Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe
-
Size
940KB
-
MD5
7ee5741a0e7c220db4b1a6d719730fde
-
SHA1
45fd4c43f6f03f62a913a4292d68c8a0637660dc
-
SHA256
29ab8dbea928c0a5eab52ffe79d7f9e51d284ea5138bc31a7b7855a8c6ebbf96
-
SHA512
622bb0619e3bd1f4956fd758e98d3bf5b6d1c622e0f7c9ae0e1e31e156a5c1f41404038e5b973db4ccc7def25c7671c9b732f026ae82c4c8326b0814b6025f34
-
SSDEEP
24576:FU/pTqAYpJIgNc7+l+BtBQhWrVFE6XIjVgMGd5yrol:qRTqZJIUxsGW8ZgB6o
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023402-7.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-807826884-2440573969-3755798217-1000\Control Panel\International\Geo\Nation 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 SIC.exe -
Loads dropped DLL 1 IoCs
pid Process 1668 SIC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SIC Start = "C:\\Windows\\SysWOW64\\FJFEBM\\SIC.exe" SIC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\FJFEBM\SIC.001 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe File created C:\Windows\SysWOW64\FJFEBM\SIC.002 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe File created C:\Windows\SysWOW64\FJFEBM\SIC.exe 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FJFEBM\ SIC.exe File created C:\Windows\SysWOW64\FJFEBM\SIC.004 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SIC.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-807826884-2440573969-3755798217-1000_Classes\Local Settings 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3696 WINWORD.EXE 3696 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1668 SIC.exe Token: SeIncBasePriorityPrivilege 1668 SIC.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1668 SIC.exe 1668 SIC.exe 1668 SIC.exe 1668 SIC.exe 3696 WINWORD.EXE 3696 WINWORD.EXE 3696 WINWORD.EXE 3696 WINWORD.EXE 3696 WINWORD.EXE 3696 WINWORD.EXE 3696 WINWORD.EXE 3696 WINWORD.EXE 3696 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1668 1576 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe 86 PID 1576 wrote to memory of 1668 1576 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe 86 PID 1576 wrote to memory of 1668 1576 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe 86 PID 1576 wrote to memory of 3696 1576 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe 87 PID 1576 wrote to memory of 3696 1576 7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\FJFEBM\SIC.exe"C:\Windows\system32\FJFEBM\SIC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\event 30-04.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
154KB
MD50401d564ef74d730cffbaaca249dce70
SHA14287c7f00ef70b4acd8d05f808cdadc8786fbf21
SHA256b71f365fef94334e7893288c3a5fbc3bf2510eb6f549d62679f370fccafcd55b
SHA5121e0613829bc121d18917d7f261f3d0b9b465149c27a4d7432087b5af2ee7eb63ebb2ce2079f41542d58ff50c7f9aebef0a524a9f1bbc53dcde49497df705febf
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5d233f6065be6445642fc73d5c83b580e
SHA17e9aae6a4aa8c744056cacb989ee871cf470e50a
SHA256d3720b4e56864e61e210fe03dd8dd3338e09105f622463e130b00a51f15811d8
SHA5120ad2803d4d9c81ff201e5242cb78129e7104f7f6a771a24c812e24b87497888d2a79376cf4ca14eb62bb750b4766829757ce22b8091ca0b32e7754ee0a7e4622
-
Filesize
61KB
MD54eb04b9187bbf3e3c33bf95e74eb6262
SHA1ca5dcaea5ef4ba48c0bb06635c0b5abed4f0f342
SHA256cf84d5704b350beaf1f2b46dc44bd372141d7554a8958ce22c0a84a3f21f2fe7
SHA512aeaa608cd4f66ba817a7e8698d17f9801c9cedf99875decff39bc18cebdec3947f02566bdf21d9096e5a6a6b740717ab06d46a2a9605bf8e8fa0fee12fe17e81
-
Filesize
43KB
MD51aed6fee0870288cdb607393fc2f33a1
SHA1584fd8d5ffbced19dd09b8b71cee9026c0ac65c6
SHA25602c4eef7045896258d00077e123719aa256c606f4e38c417965ba5f64d48e180
SHA51215e5b7843b07bcb4a638057b05712c66b285d70ace24ab3a4c125d24d538ace20cfac179accefa417d7790f7a095327affd3cd73d9eacaa632356f95a9fde3b8
-
Filesize
1KB
MD5842fca62e33029a1d63c52e3bccbe57e
SHA1c4609c3d1e219a8cb06e0fdb568a2dbabb371d01
SHA25647f411e46f2b98dafe11e3033e61d02419230c971aa53cd962eeed44906b2c98
SHA512338f1e5b6d3373449a2ea30853717d70263d59256445586ab7de8d5ba2661fbba2159ef992b774eab65f57ac0ebaf5816f7f2d7d660549e70c8ec14b5fcfc512
-
Filesize
1.5MB
MD5193cfb5ea668afa421a01778d2c66530
SHA13f847421af343ed21b6287dc3ce243cf0a5fba6e
SHA256a6d79ab4ec98a3c1a4c8bacb97a6497c583a56e09e9d132d4f0c9ab0bb6e6892
SHA51253bda8967976f86dbce61fc044ec82157ba5eda3f04d214da874d20dee4419d03ff84e925f71360a0f48050bf6b64614dd2c2f954fb76f8e1a110b03eeed0f4e