Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 02:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe
-
Size
3.3MB
-
MD5
1d47116dfd00c5197ad0ebb23e61ee92
-
SHA1
d5299dcb21a0cbf5826e020da81def99d76a1373
-
SHA256
d7d05456dc79039ba0a8292c84b150f2182edd06d671aeb6eddbe35f1308748c
-
SHA512
59f5b04cc3accc8160e431ba0119ba2ed5cb7350aa861ea389407fbb2d3e3d14e5b1c375c43608c2b812a2e3887b06e5f051281630c7fdbb315eb8a87f1474f7
-
SSDEEP
24576:go/ADMPEzh/5bHYjbXrX4xxkzTf5uhaFHLWQoWilqVD2AwaIu9fMOs70vJZ4jbic:wa8alTl7DMZcACMtZWsKgNVFonN5KGo
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023c90-51.dat family_ardamax -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation file1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Install.exe -
Executes dropped EXE 5 IoCs
pid Process 3508 file1.exe 2832 fire-heart-desktop-gadget.exe 2444 Install.exe 4296 system32GBAJ.exe 1848 rkverify.exe -
Loads dropped DLL 14 IoCs
pid Process 2444 Install.exe 1848 rkverify.exe 2832 fire-heart-desktop-gadget.exe 4296 system32GBAJ.exe 4296 system32GBAJ.exe 4296 system32GBAJ.exe 2832 fire-heart-desktop-gadget.exe 2832 fire-heart-desktop-gadget.exe 2832 fire-heart-desktop-gadget.exe 2832 fire-heart-desktop-gadget.exe 2832 fire-heart-desktop-gadget.exe 2832 fire-heart-desktop-gadget.exe 2832 fire-heart-desktop-gadget.exe 2832 fire-heart-desktop-gadget.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GBAJ Agent = "C:\\Windows\\system32GBAJ.exe" system32GBAJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Fire Heart Desktop Gadget\fireheart.exe fire-heart-desktop-gadget.exe File created C:\Program Files (x86)\Fire Heart Desktop Gadget\sample.jpg fire-heart-desktop-gadget.exe File created C:\Program Files (x86)\Fire Heart Desktop Gadget\Uninstall.exe fire-heart-desktop-gadget.exe File created C:\Program Files (x86)\Fire Heart Desktop Gadget\Readme.txt fire-heart-desktop-gadget.exe File created C:\Program Files (x86)\Fire Heart Desktop Gadget\License.txt fire-heart-desktop-gadget.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\system32GBAJ.001 Install.exe File created C:\Windows\system32GBAJ.006 Install.exe File created C:\Windows\system32GBAJ.007 Install.exe File created C:\Windows\system32GBAJ.exe Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GBAJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkverify.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fire-heart-desktop-gadget.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023c86-18.dat nsis_installer_1 behavioral2/files/0x0008000000023c86-18.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4296 system32GBAJ.exe Token: SeIncBasePriorityPrivilege 4296 system32GBAJ.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4296 system32GBAJ.exe 4296 system32GBAJ.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe 1848 rkverify.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4292 wrote to memory of 3508 4292 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 83 PID 4292 wrote to memory of 3508 4292 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 83 PID 4292 wrote to memory of 3508 4292 JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe 83 PID 3508 wrote to memory of 2832 3508 file1.exe 84 PID 3508 wrote to memory of 2832 3508 file1.exe 84 PID 3508 wrote to memory of 2832 3508 file1.exe 84 PID 3508 wrote to memory of 2444 3508 file1.exe 85 PID 3508 wrote to memory of 2444 3508 file1.exe 85 PID 3508 wrote to memory of 2444 3508 file1.exe 85 PID 2444 wrote to memory of 4296 2444 Install.exe 86 PID 2444 wrote to memory of 4296 2444 Install.exe 86 PID 2444 wrote to memory of 4296 2444 Install.exe 86 PID 2832 wrote to memory of 1848 2832 fire-heart-desktop-gadget.exe 87 PID 2832 wrote to memory of 1848 2832 fire-heart-desktop-gadget.exe 87 PID 2832 wrote to memory of 1848 2832 fire-heart-desktop-gadget.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d47116dfd00c5197ad0ebb23e61ee92.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\file1.exeC:\Users\Admin\AppData\Local\Temp\\file1.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\fire-heart-desktop-gadget.exe"C:\Users\Admin\AppData\Local\Temp\fire-heart-desktop-gadget.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\rkverify.exeC:\Users\Admin\AppData\Local\Temp\rkverify.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32GBAJ.exe"C:\Windows\system32GBAJ.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4296
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5a661c16d5a8ea0ec4dd12870eaad4aa6
SHA1e6311368d398e67baf59650c8097e3cfc2c8039a
SHA2568ac9a3287d73ba17c101438e728f22c61bd9f97fce5190e94a50ab48fb1bd71a
SHA51295a133839ea494926690031dcebd6ca834a51ab77018283565411485f3c920ee6fc678c50018b974856e90c40c8984d3040990757d21e1886232f35d3ee8cd2c
-
Filesize
4KB
MD5d9e02f226fc338d14df200ba9a700625
SHA1414f134a16a309b31e418ed9e08c0c48aaf6e2bc
SHA2568165757efb79acceb9fd0bfae6b2c19b8f087cc0461abb17941d460dbdf2e260
SHA51213c73381602fe2593312d41ab4bc5cd5f922ac651f9e71e3fe3c58e7f0c5c73ecc9d79d61ec46f33a0a81cf73373421eeb510bd99650c0f53af30974ed61b8ca
-
Filesize
160KB
MD55ac09190daf249c3e93c3ac961067024
SHA1bad9c0d552d54310f669d66b549dcada90583812
SHA256f4934185f75518a13ef5425959f47516cc8467f513e838a82e749ffb782d7e23
SHA5122a87686c038e8a34f8e04a844726de564a08baeedc87632219b86f455d5222efe2ed7557fad9658627e304d916a75cfcb3c9dede4e72057a070f64370aa52f39
-
Filesize
270KB
MD560b27ce2169a9181b34058d6b9cf179a
SHA1fa43b07ac006d4cd615c4028800aa127468b4368
SHA256d55d37a7753a6413cc072d1fc2e611c3ce1f3e4704a7fc0f3ad0be12fe22c910
SHA5124175d291c5cb8b81448f8d61fd36b7b2038c7c7a789b9bfc2afcbaf02e8d7295f969247932593f7ebab3c84a2d210785073bb09fa50ada0480786eeb07258a0a
-
Filesize
1.6MB
MD5177a0ab800321eeb56da08e744f563de
SHA14386f9d3ecc0b9d5b373aef7267770faac68dc01
SHA256472bd8764586dd344b5598e1d4e2de170b118b16becc20c6efe532e5c6b78b04
SHA5129964f6bcab4d6543c278e161f8f40d9e841179f9dadc09517cdc6621a6bfee8eb061c669e4c4333e09f25566ae6a480107546fddfcc63830025455245efa1294
-
Filesize
1.3MB
MD5bdf1df1389bb86a6dbef630f9b9dbe86
SHA1a3fc52c62a46f9305f5cc6b0934a307fe4e12ec2
SHA256d4df2a9a0dbc78d75e0a934f8791111d80cbf3db3e2d0662f259432a76e6b902
SHA512845c78871b653b83a11a4876840d40307dadbf1d15b8009265e11c726e38344777a6fc75faa913e64f22565e43398fdf162d5e88b4c0388a82b9ead23d66d6f3
-
Filesize
14KB
MD514c212bb2fa90fe52a6424b955c86ad6
SHA19e94f8ad17ff9b6b31e5f029ee5f726e307ac8ee
SHA2561854afccace3053dca2707b10609ea78a30f0ee853bdb9f251c076317ee53120
SHA512d42fa579f93b98d1446daf3d0734c19838fa310ef27cd05344e25d9f86ba37a5fa1752236e5de4df7c9f414236538bd7431bffda126fb9c74fd112539de0e713
-
Filesize
10KB
MD54c0c6163b636f627e0d505deda672c90
SHA12eae4e6f00673a03ae2434f1b22dc9218e4761a8
SHA256bea71368433f91e32c597db990089ecb7599879f76a64f7f3446489578b2d5fb
SHA512e817ad35f0e89ecce9d73add641d9eab95de6c6c30153e594673c8e0243e738a31dfb872cc76a8d51bc513775fc1dabc9adb65019298048539d6c3aa7d33e2ef
-
Filesize
2KB
MD57c2bc369290efcef3d0364b553ee5ee3
SHA125a0bf0936c0e04cd9fd8d5bffce1d86de6e5c84
SHA25667362ca84b70e3c38273ef408ac81006ebbd7ca72aaad397be10249a64ac2890
SHA512ac2b38b12f3191667e8decd16b5fd4b10ed1140d2841f77e2dca30dfdce593a93b56579211ec81ed5c34de8c5adf0febfbc12e3e928fbf09cf6f739568be8d52
-
Filesize
2KB
MD5587912b916f6bea24599b5bff97a3311
SHA1d2f49e46441425dea3e9f61f53d651e347a2d76e
SHA256d1646118c323d233d457a9fbca363776415f60583ecc5c7ac8ce8d6450e0b8c9
SHA5127d5a85a72d49a786d0e3a058cda0cc56fdd97bca5ea9a5806ad044fe47fe9ebaa7a4ef1b084cb01880edc97544ccffa83f7d0ccdf3a3831f20ff5f2da9a8c7da
-
Filesize
2KB
MD5559c1870b9e98dd09f91b83904c65c06
SHA1430f0f0f0df9951e168e1be2b6be1fdb0fc1fdcb
SHA256d95d19622129b45b1977d1276d5157e664b0e5cc14fbe0c038e6644ba7cd9173
SHA512608f3c7508654efe87f118332a20169f7caee9a60a3537fb01e5128d94154f9d4e865e1389a6ab1e36710b425da5449448bb52bf6e726407404eba53a0329532
-
Filesize
757B
MD5388b387bbad3cfa6a13c51ed32072331
SHA1717a908dc8d72c8763d4f7fc6e138431a4e9d522
SHA256cd73946d71bd290fd90673ad728eaf1a78dd432c0528c00033d9f2b7b84d987a
SHA51203499533081f7f1aa161558b8909b04dea16ba4d52e314f6554e40cee175805bc18ebf90ec3be9ccff47abddbe2556725ef9ad32b848da33c2b7264f81d4076b
-
Filesize
268KB
MD5020ce95075f8c93e6cc957953d7f4589
SHA1e192a200e36974b8e0637230a8cb5905090f7555
SHA256df9d068202c060a898cd441d5c170686cd9c2774a37cfda3ea10abc428e20ad3
SHA512fb74170ed9b5ee078a176540c198513ed3a8c2e587fbcbf6d2384f840f0b6a2637fd20b6a01b2caf6e92e5f592d517b4733d34fdb349fd770eb04e1eac769170
-
Filesize
414B
MD5af2660c5c922592e1daf0d9ee443419c
SHA15deba5ed722e39229fb7f1f8571b34459ce74e4a
SHA256cf3b005c11ca7b75474205ce6f6fe5fe4708a93dd237adb96a4aa7a6d451e8a5
SHA512113df418d7b42b8b726c31c14b4181885738558b84622a8fd215b7ddfdb3d66c181cf654f2219aa219cd6ada5b4dd18882b4c0e4134e4aa78b3c4a906febbcc5
-
Filesize
7KB
MD532dd7b4bc8b6f290b0ece3cc1c011c96
SHA1b979683868b399c6a6204ebaed9fc9c784a0429a
SHA2566dcce9bbba5c2de47eea3abf7597a9c4fb2e4d358efc3752fa65c169cccfa2a1
SHA5129e0d720799fe816f7d09c8a722b762203b6f12a8625c1c93cd640219ecc35969bd641b4d9e6dc04ab6f95ceb73235a438eb7d48ee9402118db3618b5760551ea
-
Filesize
5KB
MD5e8155b68775ed29590e14df80fdc0e9f
SHA1ed449da02e648a524004c265f3c37496d2f07f1f
SHA256b39ba894b0a9a3201461ddd9ee9b297928e793dff221a47f019e75c11df631f3
SHA512b14e00c46cf9bed0aca0f85775f624ff064f2d2afe1fa68b61bee5729db73cf9a8eced669c52d7cbb9504ff1b369a9a16a0f36c71a70c13c0bd1eaf5e07ccc11
-
Filesize
471KB
MD53c06bbc025b61d2182ef5573f2852bda
SHA1ebc1464c00b13fb5b3f80a59c80b595020e1fe7c
SHA256e7f64e7215284cdeb8ef1eba28733f7aeae7f6977f82809d8de1e76a2e249085
SHA5129d839ada211b85fc1efb1fe7bb3ce66fcf0e8069221d958234649c2ac5dc0f1bd06f1a016f9c727077af36fb46cac5409be9c8a8201d17f689c6b473aa01acdc