Analysis
-
max time kernel
47s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19/03/2025, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_804ec861024b7199d45428e07d33d076.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_804ec861024b7199d45428e07d33d076.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_804ec861024b7199d45428e07d33d076.exe
-
Size
1.1MB
-
MD5
804ec861024b7199d45428e07d33d076
-
SHA1
0e83c7b18c8bc754c64e807013b83887a92f5591
-
SHA256
5a7e7b5bfc1a2617a89270a0217b63f1868600c6f41438bcee1b9861ff131684
-
SHA512
897e23e4257c8de76dd1c2f72f158bc775768e288ce871931bd8811a363738d20e6e216a2298cf698a0b1194ea048765c40e0fe7911da775da42e3f9b3e7ca75
-
SSDEEP
24576:rbPT5qh3PnipSDpOTS6doftejxhL1rD8+hQtAi:r7TY3apWpOTS6dIeNhFVQ
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016cf5-6.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 1796 AUU.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 JaffaCakes118_804ec861024b7199d45428e07d33d076.exe 1796 AUU.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AUU Start = "C:\\Windows\\SysWOW64\\VFQIHF\\AUU.exe" AUU.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\VFQIHF\ AUU.exe File created C:\Windows\SysWOW64\VFQIHF\AUU.004 JaffaCakes118_804ec861024b7199d45428e07d33d076.exe File created C:\Windows\SysWOW64\VFQIHF\AUU.001 JaffaCakes118_804ec861024b7199d45428e07d33d076.exe File created C:\Windows\SysWOW64\VFQIHF\AUU.002 JaffaCakes118_804ec861024b7199d45428e07d33d076.exe File created C:\Windows\SysWOW64\VFQIHF\AKV.exe JaffaCakes118_804ec861024b7199d45428e07d33d076.exe File created C:\Windows\SysWOW64\VFQIHF\AUU.exe JaffaCakes118_804ec861024b7199d45428e07d33d076.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AUU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_804ec861024b7199d45428e07d33d076.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3064 chrome.exe 3064 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 1796 AUU.exe Token: SeIncBasePriorityPrivilege 1796 AUU.exe Token: SeShutdownPrivilege 3064 chrome.exe Token: SeShutdownPrivilege 3064 chrome.exe Token: SeShutdownPrivilege 3064 chrome.exe Token: SeShutdownPrivilege 3064 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1796 AUU.exe 1796 AUU.exe 1796 AUU.exe 1796 AUU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1796 2040 JaffaCakes118_804ec861024b7199d45428e07d33d076.exe 30 PID 2040 wrote to memory of 1796 2040 JaffaCakes118_804ec861024b7199d45428e07d33d076.exe 30 PID 2040 wrote to memory of 1796 2040 JaffaCakes118_804ec861024b7199d45428e07d33d076.exe 30 PID 2040 wrote to memory of 1796 2040 JaffaCakes118_804ec861024b7199d45428e07d33d076.exe 30 PID 3064 wrote to memory of 2896 3064 chrome.exe 37 PID 3064 wrote to memory of 2896 3064 chrome.exe 37 PID 3064 wrote to memory of 2896 3064 chrome.exe 37 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 1708 3064 chrome.exe 39 PID 3064 wrote to memory of 324 3064 chrome.exe 40 PID 3064 wrote to memory of 324 3064 chrome.exe 40 PID 3064 wrote to memory of 324 3064 chrome.exe 40 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41 PID 3064 wrote to memory of 1756 3064 chrome.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_804ec861024b7199d45428e07d33d076.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_804ec861024b7199d45428e07d33d076.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\VFQIHF\AUU.exe"C:\Windows\system32\VFQIHF\AUU.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2836
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef55e9758,0x7fef55e9768,0x7fef55e97782⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:22⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:82⤵PID:324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2136 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:12⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2328 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:12⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1472 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:22⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1468 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3444 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3572 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:82⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3576 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3436 --field-trial-handle=1364,i,17897061792596180202,13640069421124249137,131072 /prefetch:82⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
448KB
MD5c49125a39e0ae69b1cc77040ba8a9441
SHA192941e9559d9b1a0a944595377b6c5d44b53a6a4
SHA256f7e3d70532b7a0b04bde2fc3a9439b8a95ba7b89eff5f214ef53041a58c97524
SHA512f61f42e500ebdd0559c420f05849265964e58aba7bb2be1095d41dddc1393ccf2191de0ed61d5fefd3957c4890c61fced1497481b76f158a12f7d95e626224c6
-
Filesize
61KB
MD529136121b1c0307a02a8826477995613
SHA14dffe908036a21be56a9caa739ec1bf1cf9bd0ca
SHA256f9dd403e696d2128cafe9a4bab54a28161745934df6d3479a066083a61515402
SHA5122c7077ff82e948b9a9b6b16214dfdd11e222f07fb0a75aec59a9dafc29906907f24e0c625cefd5032321cc7883c00fd0abc7801f185983190f353b6dff2774c7
-
Filesize
43KB
MD5d977f26d7f7ffcb0f002813b55ff032d
SHA17e17b642dc1286908c18caba6fedb890de8fcc86
SHA2562ce6c66843f0d0f156ae523f25d2cf4c9886fcae7b4f69deefbde4bc5328bf29
SHA512e291f6acf5df88c52eb9232d55eb43fc08cbd423b7ae46148f710de909db49c04fc1d64e05b8e307ddd880134c525188109b94182ca99ea5934b66b9316e9e25
-
Filesize
438B
MD5760c1826fb9e06d89539841b6e128115
SHA10bf2af55fe49d2f01f7fa0baab2274c6e20affd2
SHA2562c6b5456f32f13c614cebfc688247d25e24584074ed00d2c19a00d2a92fa24c2
SHA51242bd393e550d0b08f4081cd946f926cac18d3e4f096fd05719ec75167079c5e49c9b4278b7eca3fdfc51f139ebda88f10c7a50768a03af5ba984551e912c5741
-
Filesize
1.4MB
MD527a49221ba75a90934342bbe70f6c954
SHA1751e322d6f7e46c132f0f97c56d60344248f1959
SHA256946611f5091452aa46310d3ba8a885e808617b8ae9c57a468f7fe3abda4b052d
SHA5129476f49d2e3c10f3e5cd91313e03405f944bc9887fd65e6c2236caab3a42e2c9a5392d7c34f6c5787a7dc8c3cfd43a3a90a6e052176aa60a43da0327d7ff78d6