Analysis
-
max time kernel
143s -
max time network
36s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
26-06-2020 06:05
Static task
static1
Behavioral task
behavioral1
Sample
Payment confirmation.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Payment confirmation.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Payment confirmation.exe
-
Size
4.0MB
-
MD5
89da7df2747d184978be6103c71f26ef
-
SHA1
27de1fddf5c9b9ace59c5a2791eaac3219fd0cc3
-
SHA256
e2e45cb35a6a9aaa1c827fb3bfcc102650bf3fa8df381e5d52cb8cd908119d91
-
SHA512
34240cd0ae2391c300e48db8d22b0416a3fd98f84f5e4e1707479877167b27134e9300f9fbaa267551cdb83fc7360cbdf9a5da731d7be06990fa579b637acb65
Score
10/10
Malware Config
Signatures
-
Ardamax Main Executable 2 IoCs
resource yara_rule behavioral1/files/0x00040000000131b5-0.dat family_ardamax behavioral1/files/0x00040000000131b5-2.dat family_ardamax -
Executes dropped EXE 3 IoCs
pid Process 892 NGT.exe 1336 Process not Found 1164 Process not Found -
Loads dropped DLL 7 IoCs
pid Process 1016 Payment confirmation.exe 892 NGT.exe 892 NGT.exe 1500 Process not Found 1500 Process not Found 1016 Payment confirmation.exe 1336 Process not Found -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NGT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NGT Start = "C:\\ProgramData\\LCRHSB\\NGT.exe" NGT.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral1/files/0x00040000000131b5-0.dat js behavioral1/files/0x00040000000131b5-2.dat js -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 892 NGT.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 892 NGT.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 892 NGT.exe 892 NGT.exe 892 NGT.exe 892 NGT.exe 892 NGT.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1016 wrote to memory of 892 1016 Payment confirmation.exe 24 PID 1016 wrote to memory of 892 1016 Payment confirmation.exe 24 PID 1016 wrote to memory of 892 1016 Payment confirmation.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Payment confirmation.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\ProgramData\LCRHSB\NGT.exe"C:\ProgramData\LCRHSB\NGT.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:892
-