d0c0c0f0eb21ee778b44c27e0a2bbce9f02b79156c0b
SHA512156cfa7b252d8737a4d3fdc3f8095353051d7f15e1293d6c1213de36ea44d526fd94e75765b3a1f75ed83f9b02dd4329b9eab466e9188fea107e622d0c1d6ba4
-
Filesize
61KB
MD529136121b1c0307a02a8826477995613
SHA14dffe908036a21be56a9caa739ec1bf1cf9bd0ca
SHA256f9dd403e696d2128cafe9a4bab54a28161745934df6d3479a066083a61515402
SHA5122c7077ff82e948b9a9b6b16214dfdd11e222f07fb0a75aec59a9dafc29906907f24e0c625cefd5032321cc7883c00fd0abc7801f185983190f353b6dff2774c7
-
Filesize
43KB
MD5d977f26d7f7ffcb0f002813b55ff032d
SHA17e17b642dc1286908c18caba6fedb890de8fcc86
SHA2562ce6c66843f0d0f156ae523f25d2cf4c9886fcae7b4f69deefbde4bc5328bf29
SHA512e291f6acf5df88c52eb9232d55eb43fc08cbd423b7ae46148f710de909db49c04fc1d64e05b8e307ddd880134c525188109b94182ca99ea5934b66b9316e9e25
-
Filesize
376B
MD5cc2b209405918ab68d63c0829cdbd8c8
SHA13ea96ab535b9ff61f6d33746cb813dc63d564eb5
SHA25629568bea9ade7559b2cbe6b63d63713f5587fdb995a381c9234d833d8455f0fd
SHA512ce0a2c5b7905284779cb7acc2976e97442fb287a62c6ec0d0a03ae42a3cf8bc6758b1eb0ec1fb1d0bdc13b2c5450e5fc1301a2e8a410adc711dadc94626eb11a
-
Filesize
1.4MB
MD527a49221ba75a90934342bbe70f6c954
SHA1751e322d6f7e46c132f0f97c56d60344248f1959
SHA256946611f5091452aa46310d3ba8a885e808617b8ae9c57a468f7fe3abda4b052d
SHA5129476f49d2e3c10f3e5cd91313e03405f944bc9887fd65e6c2236caab3a42e2c9a5392d7c34f6c5787a7dc8c3cfd43a3a90a6e052176aa60a43da0327d7ff78d6