Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 02:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe
-
Size
3.3MB
-
MD5
1d47116dfd00c5197ad0ebb23e61ee92
-
SHA1
d5299dcb21a0cbf5826e020da81def99d76a1373
-
SHA256
d7d05456dc79039ba0a8292c84b150f2182edd06d671aeb6eddbe35f1308748c
-
SHA512
59f5b04cc3accc8160e431ba0119ba2ed5cb7350aa861ea389407fbb2d3e3d14e5b1c375c43608c2b812a2e3887b06e5f051281630c7fdbb315eb8a87f1474f7
-
SSDEEP
24576:go/ADMPEzh/5bHYjbXrX4xxkzTf5uhaFHLWQoWilqVD2AwaIu9fMOs70vJZ4jbic:wa8alTl7DMZcACMtZWsKgNVFonN5KGo
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0005000000019506-47.dat family_ardamax -
Executes dropped EXE 5 IoCs
pid Process 1912 file1.exe 1856 fire-heart-desktop-gadget.exe 3032 Install.exe 1244 system32GBAJ.exe 2568 rkverify.exe -
Loads dropped DLL 24 IoCs
pid Process 1912 file1.exe 1912 file1.exe 1912 file1.exe 1912 file1.exe 1912 file1.exe 1856 fire-heart-desktop-gadget.exe 1856 fire-heart-desktop-gadget.exe 3032 Install.exe 3032 Install.exe 3032 Install.exe 3032 Install.exe 1856 fire-heart-desktop-gadget.exe 1856 fire-heart-desktop-gadget.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 1856 fire-heart-desktop-gadget.exe 1856 fire-heart-desktop-gadget.exe 1856 fire-heart-desktop-gadget.exe 1856 fire-heart-desktop-gadget.exe 1856 fire-heart-desktop-gadget.exe 1856 fire-heart-desktop-gadget.exe 1856 fire-heart-desktop-gadget.exe 1856 fire-heart-desktop-gadget.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GBAJ Agent = "C:\\Windows\\system32GBAJ.exe" system32GBAJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Fire Heart Desktop Gadget\fireheart.exe fire-heart-desktop-gadget.exe File created C:\Program Files (x86)\Fire Heart Desktop Gadget\sample.jpg fire-heart-desktop-gadget.exe File created C:\Program Files (x86)\Fire Heart Desktop Gadget\Uninstall.exe fire-heart-desktop-gadget.exe File created C:\Program Files (x86)\Fire Heart Desktop Gadget\Readme.txt fire-heart-desktop-gadget.exe File created C:\Program Files (x86)\Fire Heart Desktop Gadget\License.txt fire-heart-desktop-gadget.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\system32GBAJ.001 Install.exe File created C:\Windows\system32GBAJ.006 Install.exe File created C:\Windows\system32GBAJ.007 Install.exe File created C:\Windows\system32GBAJ.exe Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fire-heart-desktop-gadget.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GBAJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkverify.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0009000000018bf3-17.dat nsis_installer_1 behavioral1/files/0x0009000000018bf3-17.dat nsis_installer_2 behavioral1/files/0x000500000001970b-229.dat nsis_installer_1 behavioral1/files/0x000500000001970b-229.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1856 fire-heart-desktop-gadget.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1244 system32GBAJ.exe Token: SeIncBasePriorityPrivilege 1244 system32GBAJ.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1244 system32GBAJ.exe 1244 system32GBAJ.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe 2568 rkverify.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1912 2112 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 30 PID 2112 wrote to memory of 1912 2112 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 30 PID 2112 wrote to memory of 1912 2112 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 30 PID 2112 wrote to memory of 1912 2112 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 30 PID 2112 wrote to memory of 1912 2112 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 30 PID 2112 wrote to memory of 1912 2112 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 30 PID 2112 wrote to memory of 1912 2112 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 30 PID 1912 wrote to memory of 1856 1912 file1.exe 31 PID 1912 wrote to memory of 1856 1912 file1.exe 31 PID 1912 wrote to memory of 1856 1912 file1.exe 31 PID 1912 wrote to memory of 1856 1912 file1.exe 31 PID 1912 wrote to memory of 1856 1912 file1.exe 31 PID 1912 wrote to memory of 1856 1912 file1.exe 31 PID 1912 wrote to memory of 1856 1912 file1.exe 31 PID 1912 wrote to memory of 3032 1912 file1.exe 32 PID 1912 wrote to memory of 3032 1912 file1.exe 32 PID 1912 wrote to memory of 3032 1912 file1.exe 32 PID 1912 wrote to memory of 3032 1912 file1.exe 32 PID 1912 wrote to memory of 3032 1912 file1.exe 32 PID 1912 wrote to memory of 3032 1912 file1.exe 32 PID 1912 wrote to memory of 3032 1912 file1.exe 32 PID 3032 wrote to memory of 1244 3032 Install.exe 33 PID 3032 wrote to memory of 1244 3032 Install.exe 33 PID 3032 wrote to memory of 1244 3032 Install.exe 33 PID 3032 wrote to memory of 1244 3032 Install.exe 33 PID 3032 wrote to memory of 1244 3032 Install.exe 33 PID 3032 wrote to memory of 1244 3032 Install.exe 33 PID 3032 wrote to memory of 1244 3032 Install.exe 33 PID 1856 wrote to memory of 2568 1856 fire-heart-desktop-gadget.exe 34 PID 1856 wrote to memory of 2568 1856 fire-heart-desktop-gadget.exe 34 PID 1856 wrote to memory of 2568 1856 fire-heart-desktop-gadget.exe 34 PID 1856 wrote to memory of 2568 1856 fire-heart-desktop-gadget.exe 34 PID 1856 wrote to memory of 2568 1856 fire-heart-desktop-gadget.exe 34 PID 1856 wrote to memory of 2568 1856 fire-heart-desktop-gadget.exe 34 PID 1856 wrote to memory of 2568 1856 fire-heart-desktop-gadget.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\file1.exeC:\Users\Admin\AppData\Local\Temp\\file1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\fire-heart-desktop-gadget.exe"C:\Users\Admin\AppData\Local\Temp\fire-heart-desktop-gadget.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\rkverify.exeC:\Users\Admin\AppData\Local\Temp\rkverify.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32GBAJ.exe"C:\Windows\system32GBAJ.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1244
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD56d49e21c02a76cc086006b58c396a8a9
SHA13032feca39f611111544f2a161ccdb532b2646e9
SHA256bbae662541399463318d83aa4b84874b9d45124ddc9ca7a7476ef31ec6f0c663
SHA512f96fdf63a1cf3e6a10d86167026f475fafa06c50067ddcd29ae4ae0015b8fe7b67d80e3ce21b798dfe1ec66d399c36789c73d1cc0288aa84dd20331513638ad9
-
Filesize
1.6MB
MD5177a0ab800321eeb56da08e744f563de
SHA14386f9d3ecc0b9d5b373aef7267770faac68dc01
SHA256472bd8764586dd344b5598e1d4e2de170b118b16becc20c6efe532e5c6b78b04
SHA5129964f6bcab4d6543c278e161f8f40d9e841179f9dadc09517cdc6621a6bfee8eb061c669e4c4333e09f25566ae6a480107546fddfcc63830025455245efa1294
-
Filesize
2KB
MD57c2bc369290efcef3d0364b553ee5ee3
SHA125a0bf0936c0e04cd9fd8d5bffce1d86de6e5c84
SHA25667362ca84b70e3c38273ef408ac81006ebbd7ca72aaad397be10249a64ac2890
SHA512ac2b38b12f3191667e8decd16b5fd4b10ed1140d2841f77e2dca30dfdce593a93b56579211ec81ed5c34de8c5adf0febfbc12e3e928fbf09cf6f739568be8d52
-
Filesize
2KB
MD55900f282d6dbd1b233db2eeaa8be3bab
SHA1b1f0416ad3dc8698606c5d121a9ac5378f552b5d
SHA2568c6579bfc83e6c7eec8f7442af43a74d556e284450ec155519b30967418803f8
SHA51206f86213c172e1f0cd8b674e1d1490c9dbda0523e62276e1110edfe72a6aa6545c2aeaa3e8124f3b8709d25e97171670aaa4980ea791fe3d07071bd923b8a9b4
-
Filesize
2KB
MD5b3b5e6e2e0da6e207a968225f6fab26c
SHA1bf3931fcb1c1e4d452e58bd6988bab2b89020e48
SHA2568e32d12316ea152a94c34d361acd21f2e669713694adc56a47840c656a2eabb1
SHA512fc490757b3315a377926302f07233b45ee8b9db575c3db9772d3feb578db7907c1d431503b74db40e0007330f4e78f1926c83857428a3822d2802c53bb1caf35
-
Filesize
757B
MD5215680eab6548f0f47087af269dd15cf
SHA16d31b875830fa1752204a845a9543031ec92f3cf
SHA256488d269bc64ddbd23a0568203f01991ca039313b76ef53224cfd5cc236638e2c
SHA512192af5b3113e89b3ef496c779a429392be2efecea58dc18371e37163126ad2e49e6283dfcc00b731e0497a780c8c040baf9822e8c2035954ac94a31b16b85fc3
-
Filesize
414B
MD5af2660c5c922592e1daf0d9ee443419c
SHA15deba5ed722e39229fb7f1f8571b34459ce74e4a
SHA256cf3b005c11ca7b75474205ce6f6fe5fe4708a93dd237adb96a4aa7a6d451e8a5
SHA512113df418d7b42b8b726c31c14b4181885738558b84622a8fd215b7ddfdb3d66c181cf654f2219aa219cd6ada5b4dd18882b4c0e4134e4aa78b3c4a906febbcc5
-
Filesize
7KB
MD532dd7b4bc8b6f290b0ece3cc1c011c96
SHA1b979683868b399c6a6204ebaed9fc9c784a0429a
SHA2566dcce9bbba5c2de47eea3abf7597a9c4fb2e4d358efc3752fa65c169cccfa2a1
SHA5129e0d720799fe816f7d09c8a722b762203b6f12a8625c1c93cd640219ecc35969bd641b4d9e6dc04ab6f95ceb73235a438eb7d48ee9402118db3618b5760551ea
-
Filesize
5KB
MD5e8155b68775ed29590e14df80fdc0e9f
SHA1ed449da02e648a524004c265f3c37496d2f07f1f
SHA256b39ba894b0a9a3201461ddd9ee9b297928e793dff221a47f019e75c11df631f3
SHA512b14e00c46cf9bed0aca0f85775f624ff064f2d2afe1fa68b61bee5729db73cf9a8eced669c52d7cbb9504ff1b369a9a16a0f36c71a70c13c0bd1eaf5e07ccc11
-
Filesize
471KB
MD53c06bbc025b61d2182ef5573f2852bda
SHA1ebc1464c00b13fb5b3f80a59c80b595020e1fe7c
SHA256e7f64e7215284cdeb8ef1eba28733f7aeae7f6977f82809d8de1e76a2e249085
SHA5129d839ada211b85fc1efb1fe7bb3ce66fcf0e8069221d958234649c2ac5dc0f1bd06f1a016f9c727077af36fb46cac5409be9c8a8201d17f689c6b473aa01acdc
-
Filesize
1.9MB
MD5a661c16d5a8ea0ec4dd12870eaad4aa6
SHA1e6311368d398e67baf59650c8097e3cfc2c8039a
SHA2568ac9a3287d73ba17c101438e728f22c61bd9f97fce5190e94a50ab48fb1bd71a
SHA51295a133839ea494926690031dcebd6ca834a51ab77018283565411485f3c920ee6fc678c50018b974856e90c40c8984d3040990757d21e1886232f35d3ee8cd2c
-
Filesize
4KB
MD5d9e02f226fc338d14df200ba9a700625
SHA1414f134a16a309b31e418ed9e08c0c48aaf6e2bc
SHA2568165757efb79acceb9fd0bfae6b2c19b8f087cc0461abb17941d460dbdf2e260
SHA51213c73381602fe2593312d41ab4bc5cd5f922ac651f9e71e3fe3c58e7f0c5c73ecc9d79d61ec46f33a0a81cf73373421eeb510bd99650c0f53af30974ed61b8ca
-
Filesize
160KB
MD55ac09190daf249c3e93c3ac961067024
SHA1bad9c0d552d54310f669d66b549dcada90583812
SHA256f4934185f75518a13ef5425959f47516cc8467f513e838a82e749ffb782d7e23
SHA5122a87686c038e8a34f8e04a844726de564a08baeedc87632219b86f455d5222efe2ed7557fad9658627e304d916a75cfcb3c9dede4e72057a070f64370aa52f39
-
Filesize
270KB
MD560b27ce2169a9181b34058d6b9cf179a
SHA1fa43b07ac006d4cd615c4028800aa127468b4368
SHA256d55d37a7753a6413cc072d1fc2e611c3ce1f3e4704a7fc0f3ad0be12fe22c910
SHA5124175d291c5cb8b81448f8d61fd36b7b2038c7c7a789b9bfc2afcbaf02e8d7295f969247932593f7ebab3c84a2d210785073bb09fa50ada0480786eeb07258a0a
-
Filesize
1.3MB
MD5bdf1df1389bb86a6dbef630f9b9dbe86
SHA1a3fc52c62a46f9305f5cc6b0934a307fe4e12ec2
SHA256d4df2a9a0dbc78d75e0a934f8791111d80cbf3db3e2d0662f259432a76e6b902
SHA512845c78871b653b83a11a4876840d40307dadbf1d15b8009265e11c726e38344777a6fc75faa913e64f22565e43398fdf162d5e88b4c0388a82b9ead23d66d6f3
-
Filesize
14KB
MD514c212bb2fa90fe52a6424b955c86ad6
SHA19e94f8ad17ff9b6b31e5f029ee5f726e307ac8ee
SHA2561854afccace3053dca2707b10609ea78a30f0ee853bdb9f251c076317ee53120
SHA512d42fa579f93b98d1446daf3d0734c19838fa310ef27cd05344e25d9f86ba37a5fa1752236e5de4df7c9f414236538bd7431bffda126fb9c74fd112539de0e713
-
Filesize
10KB
MD54c0c6163b636f627e0d505deda672c90
SHA12eae4e6f00673a03ae2434f1b22dc9218e4761a8
SHA256bea71368433f91e32c597db990089ecb7599879f76a64f7f3446489578b2d5fb
SHA512e817ad35f0e89ecce9d73add641d9eab95de6c6c30153e594673c8e0243e738a31dfb872cc76a8d51bc513775fc1dabc9adb65019298048539d6c3aa7d33e2ef
-
Filesize
268KB
MD5020ce95075f8c93e6cc957953d7f4589
SHA1e192a200e36974b8e0637230a8cb5905090f7555
SHA256df9d068202c060a898cd441d5c170686cd9c2774a37cfda3ea10abc428e20ad3
SHA512fb74170ed9b5ee078a176540c198513ed3a8c2e587fbcbf6d2384f840f0b6a2637fd20b6a01b2caf6e92e5f592d517b4733d34fdb349fd770eb04e1eac769170