Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe
-
Size
2.9MB
-
MD5
8636b780528130d1833d3dd93f6fa385
-
SHA1
a3b10fc211b81deaa6e91ad7e27141c87bfa876d
-
SHA256
323ac939098c774dc54414c346aab1009496647a5f007e501b9b7bd444e9ce5c
-
SHA512
8b66d9f74b1cc463e67805d5b4e5990f3a9c19cf6bcd4a1d4e9ac9453b4402efc2c7775a05aab51b42bc0c84d61d778b5f63d9b1298b7415f132f20bd9433983
-
SSDEEP
49152:t+O2cRgrD1vKPtriRpGQLrTvD1cpfFnQMp8kryu9znBMlDcUIk1RQY4lW4ZlYJTi:+cRShYr9kTvD+vnQI8kdzBMEk1RR4lWs
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000500000001944e-49.dat family_ardamax -
Executes dropped EXE 4 IoCs
pid Process 2504 setup_rep_3_0_2.exe 2364 Install24.exe 776 setup_rep_3_0_2.tmp 2768 QDQP.exe -
Loads dropped DLL 16 IoCs
pid Process 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 2364 Install24.exe 2364 Install24.exe 2364 Install24.exe 2504 setup_rep_3_0_2.exe 2364 Install24.exe 776 setup_rep_3_0_2.tmp 776 setup_rep_3_0_2.tmp 2364 Install24.exe 2768 QDQP.exe 2768 QDQP.exe 2768 QDQP.exe 2768 QDQP.exe 776 setup_rep_3_0_2.tmp 776 setup_rep_3_0_2.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QDQP Agent = "C:\\Windows\\SysWOW64\\28463\\QDQP.exe" QDQP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\QDQP.exe Install24.exe File created C:\Windows\SysWOW64\28463\key.bin Install24.exe File created C:\Windows\SysWOW64\28463\AKV.exe Install24.exe File opened for modification C:\Windows\SysWOW64\28463 QDQP.exe File created C:\Windows\SysWOW64\28463\QDQP.001 Install24.exe File created C:\Windows\SysWOW64\28463\QDQP.006 Install24.exe File created C:\Windows\SysWOW64\28463\QDQP.007 Install24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_rep_3_0_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_rep_3_0_2.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QDQP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\InprocServer32\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\ProgID\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\FLAGS\ = "0" QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\ = "Microsoft OneNote PowerPoint Button Addin 1.0 Object Library" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\0 QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\TypeLib QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\VersionIndependentProgID\ = "LR.LexRefBilingualServiceAttribute.1.0" QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\TypeLib\ = "{AADF83B3-C8B9-3260-887E-A7B08957DE7C}" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE} QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\ProgID\ = "LR.LexRefBilingualServiceAttribute.1.0.1" QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\0\win32\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\FLAGS\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\HELPDIR\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\ = "Osovida.Nekadzakzi" QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\0\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\ONBTTN~2.DLL" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\HELPDIR QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\TRANSLAT\\MSB1CORE.DLL" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C} QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0 QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\ QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\0\win32 QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\TypeLib\ QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\VersionIndependentProgID QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\InprocServer32 QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\ProgID QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\ QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AADF83B3-C8B9-3260-887E-A7B08957DE7C}\1.0\FLAGS QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6C5BD38A-FDAD-48C4-BFB3-1DCEF782CBAE}\VersionIndependentProgID\ QDQP.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 776 setup_rep_3_0_2.tmp -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2768 QDQP.exe Token: SeIncBasePriorityPrivilege 2768 QDQP.exe Token: SeIncBasePriorityPrivilege 2768 QDQP.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2768 QDQP.exe 2768 QDQP.exe 2768 QDQP.exe 2768 QDQP.exe 2768 QDQP.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2504 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 30 PID 2124 wrote to memory of 2504 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 30 PID 2124 wrote to memory of 2504 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 30 PID 2124 wrote to memory of 2504 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 30 PID 2124 wrote to memory of 2504 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 30 PID 2124 wrote to memory of 2504 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 30 PID 2124 wrote to memory of 2504 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 30 PID 2124 wrote to memory of 2364 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 31 PID 2124 wrote to memory of 2364 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 31 PID 2124 wrote to memory of 2364 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 31 PID 2124 wrote to memory of 2364 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 31 PID 2124 wrote to memory of 2364 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 31 PID 2124 wrote to memory of 2364 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 31 PID 2124 wrote to memory of 2364 2124 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 31 PID 2504 wrote to memory of 776 2504 setup_rep_3_0_2.exe 32 PID 2504 wrote to memory of 776 2504 setup_rep_3_0_2.exe 32 PID 2504 wrote to memory of 776 2504 setup_rep_3_0_2.exe 32 PID 2504 wrote to memory of 776 2504 setup_rep_3_0_2.exe 32 PID 2504 wrote to memory of 776 2504 setup_rep_3_0_2.exe 32 PID 2504 wrote to memory of 776 2504 setup_rep_3_0_2.exe 32 PID 2504 wrote to memory of 776 2504 setup_rep_3_0_2.exe 32 PID 2364 wrote to memory of 2768 2364 Install24.exe 33 PID 2364 wrote to memory of 2768 2364 Install24.exe 33 PID 2364 wrote to memory of 2768 2364 Install24.exe 33 PID 2364 wrote to memory of 2768 2364 Install24.exe 33 PID 2364 wrote to memory of 2768 2364 Install24.exe 33 PID 2364 wrote to memory of 2768 2364 Install24.exe 33 PID 2364 wrote to memory of 2768 2364 Install24.exe 33 PID 2768 wrote to memory of 632 2768 QDQP.exe 35 PID 2768 wrote to memory of 632 2768 QDQP.exe 35 PID 2768 wrote to memory of 632 2768 QDQP.exe 35 PID 2768 wrote to memory of 632 2768 QDQP.exe 35 PID 2768 wrote to memory of 632 2768 QDQP.exe 35 PID 2768 wrote to memory of 632 2768 QDQP.exe 35 PID 2768 wrote to memory of 632 2768 QDQP.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\setup_rep_3_0_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_rep_3_0_2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\is-SK199.tmp\setup_rep_3_0_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-SK199.tmp\setup_rep_3_0_2.tmp" /SL5="$5014E,1961614,53248,C:\Users\Admin\AppData\Local\Temp\setup_rep_3_0_2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:776
-
-
-
C:\Users\Admin\AppData\Local\Temp\Install24.exe"C:\Users\Admin\AppData\Local\Temp\Install24.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\28463\QDQP.exe"C:\Windows\system32\28463\QDQP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\QDQP.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:632
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD519794a23edc7494063603d316165c04f
SHA16b5050be2ffa32cc3dd0d1e53fa2cfe355c59b4e
SHA25620aa8a967c2982acf1afce320284de9b4749fd3326b63c08fad8921720764b3e
SHA5128f782e06cd32844a336548083eeb50d818ba8acbbba042719da7505dd2d239dc133eedcf244c19901bba7424d2eef60a977b6d6795de9baa6d56ad13c3828774
-
Filesize
382B
MD5b75acc9bf422ae3ec204cb4fd117dfc1
SHA1aa595c904e39f12e513020fbcda39ac595ee2c39
SHA2560ae5b93d5ad51b5e4d6076344fecac14ba56938857eb3fa65600792edc9fbe2f
SHA512b99c20dcc37647f44b156d8579201e157dfb4213e9eb0732ad89e4ecd71b01a0687e82883f07e7fc82c5964937c44e4fdcaf3d26618109dc0811388fb0a23a4a
-
Filesize
8KB
MD5bc5fd352bfe50a09ffd84c95f697f9b4
SHA1847a869a2b789c2f5c9845340f133b8845976aaa
SHA2561c1bd72088d746302e15ed63f343bdbabae5ff39f1633e8f60ccd8e20dc0863f
SHA512b52e8a1507b037ec2c5704c495bb53f3275a60ea35f02928117cb9dfe4718a78f77077571cd75bbe70c2b8f993251350db832834c509d1af9a20d00cedb5a197
-
Filesize
5KB
MD5110bdf91b758328b3f33b4ab7d9fd480
SHA129d9ea9f08248307ef20c63cd1f02e8a5256d90b
SHA2569cd15a69297174a062f839ee86f2f583f09952475891683a042f56d04bd581b3
SHA51253efa1f722045a4f446e38bd780af1e5212de6052677596a7628eac2aa4a562c9752ae9859ee92530f5b3ac9ab2717777edbabdcb09f3f9ede2ba6063fe4bec7
-
Filesize
648KB
MD5ee07ce6e1da01ee9aa4a9cf523878dd7
SHA15d964e5919146fd2cd410909c03f3aab456cf062
SHA2564ab1e4414b3659a21a5a39b0edd80e967e73140a809f6a8407e46df963ed8f7b
SHA512487eade2e555e270536c1eeaf82ade3436cb8baef5476959a7de0b74df1082ce1b3917a66bc71965e1d4ba95e043706a543b29cfa485d65edc3102a98174e6b3
-
Filesize
105B
MD527c90d4d9b049f4cd00f32ed1d2e5baf
SHA1338a3ea8f1e929d8916ece9b6e91e697eb562550
SHA256172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb
SHA512d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae
-
Filesize
4KB
MD570c6ae41897fd3fbc90821be9f6dcafd
SHA1212294333e175cd4e647bd1738cf1e48de41fae2
SHA2566e8e43f1ef95d0dce19434dbeb9576fdbafcfcd8ff2a1d0ada36516b1c11d634
SHA5128822bc940cf1b64e2ec6b318a7f9702c056fcd45da025091609d9e1c455f6d00e2d9413433f827aad63c29212125d100027e43f4adcb235001b269ba0b6f54b3
-
Filesize
786KB
MD5524fa73d5c454f89e48aba0ed68be562
SHA1815bcb95515864b856b46dd01ece6d2f48b29820
SHA2563364971593c161edba782e1c71d2f3d80de02b8e35fe78892ed9b4149925a2a4
SHA512ebef95ebe606afcdd6470ab23c96f627e36a2dd97c14e4d2fa184a140d591d421fa5ef35eaad30a1ca45c0a66e73d1e3534f1cc6a4bc5b77ba11b47733d3da30
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
665KB
MD59e30ab5e3f6b43f69f928e6b4fcfd604
SHA1b110f04114c52f2439715cbad3769250dbcdb1b3
SHA256affbe7f0320f9602d8c51468ecb7bc7960df4f62ab1a36c05ac2fe2816d175ba
SHA5128d751d8c8023bbd54ea2ea0969ad9f379d8bf1066980fdd58007e778bdf654e4e13264ac8917be91ac8583ea9ae5536ca600530f413cbd887c234ec60be5a45d
-
Filesize
2.1MB
MD5302db9bd1fda6be5543a34b8468d8aca
SHA1c2fe4b63e9db6a38f0d3220f3ec985c3b556ff10
SHA2565e6dbba07c8c03efe5b6013a672039692c21655cc1dd2f37ca35842b86a1b2b9
SHA51294209808a7e48e2f614e34cc1fa418750a0c23b90e8dd2043d32db56f8c0e4d45415c0e9969edfdeeb9a9a1119de41f8ca568318cfc30d6038e780925fde34be