Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2025, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe
Resource
win11-20250410-en
General
-
Target
JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe
-
Size
2.9MB
-
MD5
bc1e2fa00e96107a61c5f02ca45f29ed
-
SHA1
9cc3d09ead713082ac2d8d55675850b07409f104
-
SHA256
1a7f9ba3014865a13a045efb45cc187f1b5b0bc3aa62325dbcc0c65dd31a0c8e
-
SHA512
6ed04fedbf14e3f3e098425866a3ba16c60806be4739b485367f59df5efeeab06738d099c6114863a3417c9d8fa64ba110016f0cec58892c19a344f1fe607f2a
-
SSDEEP
49152:E64MTrF+YbJvVU35UKlidG3cptoPRyYtMmgVbIpjJAJKa3j9IZRnmOQpyt83Bin2:E61cYxg5iPpiRnrGbIpu8g9gEpytKBww
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000024278-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Control Panel\International\Geo\Nation JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe -
Executes dropped EXE 4 IoCs
pid Process 5188 MQY.exe 3704 vcredist_x86.exe 5224 MQY.exe 4392 install.exe -
Loads dropped DLL 5 IoCs
pid Process 5188 MQY.exe 3704 vcredist_x86.exe 5224 MQY.exe 4392 install.exe 4392 install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MQY Start = "C:\\Windows\\SysWOW64\\RTDJHY\\MQY.exe" MQY.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: install.exe File opened (read-only) \??\O: install.exe File opened (read-only) \??\P: install.exe File opened (read-only) \??\Q: install.exe File opened (read-only) \??\I: install.exe File opened (read-only) \??\K: install.exe File opened (read-only) \??\M: install.exe File opened (read-only) \??\U: install.exe File opened (read-only) \??\Z: install.exe File opened (read-only) \??\A: install.exe File opened (read-only) \??\H: install.exe File opened (read-only) \??\N: install.exe File opened (read-only) \??\R: install.exe File opened (read-only) \??\T: install.exe File opened (read-only) \??\W: install.exe File opened (read-only) \??\Y: install.exe File opened (read-only) \??\B: install.exe File opened (read-only) \??\E: install.exe File opened (read-only) \??\J: install.exe File opened (read-only) \??\L: install.exe File opened (read-only) \??\S: install.exe File opened (read-only) \??\V: install.exe File opened (read-only) \??\X: install.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\RTDJHY\MQY.004 JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe File created C:\Windows\SysWOW64\RTDJHY\MQY.001 JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe File created C:\Windows\SysWOW64\RTDJHY\MQY.002 JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe File created C:\Windows\SysWOW64\RTDJHY\AKV.exe JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe File created C:\Windows\SysWOW64\RTDJHY\MQY.exe JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe File opened for modification C:\Windows\SysWOW64\RTDJHY\ MQY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MQY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MQY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: 33 5188 MQY.exe Token: SeIncBasePriorityPrivilege 5188 MQY.exe Token: SeSecurityPrivilege 4748 msiexec.exe Token: SeCreateTokenPrivilege 4392 install.exe Token: SeAssignPrimaryTokenPrivilege 4392 install.exe Token: SeLockMemoryPrivilege 4392 install.exe Token: SeIncreaseQuotaPrivilege 4392 install.exe Token: SeMachineAccountPrivilege 4392 install.exe Token: SeTcbPrivilege 4392 install.exe Token: SeSecurityPrivilege 4392 install.exe Token: SeTakeOwnershipPrivilege 4392 install.exe Token: SeLoadDriverPrivilege 4392 install.exe Token: SeSystemProfilePrivilege 4392 install.exe Token: SeSystemtimePrivilege 4392 install.exe Token: SeProfSingleProcessPrivilege 4392 install.exe Token: SeIncBasePriorityPrivilege 4392 install.exe Token: SeCreatePagefilePrivilege 4392 install.exe Token: SeCreatePermanentPrivilege 4392 install.exe Token: SeBackupPrivilege 4392 install.exe Token: SeRestorePrivilege 4392 install.exe Token: SeShutdownPrivilege 4392 install.exe Token: SeDebugPrivilege 4392 install.exe Token: SeAuditPrivilege 4392 install.exe Token: SeSystemEnvironmentPrivilege 4392 install.exe Token: SeChangeNotifyPrivilege 4392 install.exe Token: SeRemoteShutdownPrivilege 4392 install.exe Token: SeUndockPrivilege 4392 install.exe Token: SeSyncAgentPrivilege 4392 install.exe Token: SeEnableDelegationPrivilege 4392 install.exe Token: SeManageVolumePrivilege 4392 install.exe Token: SeImpersonatePrivilege 4392 install.exe Token: SeCreateGlobalPrivilege 4392 install.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5188 MQY.exe 5188 MQY.exe 5188 MQY.exe 5188 MQY.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5208 wrote to memory of 5188 5208 JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe 89 PID 5208 wrote to memory of 5188 5208 JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe 89 PID 5208 wrote to memory of 5188 5208 JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe 89 PID 5208 wrote to memory of 3704 5208 JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe 91 PID 5208 wrote to memory of 3704 5208 JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe 91 PID 5208 wrote to memory of 3704 5208 JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe 91 PID 5112 wrote to memory of 5224 5112 cmd.exe 94 PID 5112 wrote to memory of 5224 5112 cmd.exe 94 PID 5112 wrote to memory of 5224 5112 cmd.exe 94 PID 3704 wrote to memory of 4392 3704 vcredist_x86.exe 95 PID 3704 wrote to memory of 4392 3704 vcredist_x86.exe 95 PID 3704 wrote to memory of 4392 3704 vcredist_x86.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5208 -
C:\Windows\SysWOW64\RTDJHY\MQY.exe"C:\Windows\system32\RTDJHY\MQY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5188
-
-
C:\Users\Admin\AppData\Local\Temp\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\vcredist_x86.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3704 -
\??\c:\f8245e87273b5d65ce\install.exec:\f8245e87273b5d65ce\.\install.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\RTDJHY\MQY.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\RTDJHY\MQY.exeC:\Windows\SysWOW64\RTDJHY\MQY.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5224
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4748
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5b936f0f378b9a35489353e878154e899
SHA156719288ab6514c07ac2088119d8a87056eeb94a
SHA256c6a7e484f4d84883bc1205bccea3114c0521025712922298ede9b2a1cd632357
SHA512acdf7b464a258b3ae3015c808d0e08a697ba3209662faa9b18c1aee882bf236dc725f6c3425cb6f9e10d8ab5cbb82ac118ff947a4b9ec6f91c2e150b0beef70f
-
Filesize
456KB
MD551507d91d43683b9c4b8fafeb4d888f8
SHA1ead2f68338da7af4720378cd46133589fc9405ba
SHA25671b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b
SHA512a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
1KB
MD52e71fb25ae8a7d0c0d47b1ff0af32bd3
SHA18f1987e50e712bfbdf0f21049828931b8e4cde2a
SHA256cf074da077eade791142b3876696ee2b472a91e885b4095cfd63665330f54e43
SHA51274221831c352d08018fb375c41afac9bfdcea06c463adf82bedea8afe37b8dbbf7e8082cc2bda0edb566bdaa152ea5b74363d7d87af03ee3c37aafae4c66cc02
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9
-
Filesize
17KB
MD59147a93f43d8e58218ebcb15fda888c9
SHA18277c722ba478be8606d8429de3772b5de4e5f09
SHA256a75019ac38e0d3570633fa282f3d95d20763657f4a2fe851fae52a3185d1eded
SHA512cc9176027621a590a1d4f6e17942012023e3fabc3316bc62c4b17cd61ce76bf5cf270bd32da95dba7ddf3163e84114be1103a6f810ca1a05d914712895f09705
-
Filesize
9KB
MD599c22d4a31f4ead4351b71d6f4e5f6a1
SHA173207ebe59f6e1073c0d76c8835a312c367b6104
SHA25693a3c629fecfd10c1cf614714efd69b10e89cfcaf94c2609d688b27754e4ab41
SHA51247b7ec5fed06d6c789935e9e95ea245c7c498b859e2c0165a437a7bf0006e447c4df4beeb97484c56446f1dae547a01387bea4e884970380f37432825eb16e94
-
Filesize
1KB
MD50a6b586fabd072bd7382b5e24194eac7
SHA160e3c7215c1a40fbfb3016d52c2de44592f8ca95
SHA2567912e3fcf2698cf4f8625e563cd8215c6668739cae18bd6f27af2d25bec5c951
SHA512b96b0448e9f0e94a7867b6bb103979e9ef2c0e074bcb85988d450d63de6edcf21dc83bb154aafb7de524af3c3734f0bb1ba649db0408612479322e1aa85be9f4
-
Filesize
549KB
MD5520a6d1cbcc9cf642c625fe814c93c58
SHA1fb517abb38e9ccc67de411d4f18a9446c11c0923
SHA25608966ce743aa1cbed0874933e104ef7b913188ecd8f0c679f7d8378516c51da2
SHA512b92a32b27d6e6187c30d8018d7e0a35bde98dc524eabcd7709420b499778159e2872db04a3f2dfacf016d0e6d97b8175920e83fa28804609786828e52f058ff0
-
Filesize
843B
MD50da9ab4977f3e7ba8c65734df42fdab6
SHA1b4ed6eea276f1a7988112f3bde0bd89906237c3f
SHA256672621b056188f8d3fa5ab8cd3df4f95530c962af9bb11cf7c9bd1127b3c3605
SHA5121ef58271cdedbdc53615631cc823483f874c89c2d62e0678de9d469a82bd676eb8abd34656caa5128b7edb0eb24dbf0992e5e571a97f7782c933b2be88af3144
-
Filesize
89KB
MD59edeb8b1c5c0a4cd3a3016b85108127d
SHA19ec25485a7ff52d1211a28cca095950901669b34
SHA2569bf7026a47daab7bb2948fd23e8cf42c06dd2e19ef8cdea0af7367453674a8f9
SHA512aa2f6dde0aa6d804bcadc169b6d48aad6b485b8e669f1b0c3624848b27bcd37bd3dd9073bddc6bde5c0dd3bc565fd851e161edb0efe9fcaa4636cdcaaec966db
-
Filesize
227KB
MD5e0951d3cb1038eb2d2b2b2f336e1ab32
SHA1500f832b1fcd869e390457ff3dc005ba5b8cca96
SHA256507ac60e145057764f13cf1ad5366a7e15ddc0da5cc22216f69e3482697d5e88
SHA51234b9c5ed9dd8f384ecf7589e824c3acc824f5f70a36517d35f6d79b0296fbccb699c3ec1e86e749d34643934bf2e20a9c384a5586d368af9887b7c2cede9bfb8
-
Filesize
5KB
MD506fba95313f26e300917c6cea4480890
SHA131beee44776f114078fc403e405eaa5936c4bc3b
SHA256594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1
SHA5127dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd