Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe
-
Size
2.9MB
-
MD5
8636b780528130d1833d3dd93f6fa385
-
SHA1
a3b10fc211b81deaa6e91ad7e27141c87bfa876d
-
SHA256
323ac939098c774dc54414c346aab1009496647a5f007e501b9b7bd444e9ce5c
-
SHA512
8b66d9f74b1cc463e67805d5b4e5990f3a9c19cf6bcd4a1d4e9ac9453b4402efc2c7775a05aab51b42bc0c84d61d778b5f63d9b1298b7415f132f20bd9433983
-
SSDEEP
49152:t+O2cRgrD1vKPtriRpGQLrTvD1cpfFnQMp8kryu9znBMlDcUIk1RQY4lW4ZlYJTi:+cRShYr9kTvD+vnQI8kdzBMEk1RR4lWs
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000242c8-42.dat family_ardamax -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation Install24.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation QDQP.exe -
Executes dropped EXE 4 IoCs
pid Process 2052 setup_rep_3_0_2.exe 1532 Install24.exe 1812 setup_rep_3_0_2.tmp 4760 QDQP.exe -
Loads dropped DLL 8 IoCs
pid Process 1532 Install24.exe 4760 QDQP.exe 4760 QDQP.exe 4760 QDQP.exe 1812 setup_rep_3_0_2.tmp 1812 setup_rep_3_0_2.tmp 1812 setup_rep_3_0_2.tmp 5728 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QDQP Agent = "C:\\Windows\\SysWOW64\\28463\\QDQP.exe" QDQP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\QDQP.006 Install24.exe File created C:\Windows\SysWOW64\28463\QDQP.007 Install24.exe File created C:\Windows\SysWOW64\28463\QDQP.exe Install24.exe File created C:\Windows\SysWOW64\28463\key.bin Install24.exe File created C:\Windows\SysWOW64\28463\AKV.exe Install24.exe File opened for modification C:\Windows\SysWOW64\28463 QDQP.exe File created C:\Windows\SysWOW64\28463\QDQP.001 Install24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5728 4760 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_rep_3_0_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_rep_3_0_2.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QDQP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 35 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\FLAGS\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\FLAGS\ = "0" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\TypeLib QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\InprocServer32 QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\InprocServer32\ = "C:\\Program Files\\Microsoft Office\\root\\VFS\\ProgramFilesX86\\Microsoft Office\\Office16\\Interceptor.dll" QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\0\win64\ = "C:\\Windows\\SysWow64\\iasdatastore.dll" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\Programmable QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0 QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\0\win32 QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\iasdatastore.dll" QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\0\win64\ QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\FLAGS QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\VersionIndependentProgID\ = "SharePoint.OpenDocuments" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8} QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\ProgID\ = "SharePoint.OpenDocuments.5" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0} QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\HELPDIR\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\HELPDIR\ = "%SystemRoot%\\SysWow64\\" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\VersionIndependentProgID QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\VersionIndependentProgID\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\ = "Alihig.Fokekif.Perokehi object" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\0\win64 QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\ProgID\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\Programmable\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\TypeLib\ = "{253D8B86-0540-7A31-FB79-8BC336C81EE0}" QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\TypeLib\ QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\ProgID QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\ = "IAS DataStore 1.0 Type Library" QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\0 QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\0\ QDQP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\HELPDIR QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5247373-6586-4E4D-D0B4-5C9E648BB5A8}\InprocServer32\ QDQP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{253D8B86-0540-7A31-FB79-8BC336C81EE0}\1.0\0\win32\ QDQP.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 4760 QDQP.exe Token: SeIncBasePriorityPrivilege 4760 QDQP.exe Token: SeIncBasePriorityPrivilege 4760 QDQP.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4760 QDQP.exe 4760 QDQP.exe 4760 QDQP.exe 4760 QDQP.exe 4760 QDQP.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2052 3028 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 86 PID 3028 wrote to memory of 2052 3028 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 86 PID 3028 wrote to memory of 2052 3028 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 86 PID 3028 wrote to memory of 1532 3028 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 88 PID 3028 wrote to memory of 1532 3028 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 88 PID 3028 wrote to memory of 1532 3028 JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe 88 PID 2052 wrote to memory of 1812 2052 setup_rep_3_0_2.exe 89 PID 2052 wrote to memory of 1812 2052 setup_rep_3_0_2.exe 89 PID 2052 wrote to memory of 1812 2052 setup_rep_3_0_2.exe 89 PID 1532 wrote to memory of 4760 1532 Install24.exe 90 PID 1532 wrote to memory of 4760 1532 Install24.exe 90 PID 1532 wrote to memory of 4760 1532 Install24.exe 90 PID 4760 wrote to memory of 5732 4760 QDQP.exe 111 PID 4760 wrote to memory of 5732 4760 QDQP.exe 111 PID 4760 wrote to memory of 5732 4760 QDQP.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8636b780528130d1833d3dd93f6fa385.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\setup_rep_3_0_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_rep_3_0_2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\is-B504T.tmp\setup_rep_3_0_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-B504T.tmp\setup_rep_3_0_2.tmp" /SL5="$9028A,1961614,53248,C:\Users\Admin\AppData\Local\Temp\setup_rep_3_0_2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Install24.exe"C:\Users\Admin\AppData\Local\Temp\Install24.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\28463\QDQP.exe"C:\Windows\system32\28463\QDQP.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 10924⤵
- Loads dropped DLL
- Program crash
PID:5728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\QDQP.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:5732
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4760 -ip 47601⤵PID:6020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD570c6ae41897fd3fbc90821be9f6dcafd
SHA1212294333e175cd4e647bd1738cf1e48de41fae2
SHA2566e8e43f1ef95d0dce19434dbeb9576fdbafcfcd8ff2a1d0ada36516b1c11d634
SHA5128822bc940cf1b64e2ec6b318a7f9702c056fcd45da025091609d9e1c455f6d00e2d9413433f827aad63c29212125d100027e43f4adcb235001b269ba0b6f54b3
-
Filesize
786KB
MD5524fa73d5c454f89e48aba0ed68be562
SHA1815bcb95515864b856b46dd01ece6d2f48b29820
SHA2563364971593c161edba782e1c71d2f3d80de02b8e35fe78892ed9b4149925a2a4
SHA512ebef95ebe606afcdd6470ab23c96f627e36a2dd97c14e4d2fa184a140d591d421fa5ef35eaad30a1ca45c0a66e73d1e3534f1cc6a4bc5b77ba11b47733d3da30
-
Filesize
665KB
MD59e30ab5e3f6b43f69f928e6b4fcfd604
SHA1b110f04114c52f2439715cbad3769250dbcdb1b3
SHA256affbe7f0320f9602d8c51468ecb7bc7960df4f62ab1a36c05ac2fe2816d175ba
SHA5128d751d8c8023bbd54ea2ea0969ad9f379d8bf1066980fdd58007e778bdf654e4e13264ac8917be91ac8583ea9ae5536ca600530f413cbd887c234ec60be5a45d
-
Filesize
2.1MB
MD5302db9bd1fda6be5543a34b8468d8aca
SHA1c2fe4b63e9db6a38f0d3220f3ec985c3b556ff10
SHA2565e6dbba07c8c03efe5b6013a672039692c21655cc1dd2f37ca35842b86a1b2b9
SHA51294209808a7e48e2f614e34cc1fa418750a0c23b90e8dd2043d32db56f8c0e4d45415c0e9969edfdeeb9a9a1119de41f8ca568318cfc30d6038e780925fde34be
-
Filesize
457KB
MD519794a23edc7494063603d316165c04f
SHA16b5050be2ffa32cc3dd0d1e53fa2cfe355c59b4e
SHA25620aa8a967c2982acf1afce320284de9b4749fd3326b63c08fad8921720764b3e
SHA5128f782e06cd32844a336548083eeb50d818ba8acbbba042719da7505dd2d239dc133eedcf244c19901bba7424d2eef60a977b6d6795de9baa6d56ad13c3828774
-
Filesize
382B
MD5b75acc9bf422ae3ec204cb4fd117dfc1
SHA1aa595c904e39f12e513020fbcda39ac595ee2c39
SHA2560ae5b93d5ad51b5e4d6076344fecac14ba56938857eb3fa65600792edc9fbe2f
SHA512b99c20dcc37647f44b156d8579201e157dfb4213e9eb0732ad89e4ecd71b01a0687e82883f07e7fc82c5964937c44e4fdcaf3d26618109dc0811388fb0a23a4a
-
Filesize
8KB
MD5bc5fd352bfe50a09ffd84c95f697f9b4
SHA1847a869a2b789c2f5c9845340f133b8845976aaa
SHA2561c1bd72088d746302e15ed63f343bdbabae5ff39f1633e8f60ccd8e20dc0863f
SHA512b52e8a1507b037ec2c5704c495bb53f3275a60ea35f02928117cb9dfe4718a78f77077571cd75bbe70c2b8f993251350db832834c509d1af9a20d00cedb5a197
-
Filesize
5KB
MD5110bdf91b758328b3f33b4ab7d9fd480
SHA129d9ea9f08248307ef20c63cd1f02e8a5256d90b
SHA2569cd15a69297174a062f839ee86f2f583f09952475891683a042f56d04bd581b3
SHA51253efa1f722045a4f446e38bd780af1e5212de6052677596a7628eac2aa4a562c9752ae9859ee92530f5b3ac9ab2717777edbabdcb09f3f9ede2ba6063fe4bec7
-
Filesize
648KB
MD5ee07ce6e1da01ee9aa4a9cf523878dd7
SHA15d964e5919146fd2cd410909c03f3aab456cf062
SHA2564ab1e4414b3659a21a5a39b0edd80e967e73140a809f6a8407e46df963ed8f7b
SHA512487eade2e555e270536c1eeaf82ade3436cb8baef5476959a7de0b74df1082ce1b3917a66bc71965e1d4ba95e043706a543b29cfa485d65edc3102a98174e6b3
-
Filesize
105B
MD527c90d4d9b049f4cd00f32ed1d2e5baf
SHA1338a3ea8f1e929d8916ece9b6e91e697eb562550
SHA256172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb
SHA512d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae