Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2025 21:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe
Resource
win10v2004-20250211-en
General
-
Target
JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe
-
Size
872KB
-
MD5
fca6d612a6cec1d45fb75ba443cc2b0d
-
SHA1
75106d302a139496da43308a3e0131b24610df91
-
SHA256
a518e8b1c1e97085cc255f42e34f76ff8e6a2a33a6ce8b141769b0e51a95203e
-
SHA512
a6e737c99b0889d7f7b4fcbbfbd40abd391bbbd75f55b3ac59ad7c4c7dd97b27b8293e4beeffa58fb9ad2ea94b666c5d747dfc6c28cf8f4d0e539355de036021
-
SSDEEP
24576:ZGy6DGcIUttZXjgOw8W5I3YCJJQBREwbcLkKRk:cScTZRw8Wa3Yy+3b
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000d000000023c3c-24.dat family_ardamax -
Downloads MZ/PE file 1 IoCs
flow pid Process 42 2564 Process not Found -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation 1.exe Key value queried \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Control Panel\International\Geo\Nation QHVF.exe -
Executes dropped EXE 3 IoCs
pid Process 1624 1.exe 2720 QHVF.exe 208 2.exe -
Loads dropped DLL 8 IoCs
pid Process 1624 1.exe 2720 QHVF.exe 2720 QHVF.exe 2720 QHVF.exe 208 2.exe 208 2.exe 208 2.exe 3644 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QHVF Agent = "C:\\Windows\\SysWOW64\\28463\\QHVF.exe" QHVF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463 QHVF.exe File created C:\Windows\SysWOW64\28463\QHVF.001 1.exe File created C:\Windows\SysWOW64\28463\QHVF.006 1.exe File created C:\Windows\SysWOW64\28463\QHVF.007 1.exe File created C:\Windows\SysWOW64\28463\QHVF.exe 1.exe File created C:\Windows\SysWOW64\28463\key.bin 1.exe File created C:\Windows\SysWOW64\28463\AKV.exe 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3644 2720 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QHVF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4516 MicrosoftEdgeUpdate.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\FLAGS\ QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\VersionIndependentProgID\ QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2} QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\InprocServer32\ QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\ProgID\ QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\ = "Legacy MtxGrp 1.0 Type Library" QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\0\win32 QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\ProgID QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC} QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\ QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0 QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\0\win32\ QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\comsvcs.dll" QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\VersionIndependentProgID QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\0\ QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\TypeLib\ QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\Version\ = "5.4" QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\InprocServer32 QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\ QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\FLAGS\ = "0" QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\TypeLib\ = "{BF68D3FC-8FE6-510A-1636-795FE481A9CC}" QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\InprocServer32\ = "%SystemRoot%\\SysWow64\\Speech_OneCore\\Common\\sapi_onecore.dll" QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\0 QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\ = "Biwije Anefo" QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\ProgID\ = "Sapi.SpSharedRecognizer.1" QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BF68D3FC-8FE6-510A-1636-795FE481A9CC}\1.0\FLAGS QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\TypeLib QHVF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\Version QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\Version\ QHVF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{15D16510-4D79-4247-F0BC-D674A89CE0E2}\VersionIndependentProgID\ = "Sapi.SpSharedRecognizer" QHVF.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2720 QHVF.exe Token: SeIncBasePriorityPrivilege 2720 QHVF.exe Token: SeIncBasePriorityPrivilege 2720 QHVF.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 208 2.exe 208 2.exe 2720 QHVF.exe 2720 QHVF.exe 2720 QHVF.exe 2720 QHVF.exe 2720 QHVF.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1624 1908 JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe 89 PID 1908 wrote to memory of 1624 1908 JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe 89 PID 1908 wrote to memory of 1624 1908 JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe 89 PID 1624 wrote to memory of 2720 1624 1.exe 91 PID 1624 wrote to memory of 2720 1624 1.exe 91 PID 1624 wrote to memory of 2720 1624 1.exe 91 PID 1908 wrote to memory of 208 1908 JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe 92 PID 1908 wrote to memory of 208 1908 JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe 92 PID 1908 wrote to memory of 208 1908 JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe 92 PID 2720 wrote to memory of 3812 2720 QHVF.exe 108 PID 2720 wrote to memory of 3812 2720 QHVF.exe 108 PID 2720 wrote to memory of 3812 2720 QHVF.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fca6d612a6cec1d45fb75ba443cc2b0d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\28463\QHVF.exe"C:\Windows\system32\28463\QHVF.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 10964⤵
- Loads dropped DLL
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\QHVF.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:208
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzEyMjkyMzgyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2720 -ip 27201⤵PID:340
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD56724039cce21e08cb4a8086ab7ff9034
SHA1f8b127f14a77dbfc2c4261fba22cdfa68e7ea8f5
SHA256619fdc944030cd04e37cf1ae8d276e0c70452a6f43b73e9f65cec1dbebbf9297
SHA51263fdeaa55c9a4f97358d1a63a87c387cc82850837d1e2c3c1f7e7cf3ba724f7ac05ba55a06771e82b9099ff07e3351510a6022f254b2c7a125a66729a081bff2
-
Filesize
72KB
MD54aa2ced055a4a47ee8166b8a2eabaf62
SHA120a23c6ccaafd490b30a3e81c11f773d2554fce7
SHA25623bc4f799105a4a905ad599e79c87d36eb0e6204badad21011b13cc63822ae4e
SHA51246341bfc3883ce95d35ff74b2c9e675f31cac9a7e7f5889b448b7a26b66351870d798db2682d5feebc227fe793d1cb310d56af032e5e885896b50948ae63205d
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
520B
MD5450c67d4d93cdd6ebc2577569a965fb2
SHA14aaefe58a3fb230dee07d6ecad8d1e95a6e35b41
SHA256741e7431f107c30b259ccdd50f219306538a20e998fbc05fefa6a6878839966b
SHA51217b84b6ac87113dcb4626d7798826897eebc8ff0a0a93cc58362cc6e6d36fe77ac00ee3fb85732da4629b4be62100ea24b3c4c25ee001920ba83486663ad8bec
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a
-
Filesize
105B
MD527c90d4d9b049f4cd00f32ed1d2e5baf
SHA1338a3ea8f1e929d8916ece9b6e91e697eb562550
SHA256172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb
SHA512d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae