Analysis

  • max time kernel
    161s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 19:22

General

  • Target

    9eabedb8fe58d7bb8339f5072ba094fad24aaea29288fc1afabbfa5e3a23931d.exe

  • Size

    2.0MB

  • MD5

    ce21a52a59cde1ba6428c990e0c28194

  • SHA1

    f1eace18614c903edce4da9aa6638deb3ed099aa

  • SHA256

    9eabedb8fe58d7bb8339f5072ba094fad24aaea29288fc1afabbfa5e3a23931d

  • SHA512

    4a79ab125593e36f925f2e39d2debd6dcabf57470d4762f931a61728525ca62790be32c32661d1d6132b18556913ba9ad1257ff8f6540a05f9b0707d81324148

  • SSDEEP

    49152:MjGbS6GlCxcEMkFVAwe/jBFA+RHGaQ/42Rv3Uege:+RUxPAxdrGaZAU

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9eabedb8fe58d7bb8339f5072ba094fad24aaea29288fc1afabbfa5e3a23931d.exe
    "C:\Users\Admin\AppData\Local\Temp\9eabedb8fe58d7bb8339f5072ba094fad24aaea29288fc1afabbfa5e3a23931d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\ProgramData\TJOWDU\UUL.exe
      "C:\ProgramData\TJOWDU\UUL.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\TJOWDU\UUL.00

    Filesize

    2KB

    MD5

    a26240a6ad8bbb49037091a148d4614d

    SHA1

    f196f78545323b64e894a08276c43c9b536b68bf

    SHA256

    fe93007b059f9cd9ed5cc4d4301104bfad7e24da9d0dca7dcec4266147208eea

    SHA512

    4c3ad3013f5242676fba8b1dfc2c7581c4f6e82564301edd62a38e0bd3d810644e3b3c91803b92eabfb67d1041aa988813a702e9e7be4c48c0e4880bb8cbc0b8

  • C:\ProgramData\TJOWDU\UUL.01

    Filesize

    81KB

    MD5

    462afb96a7f72c384bcf2298f6c4cca0

    SHA1

    e2d78929d5c6a0257c8bbdefc2fb24f2fac70abc

    SHA256

    76daefb52ce80815aca84c963c31928ad95c54da17184413efc3e4852e4e5c77

    SHA512

    2bd52b7a28acbe9c1224bccc16985e8a9c4f600c3188e2d5c55ad30bfd42c2ea55a7be583eec5e5d020e5340b8f7f2906927b73e29320a8198ed5f23f85ad386

  • C:\ProgramData\TJOWDU\UUL.exe

    Filesize

    2.4MB

    MD5

    4e01d49a3b6a486a413e3428ab22a683

    SHA1

    ed60767c071761d884ba868877842ec921c759ae

    SHA256

    d2837979687f0f25ccc091ff4dcc0fd5681313d8d48dd49da22b57aa7adbb6a8

    SHA512

    c5d99014054a3d5f6326c8e85b0b7717648fe256a6c0c6c9161bad5b86fe546a5006be53fad3bae0a66579d4959e8d3f70d2520663e12602bf9ea78921538884

  • \ProgramData\TJOWDU\UUL.01

    Filesize

    81KB

    MD5

    462afb96a7f72c384bcf2298f6c4cca0

    SHA1

    e2d78929d5c6a0257c8bbdefc2fb24f2fac70abc

    SHA256

    76daefb52ce80815aca84c963c31928ad95c54da17184413efc3e4852e4e5c77

    SHA512

    2bd52b7a28acbe9c1224bccc16985e8a9c4f600c3188e2d5c55ad30bfd42c2ea55a7be583eec5e5d020e5340b8f7f2906927b73e29320a8198ed5f23f85ad386

  • \ProgramData\TJOWDU\UUL.exe

    Filesize

    2.4MB

    MD5

    4e01d49a3b6a486a413e3428ab22a683

    SHA1

    ed60767c071761d884ba868877842ec921c759ae

    SHA256

    d2837979687f0f25ccc091ff4dcc0fd5681313d8d48dd49da22b57aa7adbb6a8

    SHA512

    c5d99014054a3d5f6326c8e85b0b7717648fe256a6c0c6c9161bad5b86fe546a5006be53fad3bae0a66579d4959e8d3f70d2520663e12602bf9ea78921538884

  • memory/1172-54-0x0000000075531000-0x0000000075533000-memory.dmp

    Filesize

    8KB

  • memory/1172-55-0x0000000000D80000-0x0000000000F8B000-memory.dmp

    Filesize

    2.0MB

  • memory/1172-60-0x0000000000D80000-0x0000000000F8B000-memory.dmp

    Filesize

    2.0MB

  • memory/1880-57-0x0000000000000000-mapping.dmp

  • memory/1880-64-0x0000000000710000-0x0000000000729000-memory.dmp

    Filesize

    100KB

  • memory/1880-65-0x0000000000710000-0x0000000000729000-memory.dmp

    Filesize

    100KB