Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2025, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe
Resource
win11-20250411-en
General
-
Target
JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe
-
Size
1.1MB
-
MD5
bcc32ca7634050200641cd4bb7ce97f1
-
SHA1
538e04e0b5a67503be427f708ec53fb107feafa4
-
SHA256
8ca728e6e74c33c178d3fefaf05faf90c246390483bb078cfdc82567f2f82cf5
-
SHA512
b80e863a17598c2ad752b2b5af2cafee95e5201af0c190821026c1e712839cca765c078fd2681de96e1bcda7e54b79ee17317a03a08c4d5a77d5b8cc17ae4378
-
SSDEEP
24576:UHvZT7CQSlE5P1s4UjB4Fx1g3EHkCJrH0MdKS0vodXoGkjpkr5:cBT7CQOEX9Uj+Fx1gUECNT1qkr
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000024274-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe -
Executes dropped EXE 2 IoCs
pid Process 424 GUW.exe 916 GUW.exe -
Loads dropped DLL 2 IoCs
pid Process 424 GUW.exe 916 GUW.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GUW Start = "C:\\Windows\\SysWOW64\\TPJGXC\\GUW.exe" GUW.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\TPJGXC\GUW.004 JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe File created C:\Windows\SysWOW64\TPJGXC\GUW.001 JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe File created C:\Windows\SysWOW64\TPJGXC\GUW.002 JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe File created C:\Windows\SysWOW64\TPJGXC\AKV.exe JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe File created C:\Windows\SysWOW64\TPJGXC\GUW.exe JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe File opened for modification C:\Windows\SysWOW64\TPJGXC\ GUW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GUW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GUW.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 424 GUW.exe Token: SeIncBasePriorityPrivilege 424 GUW.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 424 GUW.exe 424 GUW.exe 424 GUW.exe 424 GUW.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2768 wrote to memory of 424 2768 JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe 86 PID 2768 wrote to memory of 424 2768 JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe 86 PID 2768 wrote to memory of 424 2768 JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe 86 PID 1228 wrote to memory of 916 1228 cmd.exe 89 PID 1228 wrote to memory of 916 1228 cmd.exe 89 PID 1228 wrote to memory of 916 1228 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bcc32ca7634050200641cd4bb7ce97f1.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\TPJGXC\GUW.exe"C:\Windows\system32\TPJGXC\GUW.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\TPJGXC\GUW.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\TPJGXC\GUW.exeC:\Windows\SysWOW64\TPJGXC\GUW.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:916
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
461KB
MD57e335c1258740a5798c2b3eea5a97229
SHA16ce1e98ddc05a4b9e772901c9bc6caae4103267f
SHA256667ab5d791b89216a46f7dd3a1bcb9b7e5f235415a74a9678ca41cec051c462f
SHA5128c190dd139f5459a91c81871f53fc080a81c6397c68cb5b0ee195571012cc8af923b10cd77301da1816f935d36a0587d1c75126f5553005a0f50eb22d3441cb4
-
Filesize
61KB
MD59fca42b7fa3132ded471b886c4bf8a51
SHA186109ac13f8b63bd3467bbf05e39c5cf9bd11d26
SHA256c519bcfc50245700b30cb417478b46810443b03a6447387dd1d0a13966ff00dd
SHA512bbdd590e1bd2971fbc6a462f6501341c0808d658ba3407b051f9d299d9babf0632af092d64c6ad290d4ae5d9db8c367898a064bbea916c516c0a54066ad698ab
-
Filesize
43KB
MD54c30b3e90b3da5619bc0d5f53c025135
SHA1829f487b7c26f6cb8b7f211b2331abbc5229aa61
SHA256b632cedab7ce3d19eebc0d31864dc8c38cd249dcbde299cda818f7026ec294cf
SHA512fd0b36fb43c6b62f6d47455b392276d4e3710b204ef11c70cefed417740a4b5d9357ba37f612f3f87d539175af312ead05bc7a4360fe3e26fd43c56e856e6313
-
Filesize
1KB
MD574207cbcac37c2bc97e05bc25745d1d7
SHA158fb0ace3a4d9699c64f44c65db7d394f84c062d
SHA256f8abc00f7065204491abdb667ac882e7b00f46e496c10721eca07d935d338d22
SHA5124eeab94fe2b767653622cd68f9927684b9961210760fe0234a7e2bd168f1f16b501a68e88026eb94b01a1a5659392ce633e797c1eb453a38dc110309eee3e7a0
-
Filesize
1.5MB
MD59c28244f2dbe3a4758b532838b0040c9
SHA14b58bb4033d43ae64af6c18db48d5d25e23f6121
SHA256cb770745d547a27a4b99fdbe27a672135f812b29d94fd2b843d06bb5aa1748aa
SHA51224ed3d4c6aae307a0f1bb1f063b211152644b06d7425a5fe24b09f5f747dd63011451cef3f47cc4985b3316cf1213c056d38768ccb7f44cb2fab28cf4e30e969