Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2025, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe
-
Size
585KB
-
MD5
bdd2a3840b3c1f63e435e67cbe2de348
-
SHA1
30e1e8cb31fb87e8430dd6acdf2777c0878fb784
-
SHA256
94d8f9fbe794f971bb2769418981c2a7b5af78afe340f92dafbb2ad1eb71b91e
-
SHA512
2fce83239ae6a87759b6f80ea4b7a7b0f920525382a21262fb84663f9c8c7e714a5930f8eb035854d711ba7e0781e035dda9b664f9dec9c9eea474ec43f636ae
-
SSDEEP
12288:5deoUab7FwNHF45cDVLZp5y3CX2P9y8AuN6P0vBT0iT2yiHadb:m+9wVF42Zp09g8AcBThqyiH2b
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000024282-12.dat family_ardamax -
resource yara_rule behavioral1/files/0x0007000000024286-23.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe -
Executes dropped EXE 5 IoCs
pid Process 212 HLUK.exe 1876 CounterStrike.exe 5456 CounterStrike.exe 6100 CounterStrike.exe 4160 HLUK.exe -
Loads dropped DLL 5 IoCs
pid Process 5796 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe 212 HLUK.exe 4160 HLUK.exe 212 HLUK.exe 212 HLUK.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HLUK Agent = "C:\\Windows\\SysWOW64\\Sys32\\HLUK.exe" HLUK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: CounterStrike.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\HLUK.001 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe File created C:\Windows\SysWOW64\Sys32\HLUK.006 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe File created C:\Windows\SysWOW64\Sys32\HLUK.007 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe File created C:\Windows\SysWOW64\Sys32\HLUK.exe JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe File created C:\Windows\SysWOW64\Sys32\AKV.exe JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe File created C:\Windows\SysWOW64\Sys32\HLUK.004 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe File created C:\Windows\SysWOW64\Sys32\HLUK.003 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe File opened for modification C:\Windows\SysWOW64\Sys32 HLUK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HLUK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HLUK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CounterStrike.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CounterStrike.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CounterStrike.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 212 HLUK.exe Token: SeIncBasePriorityPrivilege 212 HLUK.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1876 CounterStrike.exe 5456 CounterStrike.exe 6100 CounterStrike.exe 6100 CounterStrike.exe 212 HLUK.exe 212 HLUK.exe 212 HLUK.exe 212 HLUK.exe 212 HLUK.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5796 wrote to memory of 212 5796 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe 85 PID 5796 wrote to memory of 212 5796 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe 85 PID 5796 wrote to memory of 212 5796 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe 85 PID 5796 wrote to memory of 1876 5796 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe 86 PID 5796 wrote to memory of 1876 5796 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe 86 PID 5796 wrote to memory of 1876 5796 JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe 86 PID 5456 wrote to memory of 6100 5456 CounterStrike.exe 90 PID 5456 wrote to memory of 6100 5456 CounterStrike.exe 90 PID 5456 wrote to memory of 6100 5456 CounterStrike.exe 90 PID 1036 wrote to memory of 4160 1036 cmd.exe 91 PID 1036 wrote to memory of 4160 1036 cmd.exe 91 PID 1036 wrote to memory of 4160 1036 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bdd2a3840b3c1f63e435e67cbe2de348.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5796 -
C:\Windows\SysWOW64\Sys32\HLUK.exe"C:\Windows\system32\Sys32\HLUK.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\CounterStrike.exe"C:\Users\Admin\AppData\Local\Temp\CounterStrike.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\CounterStrike.exeC:\Users\Admin\AppData\Local\Temp\CounterStrike.exe -s21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5456 -
C:\Users\Admin\AppData\Local\Temp\CounterStrike.exe"C:\Users\Admin\AppData\Local\Temp\CounterStrike.exe" -s32⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\Sys32\HLUK.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\Sys32\HLUK.exeC:\Windows\SysWOW64\Sys32\HLUK.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4160
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e6d3a1562e0a2d9230e4bfd7e477dffd
SHA1ef5d510e60caef4924eced60c092a63e9233b375
SHA25649ee7df841542ff4fc5232bd8244f06683cc70f8af5f861b94497b504208b3ab
SHA512e6d866daf96ad912d4ad69324d9f89820d15dd2a8d34aba5b3392aa5f6a67931f988080a25fa09067f81024180a3a4c0e211a80405b56e6663481fce7ffa1177
-
Filesize
99KB
MD5f625450cf75852ad70c5af340a7b4ce5
SHA1fd84c67c8210e5e20ab8da4e08e737c5982a9a6f
SHA256ede4384d22a131ac41a2da8edbb2bcd2955ad3e0148f75655a865faf475db5c2
SHA51245112f496dd1b5530c9edfdd4cf2c5f5b0feda24604b3fe8c71284fbd85426f38fb5dbfb84f8b7f6cd028820c59ff4397b715b773fcb42a42c03d6ecfb6fd90d
-
Filesize
389KB
MD5f567d932480c03ab1de08b1b72aada97
SHA192c60c8971cf6aa88baf945c61c3a40709c03e02
SHA256565e67c1959c0dec7be32b308681ec7106cde58b1b409cc21cbc642b7a6d627f
SHA5122c9bac11470c2ff211054df00f252c312d6d2e0aea4349b03072934f8ce2623fb365c64c0eb56a08440e4daabd11799e03b158733a9922fc05ebc7782c67b3fe
-
Filesize
344B
MD57b0655ab55d86d84ef351d88789b2286
SHA189bb9ae5add291a27c577d97d953fca0b467933b
SHA256273cec2540a25884694da0e396512a048dadd37767dd3c9aa39dfd35c02c111b
SHA5125b369e70ba081fbe82138d017d948ea96ac03121da9bf753bc20901bc20d8e53fe51b8d3103b6d431a7f1ac0d7e079bcfb9d432a3426843e6202779a06459f43
-
Filesize
14KB
MD517437b1e961ada6ed473bd960736d61d
SHA10f49c62938be0087de14ccdaeaedb0564431aa66
SHA25610ef4031b616ca402c6262ac4d5beb9b1e1ac7575bfcc9fa28fcad0d9e9daa80
SHA512beb7d0d2965e6443bd34d8e5e83ee4048075d5b69076f6d2b5547bc110d2ac3a8c17967e5a8f315a0dc32293e5ee7b384f77a27971c56461036d223704a5ac6e
-
Filesize
7KB
MD502d9f210aac7049c13f026ba9898a9bd
SHA1b6aae5e7fae29934042af5f6a6d51a52b51265a1
SHA25643b9f2d721ec6e419b865639dead7ba29202839f967ba172f479977db8ea4e9b
SHA512dda86da60ab27f2c05ebd8e7d4b709771da0edb22ba406336898e4e7e5c2febbfe9d81fb946d6440f6393e0f8c25ae61125e4ff3e8aa168c1e36a63e89999466
-
Filesize
5KB
MD55b9bf404722eac0ff29f1609f4e938ac
SHA14a0dc9cf5f7cb6855b4f2745646c4a3dcf995ba2
SHA25645e39c6673b2e580e6cc01f2213dcc4d93da2eb561c94066506d90ceea8c3522
SHA51250b6689db1e052d39ee1abf3ddab19b64f99ba48460fa75abf5e467d79d99958aa0a9524f3ad0d91d48cfd429ed09cfca068446287d8373974b7583eafc0fd29
-
Filesize
475KB
MD5d0c5feb812ca765b00a3ca0e974fabd2
SHA1c5a4b5aee6b92019552f811d3ceb4fdcee0105fa
SHA256cd2de8b54a5de630e03177a736a35f85a1f8d8367a392ed833fb6fee29c96440
SHA512fb4e5bda23453484f0d0c4cc3bdc1f29a36be56281f558f356b579996bde15290a9dfbbc018ffe86e2304832a2898710f0331b7f3cd181d16930e2abbdfaafe8