Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/03/2025, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe
-
Size
488KB
-
MD5
7c28b4f5e5ef9ce6f00e407a2ae79506
-
SHA1
afb3f897a54886824832706342e4e490d8029ea4
-
SHA256
35f7e35cbc0454bb5fd0c1f0281286d1870fdfae1296d781e6334537ea13dd26
-
SHA512
142df43a2b84ae6620d721cf346a3bda476ac26ebb997404f0b0a61f4d59ca07dc452aa1b2331eb1bd8ea17cddfce54119a422da15615d298e9ce78369cc991f
-
SSDEEP
12288:lWPbHtkak9viyKYzIo94eMnAMMckn4jNdEnGm9ucQDH5f0Vp:kPK1xiKzIoDyMckoT25QT5f0f
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00060000000194e6-9.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2924 JCLN.exe 2660 Limewire Pro 4.18.2.exe -
Loads dropped DLL 9 IoCs
pid Process 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 2924 JCLN.exe 2924 JCLN.exe 2660 Limewire Pro 4.18.2.exe 2660 Limewire Pro 4.18.2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JCLN Agent = "C:\\Windows\\SysWOW64\\28463\\JCLN.exe" JCLN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\JCLN.001 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe File created C:\Windows\SysWOW64\28463\JCLN.006 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe File created C:\Windows\SysWOW64\28463\JCLN.007 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe File created C:\Windows\SysWOW64\28463\JCLN.exe JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe File created C:\Windows\SysWOW64\28463\AKV.exe JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe File opened for modification C:\Windows\SysWOW64\28463 JCLN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JCLN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Limewire Pro 4.18.2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2924 JCLN.exe Token: SeIncBasePriorityPrivilege 2924 JCLN.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2924 JCLN.exe 2924 JCLN.exe 2924 JCLN.exe 2924 JCLN.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2924 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 30 PID 2608 wrote to memory of 2924 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 30 PID 2608 wrote to memory of 2924 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 30 PID 2608 wrote to memory of 2924 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 30 PID 2608 wrote to memory of 2660 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 31 PID 2608 wrote to memory of 2660 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 31 PID 2608 wrote to memory of 2660 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 31 PID 2608 wrote to memory of 2660 2608 JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7c28b4f5e5ef9ce6f00e407a2ae79506.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\28463\JCLN.exe"C:\Windows\system32\28463\JCLN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\Limewire Pro 4.18.2.exe"C:\Users\Admin\AppData\Local\Temp\Limewire Pro 4.18.2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD52881ec11b38db6156dbaffa4597dbe1a
SHA17d5e6aa959692471b705037204d171dd6e7f3086
SHA256e380410daa4959cee05113bf7797471b9a8d23cb4f1caaa7e1ef8a57a730f5d6
SHA51233aac37317fdca8f6f4d84525ce3dc8b36847af36849f821a1cd542091394b7617b272e22d2ab73c0bcad281cf5bccc6417c0a9e2ba73a421fc92ebf717a53c6
-
Filesize
393KB
MD5a655980f1ccb7e183aef71419e01051f
SHA126bf8f2a1c096fcf014f4d38a7262d4c8a5eae5e
SHA256d2af94a00c4de38dbc481c50e439768a9aa0ee2cca057efb759a10068c66e57b
SHA51266fed05ff2a9dd9ea9565274cd32dec3ad42a0ff41ab468f1d751697fbf246a5ed1112ce8f556ffcec607eefce1cdfd5a3d9954a99b1b58e342a9239592c97ad
-
Filesize
390B
MD54ff9345c85f118606cc71b015155241d
SHA173e17ad7861348860fff63d70d86f750fae8431b
SHA256a2ac698934f200f3dd5e77fecaa3ba9e8a858ddb0560973d051630c9aa7f37bb
SHA5122364da6cf44d132594b0e0c2ba056e10fdea89c74a60d42c230e602b779de6f7bca58bbda67b7616d730db141a66531dbf85b354d82c977a6c708a301115c24b
-
Filesize
7KB
MD5c8cea38934bbb1d53dabd5680d12612e
SHA1438b909d2a80b2995e2eb5e4fc12d21185bd7f9e
SHA25677d3390580bc51da413b5a4fdce4f70c23dba979904f0f64f5aa8091e300c8ad
SHA5124fd62a8b1260e6ead4c1ea178e35255ed8a1f31819080ef358f8b6f1975f705f9df0b901c870be58b10aa7b34263bd670afaeee315247fb5eb262caf70fc10a8
-
Filesize
5KB
MD500ff3cd6c61e7d48ee1ae5f6b6b3876b
SHA1efe6bcdb012525d11d2f2f10a3c362c06fe48a22
SHA256043b156e49a23c85ea6524729ca89c0932a7ffa5d39328182be212c7f403719e
SHA51252aa11472123dc19a2bea54fbf18b3cb5803ce47f831427d0316421653826a945a8cb914e592b4e9311ff97884f998021d8dbc0c94e2c69e04c99103e55986a4
-
Filesize
4KB
MD591374d9ab21e5ebc2cc82c2b5d46d116
SHA12107cdb63bd762a1d12c5b7475f73fc433fd05b6
SHA2562aaf236aefea2d3500d57b78cc683a50843e73b8270279686a1eb78e37937d23
SHA512465061b230203c464cbfea3447249d7b603773b60c3c882a254b19699dd825ddc01bba2c475dd2fc1081927b97de0d395b99d6afe365faf8b0c9db24c0d4323b
-
Filesize
471KB
MD5b19358a11fc5bf245df5816361d4d24c
SHA122c92178047080c254aa2ed601f027a52f22c44b
SHA256fb6bd2ac12914944697900aeaaf5606c475e8d3c5a5c9bdc345ce037a2218a74
SHA512e92f9d73b25c1d922dd742ca63a0af7152eb6e748d2b06e84993273636a31fdf09071414c3576f4734da70f0f15835caaaa812da1a928abff1d67879ed6a2d45