Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 02:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe
-
Size
493KB
-
MD5
12f65bf4176aaaebb138c32e9e9d6250
-
SHA1
990768258a393a5a0dd4fe33062b7a66cea35d22
-
SHA256
fa80356b76dad5e1ecff2b63c4e3b62da4fb8878d779db1eee4c9cff30df8ae9
-
SHA512
fabe4a6b15e48250166c820cefb1451ec1e2ac602e2635a8fea39b6f450858f36ec66d1983f35f7f792cbdb34f1f746784f90c2081192c20bd1d000c2c9c4de2
-
SSDEEP
6144:L92OjqlxnzU3uraQGtzVwSNxFTkmWv+oO3OZy8ggPjXl3j0+xvdx8NDTgTAZbdQg:L981zUeraQW1jhWcXojVj0+JgND71b
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb8-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe -
Executes dropped EXE 1 IoCs
pid Process 544 LKJU.exe -
Loads dropped DLL 8 IoCs
pid Process 884 JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe 544 LKJU.exe 544 LKJU.exe 544 LKJU.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LKJU Agent = "C:\\Windows\\SysWOW64\\28463\\LKJU.exe" LKJU.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463 LKJU.exe File created C:\Windows\SysWOW64\28463\LKJU.001 JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe File created C:\Windows\SysWOW64\28463\LKJU.006 JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe File created C:\Windows\SysWOW64\28463\LKJU.007 JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe File created C:\Windows\SysWOW64\28463\LKJU.exe JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe File created C:\Windows\SysWOW64\28463\AKV.exe JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LKJU.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ebf06cfed05e14c99a158442e49d80900000000020000000000106600000001000020000000ff9f889e533d8e85fc08326fc285ae6073648e13f38bebce98e785734e2ed95c000000000e800000000200002000000000384aa7cff7452ab5582b61a73fb6bb06d12791a5d428ae482405828c3f0ff4200000007241c9ef847535a41036030b98ecc5cd0570f067541a9509375301ebaf23b7d640000000e3532f403ef80ddc19a61e95c0d5cb368f70837d5ef7ae3a2312159cd8d627df52c991886cc84946610f126231986eced9e2900c3d0b0a3226456d4e3ef37ce3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2280079000" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157566" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444364270" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2281641373" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B3611690-D931-11EF-BEF1-FAA11E730504} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a016a1883e6ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b3aa883e6ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ebf06cfed05e14c99a158442e49d80900000000020000000000106600000001000020000000c8cdf16b487526a948a87f66a0c87cdaf5c7ceed0b47e4f627f53f6402416d76000000000e80000000020000200000000a562fd17f28839e4cdadff0a2297b3aaae4f87c2122e07f6c3bf1c052ac0a542000000050eaa7a72c63f33827b91f67789177d56318e7b2ae60e67479d046a013d6e94f40000000d5f58715226c334bb24e8d8eafb015db698ed750a4ceac7616ffe9e2cde3976881ef868785f7b4486aca97e38f8ea026b0627c1e3f71a10dfd79603b31ad9603 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157566" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 544 LKJU.exe Token: SeIncBasePriorityPrivilege 544 LKJU.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 544 LKJU.exe 544 LKJU.exe 544 LKJU.exe 544 LKJU.exe 544 LKJU.exe 2908 iexplore.exe 2908 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 884 wrote to memory of 544 884 JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe 82 PID 884 wrote to memory of 544 884 JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe 82 PID 884 wrote to memory of 544 884 JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe 82 PID 884 wrote to memory of 2908 884 JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe 83 PID 884 wrote to memory of 2908 884 JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe 83 PID 2908 wrote to memory of 1064 2908 iexplore.exe 84 PID 2908 wrote to memory of 1064 2908 iexplore.exe 84 PID 2908 wrote to memory of 1064 2908 iexplore.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_12f65bf4176aaaebb138c32e9e9d6250.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\28463\LKJU.exe"C:\Windows\system32\28463\LKJU.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:544
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\123123.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:17410 /prefetch:23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD52c48c73220d62a8faffe599e95896274
SHA1452cd4222360fe7e881055d815ec65a2bbac564b
SHA25635a3978f9dea3056b0c4a0a1945d785bb7a0022484782f414fa9ffa04f3d5967
SHA5126547f2798297acc7ac11506328ef05f29074655f3e5a60adb188106c769806a2b1a8a15c7bd38c39da560df7df953798561398245667095536fc5748692cc9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD52bb7ce59f111299f1d12429614a96de6
SHA15ad906c8a7db56a6f4af0cae78c6d05ce3d5a980
SHA256f5f6268aa35fda161d19fc8d59b1352afd84e4b9ca457f8120fbd8366cb3e3ac
SHA5128dcb515be29fc1a2261328ffca14c229b5a6ca8d7a65771b5d14b4fb8f8742987cf1374747d0063e2f0fa8cf3562bd521eab619a54b18fad4bfaec76246f1e27
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
5KB
MD5f341639d411f1a51d552c0036034a504
SHA1cb211ca0313f50a12f24095d845c103b1b4b960e
SHA2564fb4c3519ca37265062e74df92cef849f73d8c9a2fe8d0dab3b16e48cb1c2fd7
SHA512bbef380ae304ba9cf33642bd20b306e4027eb2175a5e363e2d18918dd857257e657f40ee8dd02c2e14721b2479cbe75a6ed822a9cadd97dbc959c1d80e84d662
-
Filesize
4KB
MD5908f7f4b0cf93759447afca95cd84aa6
SHA1d1903a49b211bcb4a460904019ee7441420aa961
SHA2563e6378164f9dc4148b86c9312b63c5a6b1fabcfebf9557f182d331e9cb32fc23
SHA512958e0880565b008cdb045d6aba5103f0ba820ac037facf24b78924187a119258e3a8a97de4c3874694962114ef672d41a55feb71b92d5038e7d45bc3d91d6b0d
-
Filesize
393KB
MD5b0b09699ea39c0107af1c0833f07c054
SHA1b730e2fb0bda9bf4a1b1f8768a00838e3ca9dcc1
SHA256be63e3b5a6c3fbec11a737332d4e0040a23cc2d17182b4bc5e7d5dd41d930ee1
SHA51255430e53058964961808f37d738c31f1502c3ec4a14b0296bef7bad22e468734bcd119eedba14cc87894d4acc81c9266572aff9919b18bd584823c47fa149796
-
Filesize
376B
MD5736f7118cb8d1fc54be7c74ba9454197
SHA1997321229c43e7742006e6417bac27c4ee8986e5
SHA256be95c78fa4fac0e4ef88f54a6e9d231b3861d7ebe1c8992317ead1695f25a129
SHA51219216dd2367bb4073012544ab403d6e6f93dc13cf34ca73a6836f5c8647b50c0e43c31275eeb4487c4146b6df0943c1b265e0b1befacc7dd1ffec44236148a17
-
Filesize
7KB
MD5e0fcfa7cad88d1a8a462cee6b06cf668
SHA1a7e49078517abc929a6da261df06556c8f5a8cf0
SHA256340ff9f7f784e299030abb9982c88547e67251a6cca07d30ca8073d01a2840c4
SHA512430fd640432769047de7bb4432f710193855a5121fe5944ef07f6b68749608312e7c22b29834967d429637fc9b285671cd10bbc9e1cfb43654695a206ba9cf82
-
Filesize
5KB
MD5ca72cd485d116033f1b776903ce7ee0a
SHA185b0b73a75b0498f56200dd1a5cf0de5371e42a3
SHA256e583532d6b4d8cfc1def5e550674e9e1a4eef2a107adacddf729fddac64f49c4
SHA5128dbf6920af64aac6a80c3da4a567473dc20c8d4e24078f7e66bb5aa1a08641e5081b0a1ee05f82fb1dd14218b62572c198ff39b1add5f19893008b3d8e54538f
-
Filesize
472KB
MD5d7bd4739313a8e2fc9e080b7d0ba13b2
SHA1808fcbe663bc02780b1d9962873a1e3066d55f05
SHA256c9b47519386b1b7cd6dfecd42e586883d301b7a99c0c3d67a4beabc3ae3dcd6b
SHA512d70e04444a2cc0f5b1fc5c81873b2c93582afa013f9aafe0e7c0eaaac36582b736b6ad8ef23a3d3aa4e3541fd478cbdcb8596dd4d233ada85f861c858c94b398