Analysis

  • max time kernel
    121s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 21:07

General

  • Target

    Ardamax_Keylogger/install_akl.exe

  • Size

    1.5MB

  • MD5

    a3dc14d015725f199bccbecf8bd73501

  • SHA1

    41bab91889fe2455eed3626e3aa7a4e8c5cfa33b

  • SHA256

    90827393d6025ff1d85877ac5bc662b524bcff7a700fd55d4da606fbb349b944

  • SHA512

    5871b7490cf8a2db15c7b55766289d2df6081e4353e604e8dad9abac7f7eacff83344c7da25fd1e345f1e826f036f999b06279c286d97275d1c0c2b80ad8d805

  • SSDEEP

    24576:sX+kKRjb2XRA9jSrfGlDnYtbGVKGhFRVAP1ZUw6kOS5dG4GKuQ0:4pKRH2oSrfIDn4yVKGbRu9ZU5kOS5cFz

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ardamax_Keylogger\install_akl.exe
    "C:\Users\Admin\AppData\Local\Temp\Ardamax_Keylogger\install_akl.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ardamax.com/keylogger/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e0505b93742eb6c49fb9565f301d862

    SHA1

    8d928a5d6d7d87f328ecbcf932b8a27256438fd7

    SHA256

    a38db3ff191d5a1dc5913f1860d78242ebab6aec7f22219f1ba638b4c9899a09

    SHA512

    8f163342c579b26990c8df612d80d902f234b1a204acec2630047b1a534917c5d3ed959cd960bb866e675cce51461536310b3396a25318ef06af2034cd113631

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fdb4401fcba1fcf8edb563e8b55ce10

    SHA1

    1bac97453fbdb7f8c07c74092e52942853fafabc

    SHA256

    f7190a21cb8b3b63d60dc73b8a19ec5b69b0d19fe31366cd206ad9c37dcf9bbc

    SHA512

    e64d7be616985d4b5d3ff5eef30afd100db405356cd688eae01412a2a97352086bcb110e6f853a257bcf29b9d472d99072a7580d4b0a10c648f6b2aa5599c2ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c72204d4a67ed1255e5ae7cdbd88d350

    SHA1

    7da60ca1fd87e3c87108758fe5d9b330c14954d8

    SHA256

    e5e9143a29d6562ffe0b8c0d15c53b4044411b7afa46278481c5b31c95b0a60f

    SHA512

    a10a41453f4fc2ffae30be8adba485ec25fb09b0eb9df9af78df97639100adc7b363475f3c26309287e3b1a31bb6836fff4d8a00a18aed2af40c6d588a259dcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9021083464c57be912ec554fc570defe

    SHA1

    cebf26b4cacaa7b982669a0e9b77409630de035e

    SHA256

    68bc248a0c99d28d5d0b0765435283ab1b32fd6c77164f6798d36de8ba96c6b2

    SHA512

    f0a47d62ea8a6b045f81aad4c6144409260fa85d1927e2093143b31aa9e731dfa895da140641e9de9381cda1350360f4a19aac93927e30071405be970d4bb5b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b228797b9cb116463d9f5153e403bf9

    SHA1

    025335b8d6b21a62376fbc3478ab0f5e093b55f3

    SHA256

    f2516081687c2a1e1f7305230de264798790c44e711c2e2ddf4137b81df647f4

    SHA512

    480f83eb3bfbf72944cf7f475807384f5ebc6e061560c2ccd1baf3de22aa984129ba2e6d9e5859cc405fd616d67812c645dd8813b89e739f1b3e7ab10d2d0ccc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    021c2e5e72179443385fc28ae7bb87f9

    SHA1

    9493943b060dfa93e85d55287ac9c6eeb1bf8e61

    SHA256

    8c5e55e77655ae79c6b83c4071d50fc0d40bb2c3f6a8760968c9ecab5afacc95

    SHA512

    c2c07531b158373380dcb091a6bea7edb2cf11532bfd3786b542d5d542f65d9c868a66088f85bc3c3f48c266bf4ca25a0a5ef63caf9bd7ac3147e6ac9bac1ca5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    219e10860e93ca876ac7bbcd07f389f2

    SHA1

    ed15b320666d1219a876dc9410cd0ca1814af1db

    SHA256

    0e57c07a6cfda7b9f1731e5724c8491486ec2b495eefc1d4ca0053404330e502

    SHA512

    a1ba46f8de966fdb57acc8652416c784d0eaf197f3f9f4c5557ce06c6a8e589eeee982f363d8ebf4bd4347ed95f5a210eaa83d07ab04f1b08e4a91089e20c7f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1304361e27d3eaa3fb19c467918120b

    SHA1

    600b613bdfbc8b8f11e0eccdafe5c9cb83daafaa

    SHA256

    5db64e586cde31962fcce067f8e7d512664167f9e90a226663849edd93ef9188

    SHA512

    d980705da9208495bb6573e17d719559bd7d7ca1b1f22ebcd42bd6756e40ab4a3e966a7b71385272029af281be68fa869b0240f402577c1aa21a8baa140f09dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c564af30c7c489c42b9e9598ddd0131a

    SHA1

    96d198c1324f1ffc777f55a16d3fa18d4e62ec32

    SHA256

    835ac31b09d05322052ee67d4fcc62a346828bf9e45b94436a527c0e0c120950

    SHA512

    7ede96614f8181a0277f4ec7e4b05731a29a981a7880cb07512d5427267b72100cd3f558571a4b61fbf4747d13dc529e27e3bec82139754a17b47504a560f0db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a3ac8776a40e887e135bab2e6abf3f3

    SHA1

    04b5a896046ee31a6b54733b44b2a7853bd3152c

    SHA256

    fc7ff60847ea3c974e41a6751af7caa3d9e25410796ec55b113e38339af5f085

    SHA512

    26dbcfb334606c6e9e9b5340aaf9bd3bea5721a797fa2fcece94d4c0dc7a98830f24391e447615446d475a541ad54edcdd374800148b1f6a918dae3501517c4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c589f3950aed28203acc8b16ffc529dc

    SHA1

    533aeba53b7cb68f51e783c9803c3701eae1cbc9

    SHA256

    b69eef85745d4b1a26231894c9bddaa39f7631d1c7c1d5c06957412d858f8569

    SHA512

    ef80b9138f191fcb35f0487895681dcd5e6484cec41488f992caa2becf5d38e352f06f5f228ee30d9e7b6023164e9cacc0656b8863de7cacd3605f03b477ab93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27369b7d4e976bdc39488f486d057c93

    SHA1

    7a119164dc7ebb09027b4b9f31e439fa7a1b64b5

    SHA256

    2f21e53532c01cae91752f1b63cfc27c73a56c731b0a6a899acedae660d574cd

    SHA512

    2149328d2c743211223c78fb60abc44e2a3857d5632d323ee77eae98006fd3a72a3885d086068adc463c8f5d25883e95bc894c4aebfdfa017ac07aba024aa043

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84c7d71ebc79ffda08c103fcd5c128e2

    SHA1

    c8f053371dbb537e925b9c0626ed34d63bf7fa56

    SHA256

    89a2fc77a0d44aecd7bd3429b9d0e72f95cb76cfea5304460b366fe58003522f

    SHA512

    1d29341819aa1c32832f64cc421cdfe1f1a77af3b482b864dee0881065c37aa497f1c264c1c42a4eec2a69579fae53b4a57268cdae7279cfc15d2d9e5f36524f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a2b1e2f5952fe8fa1c77b813dba225c

    SHA1

    0b93ff30c43d54f8b45eb2e98bebb2eeedc576e2

    SHA256

    0acfb6124746ea48321dde0a73026eb388b4b711070f2d8510f9b6fd856c339b

    SHA512

    59707c6cdb6d79f0979226d1cd2b5d428121ae72e0f050c8a959427abd79f50c11d6f4d0d5b5274bd7baf9ac7d0ef4e42692287835de4c4fb5cda7f15f254989

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    116eff262319ac3fcf1e79d7a467262e

    SHA1

    157997a59b5f8e1bcb4f7202083d4e843781910f

    SHA256

    963dae81f1ba0f340d7d54de444703e6e88b3dacd321658444c8d69aad1c3141

    SHA512

    b21b715ec1532ec33edc5997bf1f7be3f542220e041db1e9a8c620d9aac35b2eb3d94ea58e0bb8e07d33fb62b1aa333efc166d319b51483891cb91a31d27d031

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afef79bcd67d8831c676ebcaddcc5159

    SHA1

    1f1a9a4ff6881ef01698c5964eb4ec6f22f8aa01

    SHA256

    a6ed0469f70d966a675752245412a2cc66cbcccdd22411c8d6c3285b0f976b74

    SHA512

    2df2d4d8cbc5025724a8999cd40c972b17d8134cdbf8c5ca1d29c5709f7512288cd2359e6b3362e0f3c92cbdf4eaa5aed24f1bef09ce46e40bb96aaa74582b0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75d36eb680b4faed1ef22d539ab264b2

    SHA1

    0b8cc7fef761211bd9a341452bd18d359a25cd69

    SHA256

    75f8d856620322ea1026661550f243c536c7cdcf08e18d027321c35ad5c6de64

    SHA512

    6b618379b70d513cdaf896bdce89e213a58b84ebb87a7c86a8158c8cc0760a4a924a2638cdb33473360de6533fdafb73979598e5e265d59ffdd1d5766a680df1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c09e7e1604ab84ba315fd1133fb680c

    SHA1

    08eba788857addda0313c5d35af717b6434efaa5

    SHA256

    4747114bc7a462be4ef35bb94b6481a7231ad2ff95680a110d22f17a2dce6e29

    SHA512

    0ba395729531b680136e2dfcebbd95e2ef711885806f60fd368445c60e227b36b3c8a8c13f6e061cb7165226ca9691c82d22d8ad571b541245243c2aae15156b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3419765e17a9b0368221b027a555c2ab

    SHA1

    89ba70647198832cb3eaddea53e39c8113278537

    SHA256

    e13dfd877c8db25240a852cb2976525c5a2186e520e0b073ea4478bd3cd01e21

    SHA512

    ee1f6126af9ff7589cc701d6b94f893a14a67b6e824782e6b2a68118fe5ee41a61bad0457f60ba06822d9e468cddf1187d0f504f3418a89cbd258c945b694a4c

  • C:\Users\Admin\AppData\Local\Temp\CabEAAE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEB6E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nst8354.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nst8354.tmp\UAC.dll

    Filesize

    13KB

    MD5

    431e5b960aa15af5d153bae6ba6b7e87

    SHA1

    e090c90be02e0bafe5f3d884c0525d8f87b3db40

    SHA256

    a6d956f28c32e8aa2ab2df13ef52637e23113fab41225031e7a3d47390a6cf13

    SHA512

    f1526c7e4d0fce8ab378e43e89aafb1d7e9d57ef5324501e804091e99331dd2544912181d6d4a07d30416fe17c892867c593aee623834935e11c7bb385c6a0a8