Analysis
-
max time kernel
140s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe
-
Size
2.7MB
-
MD5
b12318878041f39ab24ee6e78cd4744c
-
SHA1
b0044bb11910e2faa2d30a25b76b9e6c1f2727fb
-
SHA256
363f9328428974e07ed2cf2b43dec54db8fcbd3118b020e094e5d94eff1f39f5
-
SHA512
f46ce53c7c7f3f0ea2bf8d7ec989ab7c0aeeea90baed19b4415142416624213be324c0c1e3f07f29dbb488301134de11092cb72457dd967bde3d5318e8a23679
-
SSDEEP
49152:SnVNjzVQarhahr09CSL0DqwCp29J6PlRfju/hRSB9rycJjDSvzu5gTMND/QLWYL9:SnVNSmqr0IS7RKJi5KZRS7p9n5gTMR/W
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000024229-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe -
Executes dropped EXE 3 IoCs
pid Process 224 system32CHKT.exe 1300 Clientlessv4Setup.exe 5396 system32CHKT.exe -
Loads dropped DLL 10 IoCs
pid Process 2372 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe 224 system32CHKT.exe 224 system32CHKT.exe 224 system32CHKT.exe 1300 Clientlessv4Setup.exe 1300 Clientlessv4Setup.exe 1300 Clientlessv4Setup.exe 5396 system32CHKT.exe 5396 system32CHKT.exe 5396 system32CHKT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32CHKT Agent = "C:\\Windows\\system32CHKT.exe" system32CHKT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\system32CHKT.001 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe File created C:\Windows\system32CHKT.006 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe File created C:\Windows\system32CHKT.007 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe File created C:\Windows\system32CHKT.exe JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe File created C:\Windows\system32AKV.exe JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32CHKT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clientlessv4Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32CHKT.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 224 system32CHKT.exe Token: SeIncBasePriorityPrivilege 224 system32CHKT.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 224 system32CHKT.exe 224 system32CHKT.exe 224 system32CHKT.exe 224 system32CHKT.exe 224 system32CHKT.exe 1300 Clientlessv4Setup.exe 1300 Clientlessv4Setup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2372 wrote to memory of 224 2372 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe 86 PID 2372 wrote to memory of 224 2372 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe 86 PID 2372 wrote to memory of 224 2372 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe 86 PID 2372 wrote to memory of 1300 2372 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe 89 PID 2372 wrote to memory of 1300 2372 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe 89 PID 2372 wrote to memory of 1300 2372 JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe 89 PID 2292 wrote to memory of 5396 2292 cmd.exe 90 PID 2292 wrote to memory of 5396 2292 cmd.exe 90 PID 2292 wrote to memory of 5396 2292 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b12318878041f39ab24ee6e78cd4744c.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32CHKT.exe"C:\Windows\system32CHKT.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\Clientlessv4Setup.exe"C:\Users\Admin\AppData\Local\Temp\Clientlessv4Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32CHKT.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32CHKT.exeC:\Windows\system32CHKT.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5396
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d9e02f226fc338d14df200ba9a700625
SHA1414f134a16a309b31e418ed9e08c0c48aaf6e2bc
SHA2568165757efb79acceb9fd0bfae6b2c19b8f087cc0461abb17941d460dbdf2e260
SHA51213c73381602fe2593312d41ab4bc5cd5f922ac651f9e71e3fe3c58e7f0c5c73ecc9d79d61ec46f33a0a81cf73373421eeb510bd99650c0f53af30974ed61b8ca
-
Filesize
2.3MB
MD5ea383a4637b5a393368753b6c7114782
SHA1ab022364e19dcff3b238f8a86c9d9bb5e0a22e3c
SHA256726d6b69b0d3e17f55425bb8b043c6078eec605d5c8a1e606da115663360cb4b
SHA5120d1651d89cbccd2bc3f760f16ddd7ef2bf05d6079ea2c67a8bcff1f4b4a75c51648116c528ecdb28d85b2e8a299627aa157312fd12834f1f1e0d5cdf0778791f
-
Filesize
462B
MD51fad51cc914f0cb1165f57de3f47aba8
SHA109780a8dafd2db194650decca19049cd87ec2051
SHA25691501baa3b72cdd6ff542c8ebc12d20386d43b89e87d02da069d7f6347ae5953
SHA5127bdb2737cdaf166232d928e9882fd35286c0aa013247cf206ed1daa825991d9d5550d28f118cc0234080912518fdb06c18d1af0f4e6a4bff4619ba1cb76aecd4
-
Filesize
7KB
MD532dd7b4bc8b6f290b0ece3cc1c011c96
SHA1b979683868b399c6a6204ebaed9fc9c784a0429a
SHA2566dcce9bbba5c2de47eea3abf7597a9c4fb2e4d358efc3752fa65c169cccfa2a1
SHA5129e0d720799fe816f7d09c8a722b762203b6f12a8625c1c93cd640219ecc35969bd641b4d9e6dc04ab6f95ceb73235a438eb7d48ee9402118db3618b5760551ea
-
Filesize
5KB
MD5e8155b68775ed29590e14df80fdc0e9f
SHA1ed449da02e648a524004c265f3c37496d2f07f1f
SHA256b39ba894b0a9a3201461ddd9ee9b297928e793dff221a47f019e75c11df631f3
SHA512b14e00c46cf9bed0aca0f85775f624ff064f2d2afe1fa68b61bee5729db73cf9a8eced669c52d7cbb9504ff1b369a9a16a0f36c71a70c13c0bd1eaf5e07ccc11
-
Filesize
471KB
MD53c06bbc025b61d2182ef5573f2852bda
SHA1ebc1464c00b13fb5b3f80a59c80b595020e1fe7c
SHA256e7f64e7215284cdeb8ef1eba28733f7aeae7f6977f82809d8de1e76a2e249085
SHA5129d839ada211b85fc1efb1fe7bb3ce66fcf0e8069221d958234649c2ac5dc0f1bd06f1a016f9c727077af36fb46cac5409be9c8a8201d17f689c6b473aa01acdc