Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe
-
Size
600KB
-
MD5
788e554c0938109f4ec5cb40af7bd228
-
SHA1
62709ae17f8bdc45d5afae2fee3b954aed9005a0
-
SHA256
91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454
-
SHA512
93670d12a873650f94d5d55e09f51ceab2db50e18d1a217a4a0e938cc786cbaed1b534ee55bf92c95d46c45b6a226d37608aa6d820caa814b592f88a8c1ab027
-
SSDEEP
12288:fRhzupXfGlLO5MKsTDqtOotOBuI9NxpyLnZg:Zhz+ulKJS2PtmuSNxULZ
Malware Config
Extracted
Protocol: ftp- Host:
ftp.drivehq.com - Port:
21 - Username:
cet90
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0005000000019458-35.dat family_ardamax -
Executes dropped EXE 3 IoCs
pid Process 1484 ardamax.EXE 2200 Install.exe 2820 RKYT.exe -
Loads dropped DLL 9 IoCs
pid Process 2200 Install.exe 2200 Install.exe 2200 Install.exe 2200 Install.exe 2200 Install.exe 2820 RKYT.exe 2820 RKYT.exe 2820 RKYT.exe 2820 RKYT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RKYT Agent = "C:\\Windows\\SysWOW64\\28463\\RKYT.exe" RKYT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\key.bin Install.exe File opened for modification C:\Windows\SysWOW64\28463 RKYT.exe File created C:\Windows\SysWOW64\28463\RKYT.009 RKYT.exe File created C:\Windows\SysWOW64\28463\RKYT.001 Install.exe File created C:\Windows\SysWOW64\28463\RKYT.007 Install.exe File created C:\Windows\SysWOW64\28463\RKYT.exe Install.exe File opened for modification C:\Windows\SysWOW64\28463\RKYT.009 RKYT.exe File created C:\Windows\SysWOW64\28463\RKYT.006 Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RKYT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe -
Modifies registry class 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\ = "Groove DataViewer Tool Type Library 1.0" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\HELPDIR\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\VersionIndependentProgID RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\ProgID RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\0 RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\0\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\FLAGS\ = "0" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\FLAGS RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\VersionIndependentProgID\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\ProgID\ = "FPerson.Factoid.2" RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\Programmable RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\150" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\FLAGS\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\HELPDIR RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\ = "Omekove object" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3} RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\InprocServer32\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0 RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\InprocServer32\ = "C:\\PROGRA~2\\COMMON~1\\MICROS~1\\SMARTT~1\\FPERSON.DLL" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\Programmable\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\0\win32 RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\TypeLib RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\VersionIndependentProgID\ = "FPerson.Factoid" RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\InprocServer32 RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\ProgID\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}\1.0\0\win32\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\TypeLib\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A567E5DF-8886-491A-F7A4-F0941A629DC3}\TypeLib\ = "{C580DFFC-C5E5-5385-AA54-BD00FE1EC743}" RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C580DFFC-C5E5-5385-AA54-BD00FE1EC743} RKYT.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2820 RKYT.exe Token: SeIncBasePriorityPrivilege 2820 RKYT.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2820 RKYT.exe 2820 RKYT.exe 2820 RKYT.exe 2820 RKYT.exe 2820 RKYT.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1640 2408 JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe 30 PID 2408 wrote to memory of 1640 2408 JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe 30 PID 2408 wrote to memory of 1640 2408 JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe 30 PID 2408 wrote to memory of 1484 2408 JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe 32 PID 2408 wrote to memory of 1484 2408 JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe 32 PID 2408 wrote to memory of 1484 2408 JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe 32 PID 1484 wrote to memory of 2200 1484 ardamax.EXE 33 PID 1484 wrote to memory of 2200 1484 ardamax.EXE 33 PID 1484 wrote to memory of 2200 1484 ardamax.EXE 33 PID 1484 wrote to memory of 2200 1484 ardamax.EXE 33 PID 1484 wrote to memory of 2200 1484 ardamax.EXE 33 PID 1484 wrote to memory of 2200 1484 ardamax.EXE 33 PID 1484 wrote to memory of 2200 1484 ardamax.EXE 33 PID 2200 wrote to memory of 2820 2200 Install.exe 34 PID 2200 wrote to memory of 2820 2200 Install.exe 34 PID 2200 wrote to memory of 2820 2200 Install.exe 34 PID 2200 wrote to memory of 2820 2200 Install.exe 34 PID 2200 wrote to memory of 2820 2200 Install.exe 34 PID 2200 wrote to memory of 2820 2200 Install.exe 34 PID 2200 wrote to memory of 2820 2200 Install.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\ardamax.EXE"C:\Users\Admin\AppData\Local\Temp\ardamax.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\28463\RKYT.exe"C:\Windows\system32\28463\RKYT.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566KB
MD541dc0fc1fff90a9d5d28f64da7f5b4f4
SHA103fb38cfec8e4cb088c9f2d3edb08afbf5c08f3d
SHA2569c8ad7d35fa160b6254c62c99487e9d846c7da0e7d4900c7c6b707294aed4eaf
SHA51229b816459333dfe4b269ee16eb6f11c622e0b10959f2431a7d14efe3861e24acf546e955736a1554404050bf1adc34abdd25ea178ae3a16c836aa8004db11377
-
Filesize
581KB
MD53a19cabf65e0f578e8bb61e2579017f6
SHA1c12f4dfe9f4082ddd5b321a70a70e2eeeeeaa2eb
SHA2563e26364fc5c4799e494eeab424fa632c4a7a629819e1582dd931fe08f9e43998
SHA5126759f73b0462f6be26051dcbb4e78b8f13f5b3da74145aa0ac9fa05d85d1ae5c626ee4d06bdb99d48b26c772a32dce13cd20be15c3e712e703d47eee795d6f6e
-
Filesize
23B
MD5234dbc908f632fc9fed55bd63e19e1f5
SHA139e7adf222e3eff34d33f65bbd56399aaeede7a7
SHA256b110b65a0722a06873690dba696b25dd321365313c6f0e2db908d6544c8c5f98
SHA512b4d32a3da8f1e9bd245303607b59df9eea19cc8776587defbac9384783004b150f2adad49e9ca369e643a64de7b747e276fef9486dd8ee1f3e263bb4e1521493
-
Filesize
374B
MD52e33a26777c1717ee92cc27e6f1c3979
SHA1dbe6ecd86d9887415e7793e22cf5aefd606cfb7e
SHA256035eff176236050769524579965c1781280b61e78278ee45bb1962737bfcab32
SHA51276e6f99566288f4737c2122935bfaf13560406e8400cd372b4f1000d789d7834be5ae2aec0305a5436266945d9546a6dca342923ba1ffabdbe4ddc6a3f6ba342
-
Filesize
8KB
MD531854a50b294dd312eb7fa9eb1c99537
SHA1e0b1682a001e15d0e0e1c1ca732cafb5c80b3160
SHA2562fe2d55aae2deef38a37c9679d74ecf05699d6919760794f69583b43b7fe308c
SHA5120482a4981ba242d4e931bd8b9eb5d606492cffb7609fb69fb349ed19c7a9e36a7e240e5ebe759505d253c5e72fb771612a76419c36fb035987a166569a5111c2
-
Filesize
5KB
MD5603451f504bedb28c3a7bae4c89abf24
SHA1cbfe12186b54663f60663c349739c7a49950c44e
SHA256e4d6577ea390274308877284b6d0cd6672aeb0e76c9c9847ac59c0964f050d13
SHA512136e28e288b3ce26b37c82b078a3440e3232c0f874d7d33e8e6fb6eadfd0024b9009448500c716523b81f142fa3bebf7d11f1dd3e8e6143867b06335eb5f9612
-
Filesize
929KB
MD5d8003a646c4e4c43456d33e5a4310abe
SHA1833fa3dc9e586890b2ff7343d4f7ec34a1fbcce0
SHA256123233005967cc7657d08dc5de6997a8098c7246cbdeb61fe4b2b25ce5517efb
SHA5125e063f7fbd3fa7f54fe84011332ea1e7ecb84999bbab6b991949dcdd935c48a01aa0beacbff24ab974faafecfe6bc4790adb265cb93d3e00bcb47456044c617b
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
Filesize
4KB
MD5f1cf9fcbddeadabb738de497ffefdced
SHA17385a7c87e245da89cc5ef8f9295678c1566f25d
SHA256086083bc73b14286f9c3c29df8b8dc6f014d8b084267fbaeee0af56344d1f779
SHA5123a3b9d279b4c131ef3f358e0163f60ec9e60160a2cc45488adb915fea6642f3df5d35da2ccb6983d790401d237fbc808829f42c42ef958e7a0eac98fc33bb3f6
-
Filesize
648KB
MD5ce568bcaf7285124f764aff92f5079d4
SHA1886f698e2239cf615f12b503853a5fa28c53aefc
SHA25659d7d6de8a9e2d5535703d22c36888889530fd011d7f71cf034e93e36e7527af
SHA5129f6e3496930cb5dd9c9403acc865bc94f63f64af49a27ffeedbc9d9082d50bff4a7a772bb98d4a2719f0ecae144393de9cc273ba83ae00abe347b0be0d7c9866