Analysis
-
max time kernel
103s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe
-
Size
369KB
-
MD5
b898267f1e7aef91e110d54d99cff6de
-
SHA1
57c9f76513d2ceab7e7522fbde0f439cb34f6573
-
SHA256
bfd3b8783627ce59c29f2fe1ee216481d4439bd8940624702a40a67e522f7edb
-
SHA512
c95c687de80f422b0c34b770bd850011b5eaaebe64cbf30b22cea1098d03a62c716ef7d98bd0ba4910772668fd7b287a2aca3b6792f6ca1ef32a582977a20c50
-
SSDEEP
6144://k/Go3R2vwKbXldpLFLF1TpzYPoxxI2YXBGxMs2Gtr7WSvxijI3SqU6YMsDrHsn:/Muo3R2vfbld5VVQq1e2MkJK8gk3xrMO
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00070000000241a6-20.dat family_ardamax -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation pici.exe Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation FFHB.exe -
Executes dropped EXE 3 IoCs
pid Process 1688 pici.exe 228 FFHB.exe 1712 FFHB.exe -
Loads dropped DLL 5 IoCs
pid Process 1688 pici.exe 228 FFHB.exe 228 FFHB.exe 228 FFHB.exe 1712 FFHB.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FFHB Agent = "C:\\Windows\\SysWOW64\\Sys32\\FFHB.exe" FFHB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\FFHB.001 pici.exe File created C:\Windows\SysWOW64\Sys32\FFHB.006 pici.exe File created C:\Windows\SysWOW64\Sys32\FFHB.007 pici.exe File created C:\Windows\SysWOW64\Sys32\FFHB.exe pici.exe File opened for modification C:\Windows\SysWOW64\Sys32 FFHB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3052 228 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pici.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFHB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFHB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 228 FFHB.exe Token: SeIncBasePriorityPrivilege 228 FFHB.exe Token: SeIncBasePriorityPrivilege 228 FFHB.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5440 JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe 5440 JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe 228 FFHB.exe 228 FFHB.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5440 wrote to memory of 1688 5440 JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe 85 PID 5440 wrote to memory of 1688 5440 JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe 85 PID 5440 wrote to memory of 1688 5440 JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe 85 PID 1688 wrote to memory of 228 1688 pici.exe 86 PID 1688 wrote to memory of 228 1688 pici.exe 86 PID 1688 wrote to memory of 228 1688 pici.exe 86 PID 2216 wrote to memory of 1712 2216 cmd.exe 89 PID 2216 wrote to memory of 1712 2216 cmd.exe 89 PID 2216 wrote to memory of 1712 2216 cmd.exe 89 PID 228 wrote to memory of 5268 228 FFHB.exe 95 PID 228 wrote to memory of 5268 228 FFHB.exe 95 PID 228 wrote to memory of 5268 228 FFHB.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b898267f1e7aef91e110d54d99cff6de.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5440 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\pici.exe"C:\Users\Admin\AppData\Local\Temp\tempalbert\pici.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\Sys32\FFHB.exe"C:\Windows\system32\Sys32\FFHB.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\Sys32\FFHB.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:5268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 8764⤵
- Program crash
PID:3052
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\Sys32\FFHB.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\Sys32\FFHB.exeC:\Windows\SysWOW64\Sys32\FFHB.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 228 -ip 2281⤵PID:5068
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD533303ca8abef9221cb410b8a232e9fe4
SHA10cdfc25dbf0e9ad7d4585cd9037dc2e6604be00c
SHA2565110301dee966f0f26307ab1b430279d1e4999c2c4a0ea924ff32f1a9ded869a
SHA512da29821045773ba776def985966b62e09e69bb5bf1786b16c2fff6feb68a03b9e22c5f7d081e3dd58d1785cd7ac64736497c043b7cf6c7149c3a54f8ef111800
-
Filesize
321KB
MD5bc9db2717d7e92a541a009c780df6298
SHA183b51c5abb81dec70599f772a1e5d6f37cfcb33c
SHA256c4588caa18b2385656ed895666d9b87564b90b9dc9f0981bdb7a6731244bb96a
SHA51292a7e53a07eb5e801c96b3c666b0a189e4dfb8c69916bc987e0f8e98b2e0528c0454d8fab7493666a8e94fe0fb66460334adc070ebeec7b2c7312092aa91b0bc
-
Filesize
418B
MD524abb8b0136195a5b055f18249a14eee
SHA1532054dbe810a0a759ffd5edd0081222ad9269e0
SHA2568676782e75de41efbc684c7e25703609e8a2205d586ef76a847b7eee9a93ec18
SHA51271bfd2274d3471fd35760dd4a003d4bb5d9ce88d1d8289d169d334c05f9b252535070abc2658b4d915777d61e40c6a9e4ce36094861762adbcc73d0c518d2a89
-
Filesize
7KB
MD5928cc65dc793834c709a054ca57c19c8
SHA1a1e5d8407199c1bd6a4b274044de640fe0d9e99b
SHA256e3473d81a02ed30e4236591384136f41f17b6a4aae24b5468789644ccd4bf192
SHA512f7c8f7a75c4f8a418630e2ac15676740a902449d9a3c4baf3184409f8701c9caa3e82304d141362d95503f1af6b693eed7b77f690d92ca0162f7ea3ecbc80fdf
-
Filesize
5KB
MD53e1f5d5a06cf97b0495b8d129fbe02e4
SHA1b0de258a813f5edde85004f6865b6ed91f6d6f8f
SHA256f49448fc7c567e64eaeb9cc4dbd3c8021a82b5d9df0a622a439f7b42dc2f26d7
SHA512b0e0b81cb5776d298e96346aa61027c9799a47191c94de50be2209c32747774959d002ddeb98fd15556ee893b0d7bd1f0c8a901469dce4e3acf94e2c4c3e2bfd
-
Filesize
476KB
MD5ef52b540cb404d908338e9cbf7cff283
SHA1778765e1736c0a197685978c3fee7a44e7bde419
SHA25639d8bdb975fbfcbcec8fe63be4e9fe6ce39ae5d23a005118aeffa07b17a3f815
SHA512596b77bf5b15455c326a5a2efd66bc69685eb625e3e211ea0341ad4d8920ada7618a7107e42f2c0963fe6c2d92f2acf47b641ef33071a7c42004e5874d5219a6