Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2025, 02:05

General

  • Target

    JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe

  • Size

    2.9MB

  • MD5

    bc1e2fa00e96107a61c5f02ca45f29ed

  • SHA1

    9cc3d09ead713082ac2d8d55675850b07409f104

  • SHA256

    1a7f9ba3014865a13a045efb45cc187f1b5b0bc3aa62325dbcc0c65dd31a0c8e

  • SHA512

    6ed04fedbf14e3f3e098425866a3ba16c60806be4739b485367f59df5efeeab06738d099c6114863a3417c9d8fa64ba110016f0cec58892c19a344f1fe607f2a

  • SSDEEP

    49152:E64MTrF+YbJvVU35UKlidG3cptoPRyYtMmgVbIpjJAJKa3j9IZRnmOQpyt83Bin2:E61cYxg5iPpiRnrGbIpu8g9gEpytKBww

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc1e2fa00e96107a61c5f02ca45f29ed.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5208
    • C:\Windows\SysWOW64\RTDJHY\MQY.exe
      "C:\Windows\system32\RTDJHY\MQY.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5188
    • C:\Users\Admin\AppData\Local\Temp\vcredist_x86.exe
      "C:\Users\Admin\AppData\Local\Temp\vcredist_x86.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3704
      • \??\c:\f8245e87273b5d65ce\install.exe
        c:\f8245e87273b5d65ce\.\install.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4392
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\RTDJHY\MQY.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\SysWOW64\RTDJHY\MQY.exe
      C:\Windows\SysWOW64\RTDJHY\MQY.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:5224
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4748

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vcredist_x86.exe

    Filesize

    1.7MB

    MD5

    b936f0f378b9a35489353e878154e899

    SHA1

    56719288ab6514c07ac2088119d8a87056eeb94a

    SHA256

    c6a7e484f4d84883bc1205bccea3114c0521025712922298ede9b2a1cd632357

    SHA512

    acdf7b464a258b3ae3015c808d0e08a697ba3209662faa9b18c1aee882bf236dc725f6c3425cb6f9e10d8ab5cbb82ac118ff947a4b9ec6f91c2e150b0beef70f

  • C:\Windows\SysWOW64\RTDJHY\AKV.exe

    Filesize

    456KB

    MD5

    51507d91d43683b9c4b8fafeb4d888f8

    SHA1

    ead2f68338da7af4720378cd46133589fc9405ba

    SHA256

    71b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b

    SHA512

    a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c

  • C:\Windows\SysWOW64\RTDJHY\MQY.001

    Filesize

    61KB

    MD5

    383d5f5d4240d590e7dec3f7312a4ac7

    SHA1

    f6bcade8d37afb80cf52a89b3e84683f4643fbce

    SHA256

    7e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422

    SHA512

    e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a

  • C:\Windows\SysWOW64\RTDJHY\MQY.002

    Filesize

    43KB

    MD5

    93df156c4bd9d7341f4c4a4847616a69

    SHA1

    c7663b32c3c8e247bc16b51aff87b45484652dc1

    SHA256

    e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e

    SHA512

    ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35

  • C:\Windows\SysWOW64\RTDJHY\MQY.004

    Filesize

    1KB

    MD5

    2e71fb25ae8a7d0c0d47b1ff0af32bd3

    SHA1

    8f1987e50e712bfbdf0f21049828931b8e4cde2a

    SHA256

    cf074da077eade791142b3876696ee2b472a91e885b4095cfd63665330f54e43

    SHA512

    74221831c352d08018fb375c41afac9bfdcea06c463adf82bedea8afe37b8dbbf7e8082cc2bda0edb566bdaa152ea5b74363d7d87af03ee3c37aafae4c66cc02

  • C:\Windows\SysWOW64\RTDJHY\MQY.exe

    Filesize

    1.7MB

    MD5

    3cd29c0df98a7aeb69a9692843ca3edb

    SHA1

    7c86aea093f1979d18901bd1b89a2b02a60ac3e2

    SHA256

    5a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32

    SHA512

    e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9

  • C:\f8245e87273b5d65ce\eula.1031.txt

    Filesize

    17KB

    MD5

    9147a93f43d8e58218ebcb15fda888c9

    SHA1

    8277c722ba478be8606d8429de3772b5de4e5f09

    SHA256

    a75019ac38e0d3570633fa282f3d95d20763657f4a2fe851fae52a3185d1eded

    SHA512

    cc9176027621a590a1d4f6e17942012023e3fabc3316bc62c4b17cd61ce76bf5cf270bd32da95dba7ddf3163e84114be1103a6f810ca1a05d914712895f09705

  • \??\c:\f8245e87273b5d65ce\eula.1033.txt

    Filesize

    9KB

    MD5

    99c22d4a31f4ead4351b71d6f4e5f6a1

    SHA1

    73207ebe59f6e1073c0d76c8835a312c367b6104

    SHA256

    93a3c629fecfd10c1cf614714efd69b10e89cfcaf94c2609d688b27754e4ab41

    SHA512

    47b7ec5fed06d6c789935e9e95ea245c7c498b859e2c0165a437a7bf0006e447c4df4beeb97484c56446f1dae547a01387bea4e884970380f37432825eb16e94

  • \??\c:\f8245e87273b5d65ce\globdata.ini

    Filesize

    1KB

    MD5

    0a6b586fabd072bd7382b5e24194eac7

    SHA1

    60e3c7215c1a40fbfb3016d52c2de44592f8ca95

    SHA256

    7912e3fcf2698cf4f8625e563cd8215c6668739cae18bd6f27af2d25bec5c951

    SHA512

    b96b0448e9f0e94a7867b6bb103979e9ef2c0e074bcb85988d450d63de6edcf21dc83bb154aafb7de524af3c3734f0bb1ba649db0408612479322e1aa85be9f4

  • \??\c:\f8245e87273b5d65ce\install.exe

    Filesize

    549KB

    MD5

    520a6d1cbcc9cf642c625fe814c93c58

    SHA1

    fb517abb38e9ccc67de411d4f18a9446c11c0923

    SHA256

    08966ce743aa1cbed0874933e104ef7b913188ecd8f0c679f7d8378516c51da2

    SHA512

    b92a32b27d6e6187c30d8018d7e0a35bde98dc524eabcd7709420b499778159e2872db04a3f2dfacf016d0e6d97b8175920e83fa28804609786828e52f058ff0

  • \??\c:\f8245e87273b5d65ce\install.ini

    Filesize

    843B

    MD5

    0da9ab4977f3e7ba8c65734df42fdab6

    SHA1

    b4ed6eea276f1a7988112f3bde0bd89906237c3f

    SHA256

    672621b056188f8d3fa5ab8cd3df4f95530c962af9bb11cf7c9bd1127b3c3605

    SHA512

    1ef58271cdedbdc53615631cc823483f874c89c2d62e0678de9d469a82bd676eb8abd34656caa5128b7edb0eb24dbf0992e5e571a97f7782c933b2be88af3144

  • \??\c:\f8245e87273b5d65ce\install.res.1033.dll

    Filesize

    89KB

    MD5

    9edeb8b1c5c0a4cd3a3016b85108127d

    SHA1

    9ec25485a7ff52d1211a28cca095950901669b34

    SHA256

    9bf7026a47daab7bb2948fd23e8cf42c06dd2e19ef8cdea0af7367453674a8f9

    SHA512

    aa2f6dde0aa6d804bcadc169b6d48aad6b485b8e669f1b0c3624848b27bcd37bd3dd9073bddc6bde5c0dd3bc565fd851e161edb0efe9fcaa4636cdcaaec966db

  • \??\c:\f8245e87273b5d65ce\vc_red.msi

    Filesize

    227KB

    MD5

    e0951d3cb1038eb2d2b2b2f336e1ab32

    SHA1

    500f832b1fcd869e390457ff3dc005ba5b8cca96

    SHA256

    507ac60e145057764f13cf1ad5366a7e15ddc0da5cc22216f69e3482697d5e88

    SHA512

    34b9c5ed9dd8f384ecf7589e824c3acc824f5f70a36517d35f6d79b0296fbccb699c3ec1e86e749d34643934bf2e20a9c384a5586d368af9887b7c2cede9bfb8

  • \??\c:\f8245e87273b5d65ce\vcredist.bmp

    Filesize

    5KB

    MD5

    06fba95313f26e300917c6cea4480890

    SHA1

    31beee44776f114078fc403e405eaa5936c4bc3b

    SHA256

    594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1

    SHA512

    7dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd

  • memory/5188-18-0x00000000006D0000-0x00000000006D1000-memory.dmp

    Filesize

    4KB

  • memory/5188-87-0x00000000006D0000-0x00000000006D1000-memory.dmp

    Filesize

    4KB