Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
c8ecc83a7423aa7c2252369a45f890a1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8ecc83a7423aa7c2252369a45f890a1.exe
Resource
win10v2004-20240226-en
General
-
Target
c8ecc83a7423aa7c2252369a45f890a1.exe
-
Size
1.2MB
-
MD5
c8ecc83a7423aa7c2252369a45f890a1
-
SHA1
b591df5e9532b38cfd90f327da8847af98be5b6a
-
SHA256
ddf89f6e251a28472613d44bfebfc659f77f80e4506a02014ff0ddecb5b31192
-
SHA512
092cafd6c399d51b42d53bf3d8a896d6f9ccff8b8ea7811227e66bda6578d2d6028f8fa29dcad11aee13f6b35cd56f36551671aaa3bd40be4ffe9b91ee4bdb02
-
SSDEEP
24576:564MVTDhkLK6Eg5VCQKfq6TE/CT46X/HpInKQwVHGYrb1M6Srkreezad:564MTdluVCQMrT2k46vHIgwYri6SYHe
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002323b-9.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation c8ecc83a7423aa7c2252369a45f890a1.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 SYW.exe -
Loads dropped DLL 1 IoCs
pid Process 2004 SYW.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SYW Start = "C:\\Windows\\SysWOW64\\YIVRXF\\SYW.exe" SYW.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\YIVRXF\SYW.004 c8ecc83a7423aa7c2252369a45f890a1.exe File created C:\Windows\SysWOW64\YIVRXF\SYW.001 c8ecc83a7423aa7c2252369a45f890a1.exe File created C:\Windows\SysWOW64\YIVRXF\SYW.002 c8ecc83a7423aa7c2252369a45f890a1.exe File created C:\Windows\SysWOW64\YIVRXF\AKV.exe c8ecc83a7423aa7c2252369a45f890a1.exe File created C:\Windows\SysWOW64\YIVRXF\SYW.003 c8ecc83a7423aa7c2252369a45f890a1.exe File created C:\Windows\SysWOW64\YIVRXF\SYW.exe c8ecc83a7423aa7c2252369a45f890a1.exe File opened for modification C:\Windows\SysWOW64\YIVRXF\ SYW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2004 SYW.exe Token: SeIncBasePriorityPrivilege 2004 SYW.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2004 SYW.exe 2004 SYW.exe 2004 SYW.exe 2004 SYW.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 668 wrote to memory of 2004 668 c8ecc83a7423aa7c2252369a45f890a1.exe 89 PID 668 wrote to memory of 2004 668 c8ecc83a7423aa7c2252369a45f890a1.exe 89 PID 668 wrote to memory of 2004 668 c8ecc83a7423aa7c2252369a45f890a1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8ecc83a7423aa7c2252369a45f890a1.exe"C:\Users\Admin\AppData\Local\Temp\c8ecc83a7423aa7c2252369a45f890a1.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\YIVRXF\SYW.exe"C:\Windows\system32\YIVRXF\SYW.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD551507d91d43683b9c4b8fafeb4d888f8
SHA1ead2f68338da7af4720378cd46133589fc9405ba
SHA25671b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b
SHA512a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
65KB
MD5cefd6e9c8a039ab9a7833414dfb03f76
SHA12a026d0514e0119d0fd545a0d2f6deb198806b70
SHA2564d71cf9a598c7babd938c2635a755441da18502118cc3336ae25389510c7d01f
SHA512efcfd6654bf0c45158f43a8c8fd45cc8d40cac227926faa0cd368f1d8012df1bc271f3c7d5db539b1bf282087e533e5a809cf040ac087fcfab58bb320c5a5502
-
Filesize
1KB
MD52f8acb1770c20bbae1f2baae38f74247
SHA12e5be2dcd1ff9a3453e4b563f0ec5477e44802ba
SHA25618fd16e15cdeedc4c3670432f73a1b2f60985e35a5edae03a338be69e2599dce
SHA512b1f1a8bf25f0124f7316469bd269d639f355671e45b58b1a8b2be2a47e747ff8551e076be06e2b841f3ad68bd7dc02a9b6ffdce3dcb7e652029ec9064420c137
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9