Analysis
-
max time kernel
0s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
Sro Pet Filter .exe
Resource
win7-20231129-en
General
-
Target
Sro Pet Filter .exe
-
Size
1.1MB
-
MD5
812a0b8c11d100bdf10cf06d7b2e7842
-
SHA1
43404bb678a9b83112c019355a33833f1cc76abd
-
SHA256
c0a740688c19986853e92544d1b76e8e98f0c53da8e3aa37ccb89e559cae3bb4
-
SHA512
e7c068e46d23487f97b1dbfa597aebb9e01cb20dc800ea1cbeb4239800dc8d07efb91a8ea86b269fc28d4731b51d525d5f0ea6143aa20d8c22f22173aa28fd0c
-
SSDEEP
24576:CS/6JDU1ruPvqcGEAXK9PASGuEsavOX9y+1Nwc9sQQsmH/:CS841rAvKK+tuEs9tyUgsmH/
Malware Config
Signatures
-
Ardamax main executable 2 IoCs
resource yara_rule behavioral2/files/0x0006000000023215-12.dat family_ardamax behavioral2/files/0x0006000000023215-14.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Sro Pet Filter .exe -
Executes dropped EXE 1 IoCs
pid Process 1940 GLUW.exe -
Loads dropped DLL 1 IoCs
pid Process 5116 Sro Pet Filter .exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\GLUW.001 Sro Pet Filter .exe File created C:\Windows\SysWOW64\Sys32\GLUW.006 Sro Pet Filter .exe File created C:\Windows\SysWOW64\Sys32\GLUW.007 Sro Pet Filter .exe File created C:\Windows\SysWOW64\Sys32\GLUW.exe Sro Pet Filter .exe File created C:\Windows\SysWOW64\Sys32\AKV.exe Sro Pet Filter .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5116 wrote to memory of 1940 5116 Sro Pet Filter .exe 25 PID 5116 wrote to memory of 1940 5116 Sro Pet Filter .exe 25 PID 5116 wrote to memory of 1940 5116 Sro Pet Filter .exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sro Pet Filter .exe"C:\Users\Admin\AppData\Local\Temp\Sro Pet Filter .exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\SRO Pet Filter.exe"C:\Users\Admin\AppData\Local\Temp\SRO Pet Filter.exe"2⤵PID:2124
-
-
C:\Windows\SysWOW64\Sys32\GLUW.exe"C:\Windows\system32\Sys32\GLUW.exe"2⤵
- Executes dropped EXE
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD533303ca8abef9221cb410b8a232e9fe4
SHA10cdfc25dbf0e9ad7d4585cd9037dc2e6604be00c
SHA2565110301dee966f0f26307ab1b430279d1e4999c2c4a0ea924ff32f1a9ded869a
SHA512da29821045773ba776def985966b62e09e69bb5bf1786b16c2fff6feb68a03b9e22c5f7d081e3dd58d1785cd7ac64736497c043b7cf6c7149c3a54f8ef111800
-
Filesize
92KB
MD5895e231f27a932b675a02d4dbf7bd01e
SHA17bd7536add95a80cc65e74bba4d355bbbdd3f9f2
SHA256c54f65c2f1d0199003b8e9224e242ec691eb31d145bae64689218d863560274d
SHA512d8aa7b11038e0da8fefb0bbe6475e1d4ece59240da686e509eefdee0e63204117d679f56ad7ed68c4892d034b4720fe1a0ed637e4dabf90bbf5be5a9f6fbf1c5