Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2025 15:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e7930aa3119849de70ac9cd5f974211f.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_e7930aa3119849de70ac9cd5f974211f.exe
-
Size
359KB
-
MD5
e7930aa3119849de70ac9cd5f974211f
-
SHA1
19de0ae686e69e1563b865797b00f7e3d209b263
-
SHA256
48d08800b37074bfb617173dfff1abee3d8af2a15822151653af8d25442966a2
-
SHA512
b1028a86477a64c4a1f98bbed9f5a1789cbb337df1bb47fac7c25d5d72201a7679e061856fdff94e72706fe8efc222d72eeecb781bc8720f31a4c0c2586f4835
-
SSDEEP
6144:Kb99ZwNPbgI/ZpVCF0nkYMdZCZkN5I0LfGClTDZVbFmdJROewS6A/g2oQEW:OfZw/plkY2C6DI0zlB6jOep5R
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023ced-22.dat family_ardamax -
Downloads MZ/PE file 1 IoCs
flow pid Process 99 4700 Process not Found -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\Control Panel\International\Geo\Nation JaffaCakes118_e7930aa3119849de70ac9cd5f974211f.exe Key value queried \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\Control Panel\International\Geo\Nation Cidade dos anjos.exe -
Executes dropped EXE 2 IoCs
pid Process 1708 Cidade dos anjos.exe 984 iexplore.exe -
Loads dropped DLL 5 IoCs
pid Process 1708 Cidade dos anjos.exe 984 iexplore.exe 984 iexplore.exe 984 iexplore.exe 984 iexplore.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\iexplore.001 Cidade dos anjos.exe File created C:\Windows\SysWOW64\iexplore.006 Cidade dos anjos.exe File created C:\Windows\SysWOW64\iexplore.007 Cidade dos anjos.exe File created C:\Windows\SysWOW64\iexplore.exe Cidade dos anjos.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e7930aa3119849de70ac9cd5f974211f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cidade dos anjos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4748 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000_Classes\Local Settings Cidade dos anjos.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4472 POWERPNT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 984 iexplore.exe Token: SeIncBasePriorityPrivilege 984 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 984 iexplore.exe 984 iexplore.exe 984 iexplore.exe 984 iexplore.exe 4472 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1708 5008 JaffaCakes118_e7930aa3119849de70ac9cd5f974211f.exe 87 PID 5008 wrote to memory of 1708 5008 JaffaCakes118_e7930aa3119849de70ac9cd5f974211f.exe 87 PID 5008 wrote to memory of 1708 5008 JaffaCakes118_e7930aa3119849de70ac9cd5f974211f.exe 87 PID 1708 wrote to memory of 984 1708 Cidade dos anjos.exe 89 PID 1708 wrote to memory of 984 1708 Cidade dos anjos.exe 89 PID 1708 wrote to memory of 984 1708 Cidade dos anjos.exe 89 PID 1708 wrote to memory of 4472 1708 Cidade dos anjos.exe 90 PID 1708 wrote to memory of 4472 1708 Cidade dos anjos.exe 90 PID 1708 wrote to memory of 4472 1708 Cidade dos anjos.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e7930aa3119849de70ac9cd5f974211f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e7930aa3119849de70ac9cd5f974211f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\Cidade dos anjos.exe"C:\Users\Admin\AppData\Local\Temp\Cidade dos anjos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\iexplore.exe"C:\Windows\system32\iexplore.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:984
-
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\Cidade dos anjos.pps" /ou ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4472
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5ODUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODQ0NDQzNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDk1MTM0MDk3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5683f1f1e72a9fd91018e379b0f45c646
SHA1e715798afee630bca17bd35e382626399e608788
SHA2560770043fa8f879787c32f97e915295320738b28dc5c7a07a033df6d9ac5b4e50
SHA512490a8fcc256fb97bdaf0ef7a243998338b3796db448874ed85613a087e16a9e1b0105af3deb57e18db253e550e5c8a0fd02dba1e52f4959937ffb6c587e3b8f5
-
Filesize
327KB
MD5e53bcefe67ef4c07fbc68571aeed16bb
SHA1ac43508e3195525348518e43c4514de1023bff2e
SHA256ea6e1cd7b54a6abca274cea4aca81c1d6a3e199c42c417089a6e1a9de655cfd0
SHA512129c2fb2cbdf3e87375ee82342e169cd025b6fa5adef0083fa3f60ddd8e9377f1bc4a7ae57c2727e10f3666bba194191eb5d9fec41196e397cd3aea5f52460db
-
Filesize
135KB
MD50a14b8ccf3374fb94c2bde7438cedc94
SHA140704ffc1f37cc819b32dbfa9360ba8b1a694eb4
SHA25678a070c66b86759cb46db93ad6bfff5518a2435ce5fd0695e2130a8b9a049f39
SHA512319b63a8171f073e32b65498584218e736264af03128a6cb1d5ff2ef2a89b67478cb6d3822b17b42397437e033ae4b984f24ce156e9fff23c4b064b9f2807801
-
Filesize
2KB
MD5c960dc2c2ee28c2cd292445bb603dda9
SHA1a736c2b77ef13a059d87158e07d89f46e9ab988e
SHA256a43d34f1374c8d6b0e5ff04711a9cdfe38714147e75ffaa85a19c73e897652fd
SHA51297b5e686557d4dee78c824bbe642c4b6e08db807dfb892c76ddd42c978fcbba4c390745ebf70e9858afbc3e59f3df07f976d61e76e7d43496fb6152f0b174f97
-
Filesize
5KB
MD5b8e130b146557e640cb3e198f3d9110e
SHA1c1cbebfce4e3af8ced7d1019586e91c371432d78
SHA2563dbca63a39382e4c25d0b02e668ba72c5c81071bb62937ec939325f1f89926a1
SHA512bc858367e64188c3a365fff4c7986e86d6d666651b2421e3b96fe06836aede073f2228349f66f1836e6ef98bb8e5120354c54a0fb13059e5b875bbf34ed7868f
-
Filesize
4KB
MD5097c525e86f64364479227f1603a0221
SHA1c84897900f59cbff5f607368ceba93bfc5273998
SHA2561b62745c0181f36b7c0227225da12c0d357fd6f14ff8a0ea8484fd4a9c6bf766
SHA512b52b9d51c3bb50fab292c8bf13d2d87694391481742830c266f4512b2e33a16b852cdbf3faea7f5945b60415a12d1d6a0e9319500cb769b12e0a03357f66ef12
-
Filesize
295KB
MD52b8def730c5bab9d9b58e117af9fb84a
SHA1090c2c4f0309895bad639ba1c0af21d1eb70d987
SHA256759f339edba9126cd77ee621e6852f281b9a3190bc4aa17711164bac5ece41a7
SHA512809aa7300e4bef33489f4166fd5b8245a9b9523c9fd908a37b51a0384966f8f036ac09fbca3730bb04b98ff976c17380ddc4c2ed75dbda51350f049b3d0bf48a