Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-02-2025 20:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe
Resource
win10v2004-20250211-en
General
-
Target
JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe
-
Size
599KB
-
MD5
fc55485263d7bdc6e4a3adf3b83bde6d
-
SHA1
bf6180b84513aa6800fde62d514e64be77e21d7a
-
SHA256
d2b82aceb0fefc61e61988de6642e38e8a43794bc7eace500b543a30d2dbbc77
-
SHA512
c350ff934b018cdd0ff1962f9c518eba4a90f8159e397fe2c6724fcd0b0173d7573514842ef73b5ed34b1a1d521ad7c9ff4d2ff10c09bd135e021eff5af3d7c0
-
SSDEEP
12288:+demUOhFb8yUEbU1X8uclpixBspAOUdk/I+QRoP5O:zmUOhZ8ys1sucvSMUdYl4
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000700000001946b-9.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2792 YCQL.exe 2248 أونو.exe -
Loads dropped DLL 9 IoCs
pid Process 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 2792 YCQL.exe 2248 أونو.exe 2792 YCQL.exe 2248 أونو.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\YCQL Agent = "C:\\Windows\\SysWOW64\\Sys32\\YCQL.exe" YCQL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\YCQL.001 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe File created C:\Windows\SysWOW64\Sys32\YCQL.006 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe File created C:\Windows\SysWOW64\Sys32\YCQL.007 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe File created C:\Windows\SysWOW64\Sys32\YCQL.exe JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe File created C:\Windows\SysWOW64\Sys32\AKV.exe JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe File opened for modification C:\Windows\SysWOW64\Sys32 YCQL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YCQL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language أونو.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2792 YCQL.exe Token: SeIncBasePriorityPrivilege 2792 YCQL.exe Token: SeIncBasePriorityPrivilege 2792 YCQL.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2792 YCQL.exe 2792 YCQL.exe 2792 YCQL.exe 2792 YCQL.exe 2792 YCQL.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2792 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 31 PID 2268 wrote to memory of 2792 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 31 PID 2268 wrote to memory of 2792 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 31 PID 2268 wrote to memory of 2792 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 31 PID 2268 wrote to memory of 2248 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 32 PID 2268 wrote to memory of 2248 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 32 PID 2268 wrote to memory of 2248 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 32 PID 2268 wrote to memory of 2248 2268 JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe 32 PID 2792 wrote to memory of 1164 2792 YCQL.exe 33 PID 2792 wrote to memory of 1164 2792 YCQL.exe 33 PID 2792 wrote to memory of 1164 2792 YCQL.exe 33 PID 2792 wrote to memory of 1164 2792 YCQL.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fc55485263d7bdc6e4a3adf3b83bde6d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\Sys32\YCQL.exe"C:\Windows\system32\Sys32\YCQL.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\Sys32\YCQL.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
C:\Users\Admin\AppData\Local\Temp\أونو.exe"C:\Users\Admin\AppData\Local\Temp\أونو.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD50a4a56d661007346254a2afc51c86d99
SHA197763c9f04b05c7570009cab22b7ccb4c2beae8e
SHA2565e02a65f94fadb6fbfcbe43e7365696c335427c9c34b95bc430580f4a79fc4d2
SHA512410b0cda301287fc7ac8f9cb18c3823be9cd6623d88cd4db8740038d26eb51287d1c2c0fab1693d842ccddc0ba85c1da68811dfd61d24684bb149ca9958f3a0a
-
Filesize
389KB
MD553a578b112aeb18c5993556d4440ade1
SHA1e51f2fcc784def3cc5ff594edfee5e25f1e9818c
SHA2569170ccd49c118818a83d6ec5264e58519a986671828a144b70d9f601afd29156
SHA51231357e35a4d31483951a7fbd0d774dffd880c8451e2410226dcfb8f8b1c24422febba81ae91aa2e5bb482bc0e662060f772417239e7e7a11c3c36ff8d716f352
-
Filesize
408B
MD5cee15b648ad0b29c965d814a0e9757ff
SHA1245699f21924b149c94c7396c08bb1afca07475c
SHA256437846b310638425d5759b84849675ee1cfc9f470b3694a2135dc5f042d06bc2
SHA5120df2182915d1bdcc3f28a25586c8aa59b1b93b3a77e63debc999811a8dcc8efd6083b7bf1f62a10ddf3f8601807946248d890bc903c797c2865c77cbef32cbbf
-
Filesize
5KB
MD522e9e9b13c2c676bec39178311d55253
SHA1da60379e518feeb798005065dcf626a74afe1848
SHA2563a77698cfcbbc40473f163c76838e6509c52bd6ffb97ba9d144ccd25ef5c7e14
SHA5121d3b7eb4dcaa969a49786f1f55caa731e2e82dc79896985d50aa225fd7071bef521a6d85f56ee249db518cf0fc4a53f942299328bf54862307f742d3a6ca3dcc
-
Filesize
3KB
MD514c3321783fac66161b308d34c5b0eac
SHA1021b4f77e27d6e0b032158936a752e27cdde09fa
SHA25609e6cfa1698ed3cd3592fa4ed36eb970fa599cb86ce6975f5ef90dfbaf6a2f21
SHA5129ba6f2992164e7e98084e3c3b5a4cd231edeca22b784d01e5e98078ed19a1114ba9f837aa77ec3303bfcff6fa6a7a3b4588ee6e3a444eb35fc5e8c1d732825ad
-
Filesize
7KB
MD5504f5a7e8447c65bc2218bb3d47c309b
SHA15d2d703cfa8b1c0fab1b13b01e2250e246e2eb44
SHA25681f383d6a9a90d1587af3f2903d9fd4ce4b4843aa285928ba731a3ee8f60c39f
SHA512b90427bc146e30a5db47aaea4d7ac559db679f64ce490eb2195106acbc3d266442d71a7c0b00762203010436ed86bc84ef59bc3269b7611f9a6b5025fc85190b
-
Filesize
475KB
MD59c3ff825312190802dc56c7b0d0ccebd
SHA158e200c00382b3d13c81c9e829da065ed45f5928
SHA256e55fbc08da9dc8bfb13b1d649e117540ee2c416a678eafa40e49088c2864dcc4
SHA512513f6e3ab1bc31d01c1730c04313a39df5f9a5e30db70699df0507fff4c82f36706a637d32f532985e551a5a835682ebdc077560fee2f9741cba7767a86b7968