Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
e503896542a0b060e76aedac3ae28b7d
-
SHA1
2a23273d34be236de842fca7bceec29023124d24
-
SHA256
2278727a4c05cb69cf0b2f885cf4aed70c2acf9267ac8116ea9c136fbf431b23
-
SHA512
134b7db6109927f410d0ab1c608c76ebf2a3c8f9c4bee2425a8bce7634ab27847f7bd6d04d0039843465d7c80863be272e3b4c9cdb975e1ad743c84bfb97ae12
-
SSDEEP
24576:X0NzT7BxPhnoLhLjhFdLIR5AzMcw872OyiaI3r1QhROCbCXYhdpNLbdNr:X0pT7BnchLjhFdLgSAcw8721P5ZGXG/B
Malware Config
Extracted
Protocol: ftp- Host:
ftp.drivehq.com - Port:
21 - Username:
palembang123
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b97-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3596 QDY.exe 2636 RFInjector.exe -
Loads dropped DLL 3 IoCs
pid Process 3596 QDY.exe 5088 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe 2636 RFInjector.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QDY Start = "C:\\Windows\\SysWOW64\\PMXMQI\\QDY.exe" QDY.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\PMXMQI\QDY.004 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe File created C:\Windows\SysWOW64\PMXMQI\QDY.003 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe File created C:\Windows\SysWOW64\PMXMQI\QDY.exe e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PMXMQI\ QDY.exe File created C:\Windows\SysWOW64\PMXMQI\QDY.008 QDY.exe File created C:\Windows\SysWOW64\PMXMQI\QDY.001 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe File created C:\Windows\SysWOW64\PMXMQI\QDY.002 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PMXMQI\QDY.008 QDY.exe File created C:\Windows\SysWOW64\PMXMQI\App_Dec_12_2024__14_46_01.html QDY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFInjector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QDY.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3596 QDY.exe 3596 QDY.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe 2636 RFInjector.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3596 QDY.exe Token: SeIncBasePriorityPrivilege 3596 QDY.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3596 QDY.exe 3596 QDY.exe 3596 QDY.exe 3596 QDY.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3596 5088 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe 83 PID 5088 wrote to memory of 3596 5088 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe 83 PID 5088 wrote to memory of 3596 5088 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe 83 PID 5088 wrote to memory of 2636 5088 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe 84 PID 5088 wrote to memory of 2636 5088 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe 84 PID 5088 wrote to memory of 2636 5088 e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e503896542a0b060e76aedac3ae28b7d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\PMXMQI\QDY.exe"C:\Windows\system32\PMXMQI\QDY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\RFInjector.exe"C:\Users\Admin\AppData\Local\Temp\RFInjector.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
499KB
MD5719810492ac134154692fa69ee55223b
SHA16f58e55337aacf55416b0bb740deee2fa8dd0786
SHA2569f7e9fe250283a34d78bbd83b66da692a8393871b7d679496b442b78844cd4e2
SHA5124851e9a98863b991de78de7f97a0e07ab4b27380e7befd68684ddba9bdb6f9d6615be8fbd96217d0f64b9e71e971ed814ee52dd12d52d4ece80e5c0f442726d0
-
Filesize
466B
MD543099fb2e753a59e8761559c540b1078
SHA108fefac4ae9dca839aab22fe0d50610c5fbb224a
SHA256aec459cfad4437e2b14a3fb1cf02790c06a7ba37ac06483e1511e015ceea5916
SHA51282562043e51f3789b911e142187da1166d4c7b8ee14bbc9cf67407ea6cf19e692cea71b506d665e873d6efd047cd12f289671e12767697cbc7b94be678ea47ab
-
Filesize
61KB
MD543a9733e89a458d638ffb6a2a475d557
SHA1f19a7513a53208e6b9295acff974181b593675a4
SHA2568d093cbce69e6d77abec376639a2814653873db3d49d270effc5536de51a5930
SHA5125e5fa1e02deba80eb8098e6e2ed89ac29a7c5204a713ed6725a0ca070c5da19670171ba1e1fbe38aab5cc5f15061ca8c1a66060fdd633a3270d1609135d4052e
-
Filesize
43KB
MD5f195701cf2c54d6ceadad943cf5135b8
SHA19beb03fc097fc58d7375b0511b87ced98a423a08
SHA256177c1dcc7f13158445f0b99713e9cad205da86e764940a48d43dc375565b0dec
SHA512f78def1ab431bb2b7b647ec76c063c30a87cabd22605f94cbe4fbb6f757fd54ddf7861d3842a0e369abfce94b68d41dec0fe2322a74f67d9875f561f92b20025
-
Filesize
65KB
MD5fa881c9545d01792ac6697572d52ab85
SHA1bcf56567eea2066fce6662651d886d026eaaec30
SHA256540e5d4e0cac56e0db7e4218838625460b3f4249a3c063c10f8bc01a277752de
SHA5121c7fe1495b590120605701e331890c0f65b2a01b3179a454ef8622d8765c57ec918c45da68034b85241fedf00cde4e4d8cee74db198c03ca573f5ab64494fb28
-
Filesize
1KB
MD53db7920a84fc19926b8312188b389110
SHA1d4d77326f234cd090c3599b2e8f8ccf1c6e77228
SHA2569dd196acb725234fa023c9b34583e18232f295abcad573fde37c940dbb3315b5
SHA51205473055ea324eb594e4885ef3e097a526add02a0a6a786b498b2e79fff60215ed33f65eb2995d40bfe04d7dda1dae5bb1e8089f6c66dc63b2e504a65930d6b6
-
Filesize
1.7MB
MD5d95623e481661c678a0546e02f10f24c
SHA1b6949e68a19b270873764585eb1e82448d1e0717
SHA256cecfadce6fb09b3977c20d15fb40f8f66a1d7e488a4794451d048a598c3417da
SHA512dee02644d92ed30e88bb10e9dcdba97abd9949b230059ec20cf5d93061f9cdb77b1e793e5f69d0b51595c30077c3ddd093348d22b070ce898ccefe28b8062591