Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2025, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe
Resource
win11-20250410-en
General
-
Target
JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe
-
Size
1.1MB
-
MD5
ba540eb1638716b92f07797637dba4c0
-
SHA1
78bfca2d957df98dd1755c0299aa130795a8fbfd
-
SHA256
5bdae6a6b031d8821c0190e32d97ce55e8d312bf7fc1c6cd738538c44234dc66
-
SHA512
757e388e11788b8fae92ce97c6f0e7b0d50999d8471d539b322d08a3e2936f025572e7c0aac8c7ef0b9b726a71463d0e5537caaaaefbe786de52d8aae4c71ee1
-
SSDEEP
24576:NH0KuT+eVKL4vLseiFRqmQg5FeiIc/1lnIvtYC2Q7DRnnDk3lmjmNb5vhXe:NH0RT9VKLIlgEVceiLm7ZnA1mjG5vZ
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000a000000024125-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe -
Executes dropped EXE 2 IoCs
pid Process 5192 KOV.exe 1896 KOV.exe -
Loads dropped DLL 2 IoCs
pid Process 5192 KOV.exe 1896 KOV.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KOV Start = "C:\\Windows\\SysWOW64\\VHYFSR\\KOV.exe" KOV.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\VHYFSR\KOV.004 JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe File created C:\Windows\SysWOW64\VHYFSR\KOV.001 JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe File created C:\Windows\SysWOW64\VHYFSR\KOV.002 JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe File created C:\Windows\SysWOW64\VHYFSR\AKV.exe JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe File created C:\Windows\SysWOW64\VHYFSR\KOV.exe JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe File opened for modification C:\Windows\SysWOW64\VHYFSR\ KOV.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KOV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KOV.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5192 KOV.exe Token: SeIncBasePriorityPrivilege 5192 KOV.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5192 KOV.exe 5192 KOV.exe 5192 KOV.exe 5192 KOV.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5800 wrote to memory of 5192 5800 JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe 86 PID 5800 wrote to memory of 5192 5800 JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe 86 PID 5800 wrote to memory of 5192 5800 JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe 86 PID 5368 wrote to memory of 1896 5368 cmd.exe 89 PID 5368 wrote to memory of 1896 5368 cmd.exe 89 PID 5368 wrote to memory of 1896 5368 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ba540eb1638716b92f07797637dba4c0.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Windows\SysWOW64\VHYFSR\KOV.exe"C:\Windows\system32\VHYFSR\KOV.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5192
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\VHYFSR\KOV.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5368 -
C:\Windows\SysWOW64\VHYFSR\KOV.exeC:\Windows\SysWOW64\VHYFSR\KOV.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1896
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD53a96acb4dc45307f05fc177cf07742aa
SHA1f8d198305383ac8c1ef2c359a898d1d4f431576b
SHA25614a550138c38cb91d2b9967dfd607bc4a46c6fa6d267a6f5e1c0131162d1527d
SHA5123cba04fc5e3b85c4a7a33bda3ef96091e9763b1db6a76c2ad50a809ebc2232752c331807074b6ab1490182f97d052d24b6e550a74991f65c0b4cea557db87a0f
-
Filesize
61KB
MD5d19ec1c0bd415150fb4d3edf925d9a6e
SHA18df56e86d2459be9cf4b3d8f55bce9b4e1806bf6
SHA2562c0bd5f9a0ba273e594ca613970c6c6ef32c2ad10a1757c77645d267f37a9e68
SHA512b3815767c350c67c5b9823539e71fdefe7b33504b19beeeda6063cc29cfdaaec9767eef4b4919216beab86170da629c8e57e1d7bf6f41dd3cf43331570b021d0
-
Filesize
43KB
MD576a1d9ae4d761069b795d6e891855aa5
SHA11540e9abb812497007aee9885d1ea35e810defff
SHA25602a1f41970ded0a4fb834db6ced2f54b432a29048831de7793bc0aa459970567
SHA5124dc3af04fa7494ea67ef4f44bdb3c681d01ef8cd2ad37c98e5a1b41d7ef10efff1bf55c167f7faac9b0298773a5864d06fb860fee5724463f8eef2c1a978bbfa
-
Filesize
1KB
MD5be1231c7420797372aaead63558e71aa
SHA1a2fef9a9caa80aeb4bb0b9a5f95538a254159640
SHA256b3933865082a0f5737edbdfb6c4dc4b46b5a0eb648293365949b639ff9738ba8
SHA5128f03f0efbf57372736bcb00ea99884f57ef5e85a68d29a0e905c9573c9d3d16595cfa6aba58e98f44fb419b7b150a15b15c825eec6e380a5d0c39d72f623d32e
-
Filesize
1.7MB
MD59be3091aa81569ce6ae396c39a4bdd9e
SHA1805d6fa574027836c13bdd1fae956fd55c0002e9
SHA25674d1f43449380ab7960d9655d897d413010a2171e201ea7c8039a3c9a671fd46
SHA512e1627ecb79a5e4a5fafa1f31fe4c22c5f899eb4f0ea2887da9090b42d3ecba1a0540829b42064aad2779346dad493e25ad428703b932448c1d5973d46b6ba4e0