Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
17a2d979f483e651c3b70d201cff9d2a.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17a2d979f483e651c3b70d201cff9d2a.exe
Resource
win10v2004-20240611-en
General
-
Target
17a2d979f483e651c3b70d201cff9d2a.exe
-
Size
1.3MB
-
MD5
17a2d979f483e651c3b70d201cff9d2a
-
SHA1
9ad966e3ac62b3a14d6c8f5ae680f14abdff689d
-
SHA256
5a439800753dd638e7370a4ae6d00df9c1c6e89d65091bfa8dbab58fe744f3ec
-
SHA512
31346bbc3876ee35f3c13c431350a78b1ffdf1d1ece5ba222568a2ed6410a976c903d56db018c748ab88da073e1d38d00b7e45efd07b350db48c8e6c00c42eae
-
SSDEEP
24576:P+M5wUizYZbKsBIAXjFBk4GnznTA5e5bGMPAZAWDjssl:GxUiEZbKrtzTHbGMP6AWLl
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00080000000149ec-30.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2608 HXR.exe -
Loads dropped DLL 4 IoCs
pid Process 2800 17a2d979f483e651c3b70d201cff9d2a.exe 2608 HXR.exe 2528 DllHost.exe 2800 17a2d979f483e651c3b70d201cff9d2a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HXR Start = "C:\\Windows\\SysWOW64\\NPDUBP\\HXR.exe" HXR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\NPDUBP\ HXR.exe File created C:\Windows\SysWOW64\NPDUBP\HXR.008 HXR.exe File opened for modification C:\Windows\SysWOW64\NPDUBP\HXR.008 HXR.exe File created C:\Windows\SysWOW64\NPDUBP\HXR.004 17a2d979f483e651c3b70d201cff9d2a.exe File created C:\Windows\SysWOW64\NPDUBP\HXR.001 17a2d979f483e651c3b70d201cff9d2a.exe File created C:\Windows\SysWOW64\NPDUBP\HXR.002 17a2d979f483e651c3b70d201cff9d2a.exe File created C:\Windows\SysWOW64\NPDUBP\AKV.exe 17a2d979f483e651c3b70d201cff9d2a.exe File created C:\Windows\SysWOW64\NPDUBP\HXR.exe 17a2d979f483e651c3b70d201cff9d2a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1476 set thread context of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2608 HXR.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2608 HXR.exe Token: SeIncBasePriorityPrivilege 2608 HXR.exe Token: SeIncBasePriorityPrivilege 2608 HXR.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 DllHost.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1476 17a2d979f483e651c3b70d201cff9d2a.exe 2608 HXR.exe 2608 HXR.exe 2608 HXR.exe 2608 HXR.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 1476 wrote to memory of 2800 1476 17a2d979f483e651c3b70d201cff9d2a.exe 28 PID 2800 wrote to memory of 2608 2800 17a2d979f483e651c3b70d201cff9d2a.exe 29 PID 2800 wrote to memory of 2608 2800 17a2d979f483e651c3b70d201cff9d2a.exe 29 PID 2800 wrote to memory of 2608 2800 17a2d979f483e651c3b70d201cff9d2a.exe 29 PID 2800 wrote to memory of 2608 2800 17a2d979f483e651c3b70d201cff9d2a.exe 29 PID 2608 wrote to memory of 560 2608 HXR.exe 33 PID 2608 wrote to memory of 560 2608 HXR.exe 33 PID 2608 wrote to memory of 560 2608 HXR.exe 33 PID 2608 wrote to memory of 560 2608 HXR.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\17a2d979f483e651c3b70d201cff9d2a.exe"C:\Users\Admin\AppData\Local\Temp\17a2d979f483e651c3b70d201cff9d2a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\17a2d979f483e651c3b70d201cff9d2a.exeC:\Users\Admin\AppData\Local\Temp\17a2d979f483e651c3b70d201cff9d2a.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\NPDUBP\HXR.exe"C:\Windows\system32\NPDUBP\HXR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\NPDUBP\HXR.exe > nul4⤵PID:560
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5d86e574fb1b0d18ee49bd836c122e05d
SHA11cdffdf20d165b70404c5391e9b95a481d3f4e39
SHA256de7e5705beee6b553ea5242598257f9c035411ebe2099fc7909f36b5c8bed167
SHA512e11fc616ec93d7cb8ea0db8cd88e41bdd6e1dab340a620a6658fcb7528fedc466bc8f5b089367292bedf32c3d2160566f235d833d528d1d5fcf9fe270f62edc8
-
Filesize
489KB
MD50725c70d7b45945089905464a2710dc8
SHA1a47223eb378919afc8c2a6af6b031bca12eacaae
SHA2565340cf0385c1ccf9a5f01e9bbcb68474d5760c1c60bd87772fbd8a498208a3c5
SHA5123b95b3c582c2df9a59c2aaa5e9f04ea093dda8b53a7df4b966d46c6f61643e8beed3e3cca0e784301f5f14ea17e2520ecf10dca0ae805e5b31bd51ac94d10888
-
Filesize
61KB
MD5513c67ebf0379f75a6920540283a4579
SHA12fe191acb478d62026a8dbf63f65619d168ddee6
SHA2568f636876880c59251548fca626731e648553e0b81b02f4667c22cbfadfbd6e30
SHA5122330f5bbd8d7de91473430bc35a125fe13b261afa5b4ef9533d4d6ebcde6cfe27f705fccbdefa092eb9123eb33dcc1448deab72adab981726517afe458beb01d
-
Filesize
44KB
MD51db8aa9ffda07a5f5559cbf25087147b
SHA1eea77894bff8e24fb0861159927f67decb629184
SHA2568cf369255b48195b8ecec1c7bf2e76924641880aa7311e6cf504ca534bbfcd62
SHA512b9f80191dd8975c2e484eeec1bc7c6212d1b614061e69d96eda87b7a061a78a34de220f22607c3eb1c0fa37f152744a5c8f65a896e2884a9daf969db54a11704
-
Filesize
1KB
MD50059594411f8401779741ebb6cf25984
SHA136bcf7794cffd0a7403e59b4bff76786587a1033
SHA256b14208c50180b8709afcf8640b0e0458bcc17ebc43175ec35c40f3d95d98f909
SHA512dedf667cf06c3b3cd92ac21c68da3bcbbfdfc7fdf8bc08e147af1f6a7cfb40b5508666b1d6afbface05e5a833c8e58f41518473d4319658d8788c446a31591d0
-
Filesize
1.7MB
MD57dc8f94e34ad6f38e94f957043c39617
SHA1081a26dc478bd3de6f2889b9c8da8b2e79723d8b
SHA256618fb51d23c0ca116dbd24dc5e0240ebda862e405283d64871549321fde08202
SHA512539c239670369f34e7907d072bdf6b91becb927454db3212b0c307363289b1900edffa2f9fac22d3d14435fcee28b7bdeee1f039f027d74f84627c85774b9f56