Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2025, 22:34 UTC

General

  • Target

    JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe

  • Size

    568KB

  • MD5

    7bedc7ec247b28d896c99e8b561fa19a

  • SHA1

    313c53259b494096a9cadc1281f59931d0d6acf3

  • SHA256

    e09e9d0b0930dcfc7c3f4f03ab779d7991ef932907d296ddf9787ddd055f815f

  • SHA512

    9f72de04f7603bbdf8e851f54f583bcd6525bd28c8cc0e796cf48cc33416d88e47b4a84416ffeb69f9fed8f32e4a76a1e828f7402b34d947ed0a09022410e2b9

  • SSDEEP

    12288:REjybmXO57JLMAagZumjZjTNBpJqjKVj8im/AnWgg8IR3N6nMzjPbnKDSTFiRl:JEcFMAasFjIKVjxm/AWgfIa6yDOF8l

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\28463\SJIM.exe
      "C:\Windows\system32\28463\SJIM.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2212

Network

  • flag-us
    DNS
    hotmail.com
    SJIM.exe
    Remote address:
    8.8.8.8:53
    Request
    hotmail.com
    IN MX
    Response
    hotmail.com
    IN MX
     hotmail-comolc protectionoutlook�
  • flag-us
    DNS
    hotmail-com.olc.protection.outlook.com
    SJIM.exe
    Remote address:
    8.8.8.8:53
    Request
    hotmail-com.olc.protection.outlook.com
    IN A
    Response
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.11.11
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.42.7
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.41.29
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.11.20
  • flag-us
    DNS
    hotmail-com.olc.protection.outlook.com
    SJIM.exe
    Remote address:
    8.8.8.8:53
    Request
    hotmail-com.olc.protection.outlook.com
    IN A
    Response
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.40.28
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.68.11
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.73.31
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.41.23
  • flag-us
    DNS
    hotmail-com.olc.protection.outlook.com
    SJIM.exe
    Remote address:
    8.8.8.8:53
    Request
    hotmail-com.olc.protection.outlook.com
    IN A
    Response
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.73.3
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.10.11
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.73.17
    hotmail-com.olc.protection.outlook.com
    IN A
    52.101.68.11
  • 52.101.11.11:25
    hotmail-com.olc.protection.outlook.com
    SJIM.exe
    152 B
    3
  • 52.101.40.28:25
    hotmail-com.olc.protection.outlook.com
    SJIM.exe
    152 B
    3
  • 52.101.73.3:25
    hotmail-com.olc.protection.outlook.com
    SJIM.exe
    104 B
    2
  • 8.8.8.8:53
    hotmail.com
    dns
    SJIM.exe
    57 B
    108 B
    1
    1

    DNS Request

    hotmail.com

  • 8.8.8.8:53
    hotmail-com.olc.protection.outlook.com
    dns
    SJIM.exe
    84 B
    148 B
    1
    1

    DNS Request

    hotmail-com.olc.protection.outlook.com

    DNS Response

    52.101.11.11
    52.101.42.7
    52.101.41.29
    52.101.11.20

  • 8.8.8.8:53
    hotmail-com.olc.protection.outlook.com
    dns
    SJIM.exe
    84 B
    148 B
    1
    1

    DNS Request

    hotmail-com.olc.protection.outlook.com

    DNS Response

    52.101.40.28
    52.101.68.11
    52.101.73.31
    52.101.41.23

  • 8.8.8.8:53
    hotmail-com.olc.protection.outlook.com
    dns
    SJIM.exe
    84 B
    148 B
    1
    1

    DNS Request

    hotmail-com.olc.protection.outlook.com

    DNS Response

    52.101.73.3
    52.101.10.11
    52.101.73.17
    52.101.68.11

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\28463\Mar_16_2025__22_34_46.jpg

    Filesize

    101KB

    MD5

    fc564686652bc9a81333a9d041e7d0d9

    SHA1

    dc1d64819f573245cff120375c58f5ccc729f8e4

    SHA256

    45d366d69e57308d459c8f0ee1b32b7a19ef089530e9c3cc3bf60512cd1166a4

    SHA512

    c0335ae3f64bb7f20b85fd9c24071fbbec01eac19fb1a54af3e6be1669dd1959ccb8a6ff7448f50e495259633f334b31399df25350aef774a1bed412dd17f2bc

  • C:\Windows\SysWOW64\28463\SJIM.001

    Filesize

    342B

    MD5

    3184e04a591f5ad89ec6b06a565cd1d9

    SHA1

    7e45e2d04cb6b2813603ab9902c553516b0a9006

    SHA256

    80ab49d47e557ae4978441f8b457bcda3d71bb30278a495f3a51fa0f96f38be3

    SHA512

    479aabd6ccf89328790ef3bf25c81f063a619fbf20e5c5319a1c056ee95fdc5f638df69665674945d0e4cd61a603831eb48065d317cbe9196cde70e43eca56d3

  • C:\Windows\SysWOW64\28463\SJIM.006

    Filesize

    8KB

    MD5

    395bbef326fa5ad1216b23f5debf167b

    SHA1

    aa4a7334b5a693b3f0d6f47b568e0d13a593d782

    SHA256

    7c1c4ba8978d3ec53bc6da4d8f9e5e1ca52edf5ccf5ec19ef06b02055ff3b3d1

    SHA512

    dc3f3d7501feb10623807e89f28a0e38bdbbd4a7e2ad964c8ab33c392bde61896fe40bb7773f6309cd59ad9a686decbd81c15b588ac8d311fd2a273ac9410679

  • C:\Windows\SysWOW64\28463\SJIM.007

    Filesize

    5KB

    MD5

    1b5e72f0ebd49cf146f9ae68d792ffe5

    SHA1

    1e90a69c12b9a849fbbac0670296b07331c1cf87

    SHA256

    8f4485675fe35b14276f5c8af8a6b42f03cf1b5de638355e4c4b28397385e87e

    SHA512

    6364f5581de5aaec09b5d1c4e5745193f981ff93cf91e20c6c9ff56566b5d182ccbdacf9aeed1d7a01460eb21619e14ac4ab31b083a951b45b3b7f9d93a62ffc

  • C:\Windows\SysWOW64\28463\SJIM.009

    Filesize

    1.1MB

    MD5

    18fc0566cce7cd216c1c3ddcd3a8d661

    SHA1

    0ccf7143746616a759dc931f5b4faed0b2000d24

    SHA256

    8100997801743b87e54b6b6e551a94d8db4df2db079eba23a54f7a5575c06cda

    SHA512

    4a4f72f17b5ebabcbfe21c3bef5cae70d791dea65cf615cf467bf6ccf82ae95f25e3c09d3e21da34b997da7b9d5219b21766ea052b8fbbead0e24786d3fae3b2

  • C:\Windows\SysWOW64\28463\key.bin

    Filesize

    107B

    MD5

    c731b2bab9ad164954ed8e71d9290f26

    SHA1

    8dc060dbffeb094fd343ba46ba5af8bf19d962ea

    SHA256

    76ae0208b1d00a5c782fe49bb8b2aea2e3577b8526720e6a241b8832dbf47dca

    SHA512

    03e1cf2a851720ad6e59429fb9a5b5d941f3571b935136dae5c8943038a4cb243d28da9b61a6c6255e859d9ef66cd9e5688e3276aa57c64046ba95168a751f73

  • \Users\Admin\AppData\Local\Temp\@9E71.tmp

    Filesize

    4KB

    MD5

    4b8ed89120fe8ddc31ddba07bc15372b

    SHA1

    181e7ac3d444656f50c1cd02a6832708253428e6

    SHA256

    2ae6b0e14465338be0bc5ad10703f5c823d092ebb8cff7e5a05b7d79c8459b93

    SHA512

    49269b71270b3eda0ddcb399021de9c88f6fd2086cf54fa4898a91e64afe109d44b635d47a5ea9bae7f53a5e968af97fa13bdf699ba00ce879ecadd7bbc8af23

  • \Windows\SysWOW64\28463\SJIM.exe

    Filesize

    649KB

    MD5

    2bff0c75a04401dada0adfab933e46a7

    SHA1

    364d97f90b137f8e359d998164fb15d474be7bbb

    SHA256

    2aa53bc5da3294817f95d8806effdf28e5af49661a955256c46db2b67cb6e6da

    SHA512

    88b82973d3c042bceb75e12297111fa7b8bd4e2a7a37d26b698c595d8d75ec670cc7aebfa2572206c1b2a4ecbbfa3103affb8bee6d7ef47428a225e2cd1bea3f

  • memory/1736-15-0x0000000002F40000-0x000000000301F000-memory.dmp

    Filesize

    892KB

  • memory/2212-38-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2212-19-0x0000000001E30000-0x0000000001E31000-memory.dmp

    Filesize

    4KB

  • memory/2212-39-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2212-41-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2212-37-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2212-36-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2212-35-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2212-34-0x00000000030B0000-0x00000000030B3000-memory.dmp

    Filesize

    12KB

  • memory/2212-30-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2212-29-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2212-28-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2212-27-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2212-26-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2212-25-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2212-24-0x0000000001E10000-0x0000000001E11000-memory.dmp

    Filesize

    4KB

  • memory/2212-23-0x0000000001E50000-0x0000000001E51000-memory.dmp

    Filesize

    4KB

  • memory/2212-22-0x0000000001E90000-0x0000000001E91000-memory.dmp

    Filesize

    4KB

  • memory/2212-21-0x0000000001E70000-0x0000000001E71000-memory.dmp

    Filesize

    4KB

  • memory/2212-20-0x0000000001E80000-0x0000000001E81000-memory.dmp

    Filesize

    4KB

  • memory/2212-40-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2212-47-0x0000000003110000-0x0000000003111000-memory.dmp

    Filesize

    4KB

  • memory/2212-46-0x00000000030D0000-0x00000000030D1000-memory.dmp

    Filesize

    4KB

  • memory/2212-45-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2212-43-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2212-44-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2212-42-0x0000000003120000-0x0000000003121000-memory.dmp

    Filesize

    4KB

  • memory/2212-31-0x00000000030B0000-0x00000000030B1000-memory.dmp

    Filesize

    4KB

  • memory/2212-32-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2212-54-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2212-55-0x0000000000300000-0x000000000035A000-memory.dmp

    Filesize

    360KB

  • memory/2212-56-0x00000000030B0000-0x00000000030B1000-memory.dmp

    Filesize

    4KB

  • memory/2212-57-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2212-60-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2212-18-0x0000000000300000-0x000000000035A000-memory.dmp

    Filesize

    360KB

  • memory/2212-73-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2212-82-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2212-17-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2212-102-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2212-118-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2212-144-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.