Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 22:34 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe
-
Size
568KB
-
MD5
7bedc7ec247b28d896c99e8b561fa19a
-
SHA1
313c53259b494096a9cadc1281f59931d0d6acf3
-
SHA256
e09e9d0b0930dcfc7c3f4f03ab779d7991ef932907d296ddf9787ddd055f815f
-
SHA512
9f72de04f7603bbdf8e851f54f583bcd6525bd28c8cc0e796cf48cc33416d88e47b4a84416ffeb69f9fed8f32e4a76a1e828f7402b34d947ed0a09022410e2b9
-
SSDEEP
12288:REjybmXO57JLMAagZumjZjTNBpJqjKVj8im/AnWgg8IR3N6nMzjPbnKDSTFiRl:JEcFMAasFjIKVjxm/AWgfIa6yDOF8l
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0009000000016d3f-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2212 SJIM.exe -
Loads dropped DLL 4 IoCs
pid Process 1736 JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe 1736 JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe 2212 SJIM.exe 2212 SJIM.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SJIM Agent = "C:\\Windows\\SysWOW64\\28463\\SJIM.exe" SJIM.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\SJIM.007 JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe File created C:\Windows\SysWOW64\28463\SJIM.009 SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_35_00.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_35_21.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_35_35.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_36_25.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_36_32.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_34_46.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_35_07.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_35_14.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_35_42.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_35_49.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_36_18.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_36_39.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\SJIM.exe JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_35_56.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_36_03.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_36_46.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\SJIM.006 JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe File created C:\Windows\SysWOW64\28463\key.bin JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe File opened for modification C:\Windows\SysWOW64\28463 SJIM.exe File opened for modification C:\Windows\SysWOW64\28463\SJIM.009 SJIM.exe File created C:\Windows\SysWOW64\28463\SJIM.009.tmp SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_34_53.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_35_28.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\Mar_16_2025__22_36_10.jpg SJIM.exe File created C:\Windows\SysWOW64\28463\SJIM.001 JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SJIM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe -
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\ToolboxBitmap32 SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\ SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\0\win64\ SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\TypeLib SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\Version SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\Version\ SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\Control\ SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\InprocServer32\ SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\Programmable SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\VersionIndependentProgID SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\Control SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\Programmable\ SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0 SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87} SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\ SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\0\win64 SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\HELPDIR SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\TypeLib\ SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\VersionIndependentProgID\ = "MsTscAx.MsTscAx" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\ = "Nikojor Class" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\InprocServer32\ = "%systemroot%\\SysWow64\\mstscax.dll" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\MiscStatus\ SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\ProgID SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\ToolboxBitmap32\ SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A} SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\0 SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\0\ SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\MiscStatus SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\MiscStatus\ = "0" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\ToolboxBitmap32\ = "%systemroot%\\SysWow64\\mstscax.dll, 1" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\FLAGS\ SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\FLAGS\ = "0" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\Version\ = "1.0" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\VersionIndependentProgID\ SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\InprocServer32 SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\ = "Win32_EncryptableVolume 1.0 Type Library" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\wbem" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\TypeLib\ = "{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\ProgID\ SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27F329AF-AA7F-4235-8DA5-330D6F50BA87}\ProgID\ = "MsTscAx.MsTscAx.8" SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\0\win64\ = "C:\\Windows\\SysWow64\\wbem\\Win32_EncryptableVolume.dll" SJIM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\FLAGS SJIM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{78AAC4F8-F578-DB69-A61C-3F80A7C5A78A}\1.0\HELPDIR\ SJIM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2212 SJIM.exe Token: SeIncBasePriorityPrivilege 2212 SJIM.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2212 SJIM.exe 2212 SJIM.exe 2212 SJIM.exe 2212 SJIM.exe 2212 SJIM.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2212 1736 JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe 30 PID 1736 wrote to memory of 2212 1736 JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe 30 PID 1736 wrote to memory of 2212 1736 JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe 30 PID 1736 wrote to memory of 2212 1736 JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bedc7ec247b28d896c99e8b561fa19a.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\28463\SJIM.exe"C:\Windows\system32\28463\SJIM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
-
Remote address:8.8.8.8:53Requesthotmail.comIN MXResponsehotmail.comIN MXhotmail-comolc protectionoutlook�
-
Remote address:8.8.8.8:53Requesthotmail-com.olc.protection.outlook.comIN AResponsehotmail-com.olc.protection.outlook.comIN A52.101.11.11hotmail-com.olc.protection.outlook.comIN A52.101.42.7hotmail-com.olc.protection.outlook.comIN A52.101.41.29hotmail-com.olc.protection.outlook.comIN A52.101.11.20
-
Remote address:8.8.8.8:53Requesthotmail-com.olc.protection.outlook.comIN AResponsehotmail-com.olc.protection.outlook.comIN A52.101.40.28hotmail-com.olc.protection.outlook.comIN A52.101.68.11hotmail-com.olc.protection.outlook.comIN A52.101.73.31hotmail-com.olc.protection.outlook.comIN A52.101.41.23
-
Remote address:8.8.8.8:53Requesthotmail-com.olc.protection.outlook.comIN AResponsehotmail-com.olc.protection.outlook.comIN A52.101.73.3hotmail-com.olc.protection.outlook.comIN A52.101.10.11hotmail-com.olc.protection.outlook.comIN A52.101.73.17hotmail-com.olc.protection.outlook.comIN A52.101.68.11
-
152 B 3
-
152 B 3
-
104 B 2
-
57 B 108 B 1 1
DNS Request
hotmail.com
-
84 B 148 B 1 1
DNS Request
hotmail-com.olc.protection.outlook.com
DNS Response
52.101.11.1152.101.42.752.101.41.2952.101.11.20
-
84 B 148 B 1 1
DNS Request
hotmail-com.olc.protection.outlook.com
DNS Response
52.101.40.2852.101.68.1152.101.73.3152.101.41.23
-
84 B 148 B 1 1
DNS Request
hotmail-com.olc.protection.outlook.com
DNS Response
52.101.73.352.101.10.1152.101.73.1752.101.68.11
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5fc564686652bc9a81333a9d041e7d0d9
SHA1dc1d64819f573245cff120375c58f5ccc729f8e4
SHA25645d366d69e57308d459c8f0ee1b32b7a19ef089530e9c3cc3bf60512cd1166a4
SHA512c0335ae3f64bb7f20b85fd9c24071fbbec01eac19fb1a54af3e6be1669dd1959ccb8a6ff7448f50e495259633f334b31399df25350aef774a1bed412dd17f2bc
-
Filesize
342B
MD53184e04a591f5ad89ec6b06a565cd1d9
SHA17e45e2d04cb6b2813603ab9902c553516b0a9006
SHA25680ab49d47e557ae4978441f8b457bcda3d71bb30278a495f3a51fa0f96f38be3
SHA512479aabd6ccf89328790ef3bf25c81f063a619fbf20e5c5319a1c056ee95fdc5f638df69665674945d0e4cd61a603831eb48065d317cbe9196cde70e43eca56d3
-
Filesize
8KB
MD5395bbef326fa5ad1216b23f5debf167b
SHA1aa4a7334b5a693b3f0d6f47b568e0d13a593d782
SHA2567c1c4ba8978d3ec53bc6da4d8f9e5e1ca52edf5ccf5ec19ef06b02055ff3b3d1
SHA512dc3f3d7501feb10623807e89f28a0e38bdbbd4a7e2ad964c8ab33c392bde61896fe40bb7773f6309cd59ad9a686decbd81c15b588ac8d311fd2a273ac9410679
-
Filesize
5KB
MD51b5e72f0ebd49cf146f9ae68d792ffe5
SHA11e90a69c12b9a849fbbac0670296b07331c1cf87
SHA2568f4485675fe35b14276f5c8af8a6b42f03cf1b5de638355e4c4b28397385e87e
SHA5126364f5581de5aaec09b5d1c4e5745193f981ff93cf91e20c6c9ff56566b5d182ccbdacf9aeed1d7a01460eb21619e14ac4ab31b083a951b45b3b7f9d93a62ffc
-
Filesize
1.1MB
MD518fc0566cce7cd216c1c3ddcd3a8d661
SHA10ccf7143746616a759dc931f5b4faed0b2000d24
SHA2568100997801743b87e54b6b6e551a94d8db4df2db079eba23a54f7a5575c06cda
SHA5124a4f72f17b5ebabcbfe21c3bef5cae70d791dea65cf615cf467bf6ccf82ae95f25e3c09d3e21da34b997da7b9d5219b21766ea052b8fbbead0e24786d3fae3b2
-
Filesize
107B
MD5c731b2bab9ad164954ed8e71d9290f26
SHA18dc060dbffeb094fd343ba46ba5af8bf19d962ea
SHA25676ae0208b1d00a5c782fe49bb8b2aea2e3577b8526720e6a241b8832dbf47dca
SHA51203e1cf2a851720ad6e59429fb9a5b5d941f3571b935136dae5c8943038a4cb243d28da9b61a6c6255e859d9ef66cd9e5688e3276aa57c64046ba95168a751f73
-
Filesize
4KB
MD54b8ed89120fe8ddc31ddba07bc15372b
SHA1181e7ac3d444656f50c1cd02a6832708253428e6
SHA2562ae6b0e14465338be0bc5ad10703f5c823d092ebb8cff7e5a05b7d79c8459b93
SHA51249269b71270b3eda0ddcb399021de9c88f6fd2086cf54fa4898a91e64afe109d44b635d47a5ea9bae7f53a5e968af97fa13bdf699ba00ce879ecadd7bbc8af23
-
Filesize
649KB
MD52bff0c75a04401dada0adfab933e46a7
SHA1364d97f90b137f8e359d998164fb15d474be7bbb
SHA2562aa53bc5da3294817f95d8806effdf28e5af49661a955256c46db2b67cb6e6da
SHA51288b82973d3c042bceb75e12297111fa7b8bd4e2a7a37d26b698c595d8d75ec670cc7aebfa2572206c1b2a4ecbbfa3103affb8bee6d7ef47428a225e2cd1bea3f