Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
c76ad6972f8faddae5fd17f3654cd94d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c76ad6972f8faddae5fd17f3654cd94d.exe
Resource
win10v2004-20240226-en
General
-
Target
c76ad6972f8faddae5fd17f3654cd94d.exe
-
Size
603KB
-
MD5
c76ad6972f8faddae5fd17f3654cd94d
-
SHA1
299f564fe88d1b4a36aab11e864b862043eed825
-
SHA256
19930c08bb581aba6540bcfe0f561f5dd5a4a498be9930bd529f416d67e7bb46
-
SHA512
ce803b0f446a328271f82cde511e35880d9bb744d24cd961863c5c1477b84a992f26e7b8b33016457e095cca13a0662b0000655e38d014f7f62d64f7dae2f197
-
SSDEEP
12288:1z+E4EDqyjkl4EvzmSYlMT8ibZkBd9c0HwS/LX4wzmKBK:N+cjO4E7mSVT8il09LX3y7
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0006000000014ec4-51.dat family_ardamax -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2660 Install.exe 2468 Exporer32.exe 2848 system32KWLM.exe -
Loads dropped DLL 10 IoCs
pid Process 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 2660 Install.exe 2660 Install.exe 2660 Install.exe 2660 Install.exe 2660 Install.exe 2468 Exporer32.exe 2468 Exporer32.exe 2468 Exporer32.exe 2468 Exporer32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\APIMon = "C:\\Windows\\system32\\Install.exe" c76ad6972f8faddae5fd17f3654cd94d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32KWLM Agent = "C:\\Windows\\system32KWLM.exe" system32KWLM.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Install.exe c76ad6972f8faddae5fd17f3654cd94d.exe File opened for modification C:\Windows\SysWOW64\Install.exe Install.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\system32KWLM.exe Exporer32.exe File created C:\Windows\system32AKV.exe Exporer32.exe File created C:\Windows\system32KWLM.001 Exporer32.exe File created C:\Windows\system32KWLM.006 Exporer32.exe File created C:\Windows\system32KWLM.007 Exporer32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2848 system32KWLM.exe Token: SeIncBasePriorityPrivilege 2848 system32KWLM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 Install.exe 2848 system32KWLM.exe 2848 system32KWLM.exe 2848 system32KWLM.exe 2848 system32KWLM.exe 2848 system32KWLM.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2660 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 29 PID 2696 wrote to memory of 2660 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 29 PID 2696 wrote to memory of 2660 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 29 PID 2696 wrote to memory of 2660 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 29 PID 2696 wrote to memory of 2660 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 29 PID 2696 wrote to memory of 2660 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 29 PID 2696 wrote to memory of 2660 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 29 PID 2696 wrote to memory of 2912 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 30 PID 2696 wrote to memory of 2912 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 30 PID 2696 wrote to memory of 2912 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 30 PID 2696 wrote to memory of 2912 2696 c76ad6972f8faddae5fd17f3654cd94d.exe 30 PID 2660 wrote to memory of 2468 2660 Install.exe 32 PID 2660 wrote to memory of 2468 2660 Install.exe 32 PID 2660 wrote to memory of 2468 2660 Install.exe 32 PID 2660 wrote to memory of 2468 2660 Install.exe 32 PID 2660 wrote to memory of 2468 2660 Install.exe 32 PID 2660 wrote to memory of 2468 2660 Install.exe 32 PID 2660 wrote to memory of 2468 2660 Install.exe 32 PID 2468 wrote to memory of 2848 2468 Exporer32.exe 33 PID 2468 wrote to memory of 2848 2468 Exporer32.exe 33 PID 2468 wrote to memory of 2848 2468 Exporer32.exe 33 PID 2468 wrote to memory of 2848 2468 Exporer32.exe 33 PID 2468 wrote to memory of 2848 2468 Exporer32.exe 33 PID 2468 wrote to memory of 2848 2468 Exporer32.exe 33 PID 2468 wrote to memory of 2848 2468 Exporer32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c76ad6972f8faddae5fd17f3654cd94d.exe"C:\Users\Admin\AppData\Local\Temp\c76ad6972f8faddae5fd17f3654cd94d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Install.exe"C:\Windows\system32\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32KWLM.exe"C:\Windows\system32KWLM.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\x.bat" C:\Users\Admin\AppData\Local\Temp\c76ad6972f8faddae5fd17f3654cd94d.exe"2⤵
- Deletes itself
PID:2912
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD589b9169915100c2bacb6136fa1e5eacc
SHA1309c2c8027e01d57d5ad9f3c6b8fc6c7576ce51e
SHA256e023327c4aabcc9ed4476c0b0637dbdda9b8d38557692d3ff5e5746521930e32
SHA512ced168b2d7dcb389e9cab2a93b44be23c0c3b31253488662e5ac436a98ad8483319a0669d1f1c74919c5cecbd1ab537c986df9845c6fbaf1664b3325585932cb
-
Filesize
512B
MD556f23bfe181a36a6a0f38522cf831949
SHA1632ca32b4051f12d917ab4e0cce18bb0327007bc
SHA256d77093530e1f0a445360be451c641e597fc44aa7b33db10c03daadcaf3675de5
SHA51246631e477b526698499c87117acb66068811d1e33fa279e24bf4cb98d9627cada2df98c16a668879b0084c68fc1b82e6c1d449f08c66efff1b18df057350e1de
-
Filesize
428B
MD5735453d7729e14db23c7d220c212c607
SHA18183eebb0e14d65e2d54dfdb0b8865f5300385d7
SHA2563b9647308f03610d9c210e27e946f60b18592fb5be9097781bfaefd767a0b2de
SHA512a9df19c8251f1986bc5eac5fec50caf1a22ab51a00a23bafd99a1bf05487793f32f56439fdff84c4ee771184d1ed27a0b4d9d112a45d6be72b6183974ce4eebd
-
Filesize
7KB
MD532dd7b4bc8b6f290b0ece3cc1c011c96
SHA1b979683868b399c6a6204ebaed9fc9c784a0429a
SHA2566dcce9bbba5c2de47eea3abf7597a9c4fb2e4d358efc3752fa65c169cccfa2a1
SHA5129e0d720799fe816f7d09c8a722b762203b6f12a8625c1c93cd640219ecc35969bd641b4d9e6dc04ab6f95ceb73235a438eb7d48ee9402118db3618b5760551ea
-
Filesize
5KB
MD5e8155b68775ed29590e14df80fdc0e9f
SHA1ed449da02e648a524004c265f3c37496d2f07f1f
SHA256b39ba894b0a9a3201461ddd9ee9b297928e793dff221a47f019e75c11df631f3
SHA512b14e00c46cf9bed0aca0f85775f624ff064f2d2afe1fa68b61bee5729db73cf9a8eced669c52d7cbb9504ff1b369a9a16a0f36c71a70c13c0bd1eaf5e07ccc11
-
Filesize
471KB
MD53c06bbc025b61d2182ef5573f2852bda
SHA1ebc1464c00b13fb5b3f80a59c80b595020e1fe7c
SHA256e7f64e7215284cdeb8ef1eba28733f7aeae7f6977f82809d8de1e76a2e249085
SHA5129d839ada211b85fc1efb1fe7bb3ce66fcf0e8069221d958234649c2ac5dc0f1bd06f1a016f9c727077af36fb46cac5409be9c8a8201d17f689c6b473aa01acdc
-
Filesize
4KB
MD5d9e02f226fc338d14df200ba9a700625
SHA1414f134a16a309b31e418ed9e08c0c48aaf6e2bc
SHA2568165757efb79acceb9fd0bfae6b2c19b8f087cc0461abb17941d460dbdf2e260
SHA51213c73381602fe2593312d41ab4bc5cd5f922ac651f9e71e3fe3c58e7f0c5c73ecc9d79d61ec46f33a0a81cf73373421eeb510bd99650c0f53af30974ed61b8ca
-
Filesize
384KB
MD578ac4d046d6ade17d76e82328cee4cdc
SHA15c385eaa7e9e1a9d5ba39c717cf49c570070642e
SHA256d5526bcb8c54e77fe801073a3e3ca8e20fcc4e2d57163c5d6af2de75d04a25e6
SHA5127111151d2ae9be83a9d668444802222b953cfbfc0f0a6654cda6fe944cda981e9f5ab97f69ebd9b5b33c8537a7c2681ec3e8331a20cbb05d47bb1cc356e03206
-
Filesize
501KB
MD52688b0fd498a21589dc1ea7ed8028ff3
SHA1505f24b08b228e34f99ac63a8d26951fdc6fc991
SHA256b04cba86b2944f30d1611249328e8680bebf7d0f58b7bcae556d928baded1883
SHA512ec4950377b8540b11d1a1998611547d4e5e761a1c4250a8acae972d31b68c1aee31856a44509bf76511e938124f61e0b5e65a409b6cce831100f8da4559c6455
-
Filesize
521KB
MD5549365bc58ff9679e2f55cf92bcf28d9
SHA1af32bc5c73daccd154d56375c5585c6677563997
SHA2567e85ddb7260345d9e673d23c7b8e4f64938b87b92019c51555a5f884cde13e5c
SHA5120edd066ceb43e4d2f0e36301332068339309c1493ba1a5f8dc30743c39bab1025a72bb55918317d418d81159c271af59b283e247b6c472fb57f68f648777c301