Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
sucrose working/srose new.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sucrose working/srose new.exe
Resource
win10v2004-20241007-en
General
-
Target
sucrose working/srose new.exe
-
Size
1.9MB
-
MD5
5742ea4de78005e529e1fbdfa83a2356
-
SHA1
880ff6373d8ab9d60657487d354f25d631c11121
-
SHA256
035afa353417b64a928baa6de04eb1c39e5d7a88d3f2802df4c40e5b9b6f9da7
-
SHA512
45133a6f8271fa4d1f9a280d436c43fed4ebd3ad7cdf5e13c9de7ae9c7970c77e2aebee8548cc4bbac0d053cce300d3d212df184739fd17cac3671bb580b90b5
-
SSDEEP
24576:6ZlEY11pwr39JeAzrjaoYfpBDVwVu4P8JxaNaYDXR5pzvczdzgGCd:QlEOpwL3eNoIeu4P8naNaipgzdzpCd
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00050000000197e4-33.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2844 bypass.exe 2772 GUVJ.exe -
Loads dropped DLL 7 IoCs
pid Process 2684 srose new.exe 2684 srose new.exe 2844 bypass.exe 2844 bypass.exe 2844 bypass.exe 2772 GUVJ.exe 2772 GUVJ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\GUVJ Agent = "C:\\Windows\\SysWOW64\\28463\\GUVJ.exe" GUVJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\GUVJ.001 bypass.exe File created C:\Windows\SysWOW64\28463\GUVJ.006 bypass.exe File created C:\Windows\SysWOW64\28463\GUVJ.007 bypass.exe File created C:\Windows\SysWOW64\28463\GUVJ.exe bypass.exe File opened for modification C:\Windows\SysWOW64\28463 GUVJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bypass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GUVJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srose new.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2772 GUVJ.exe Token: SeIncBasePriorityPrivilege 2772 GUVJ.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 srose new.exe 2772 GUVJ.exe 2772 GUVJ.exe 2772 GUVJ.exe 2772 GUVJ.exe 2772 GUVJ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2844 2684 srose new.exe 30 PID 2684 wrote to memory of 2844 2684 srose new.exe 30 PID 2684 wrote to memory of 2844 2684 srose new.exe 30 PID 2684 wrote to memory of 2844 2684 srose new.exe 30 PID 2844 wrote to memory of 2772 2844 bypass.exe 31 PID 2844 wrote to memory of 2772 2844 bypass.exe 31 PID 2844 wrote to memory of 2772 2844 bypass.exe 31 PID 2844 wrote to memory of 2772 2844 bypass.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\sucrose working\srose new.exe"C:\Users\Admin\AppData\Local\Temp\sucrose working\srose new.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\sucrose working\bypass.exe"C:\Users\Admin\AppData\Local\Temp\sucrose working\bypass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\28463\GUVJ.exe"C:\Windows\system32\28463\GUVJ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD52a82e71e49f54359f2db69a929eee58f
SHA123aa9563678acc6736cc47ffce195d91e746fce6
SHA2569ea9f16d33637458a9e6fa3ec31a451f83cd9ca37f6d0042eb7b6dfe69121251
SHA512191c174f82776385c82b9956d5a297426573dfbf6e6a794eb6a045159e6608593bb7d0698260c1a83e5a21cbb153ce52b505e37073155c0c6163369587f9203c
-
Filesize
394B
MD5fe8fcd2416a427234e006822f9976fc8
SHA1811af16401f542e0e5915cc4c6fbbebc157371a8
SHA2561d0f0a904c590c6f8d393639a2d93f91d56d26acc2ea740d7a5d371c8695c786
SHA512a9cffb0781f0f10e223e061996874d351d2da44b8f510cd36282c62ebbbde239fced92b32c7477d88f3a911b37f377647ffe7375c5f0fa2c89534e47dc8eaf4a
-
Filesize
8KB
MD5aae8ccee5d5eed5748d13f474123efea
SHA16da78da4de3b99a55fad00be2ec53a3ad3bd06ae
SHA25610c464d1675774e0282171555d59fb8975ed6c0e6a781182490f48e66823a5b8
SHA512d370e1ffeeb81b3f07b83a9cf1e3b44635fde7aa6ac999bccafece8091dbf96f0a78257bb0e03b3689dc47fb4e96ec7deac7848a43ddef62afc9b8cc665ee8bd
-
Filesize
5KB
MD540685d22d05d92462a2cfc1bba9a81b7
SHA1f0e19012d0ed000148898b1e1264736bed438da8
SHA256cdca1e5bc4c5129caa8eeddf637c820b6241c8790ce1a341e38e8324ae95afa0
SHA51221961d2dd118b45bde4cf00b4570712791a22769d05afb5b6c54355b0aaee9b7f7de00b357845349ef957807452365134d51e11181d2d45f98ed0cc9402de90b
-
Filesize
473KB
MD5339ae4ce820cda75bbb363b2ed1c06fd
SHA162399c6102cc98ed66cbcd88a63ff870cf7b2100
SHA2561e4a463ac0d463cee1f52f9529474484157c85d671aea1ab5f4173df12de01b6
SHA5125da8b333a839c4b169c6f4c9a1929918f166a895af7818c8223df7ed22279aac3b6ef88f89ee083a4f475f82ec6078f8e9800a9afc9547712245d090636a284a
-
Filesize
4KB
MD527092ec75c1839f36bfe900a38acc484
SHA1fe14b750a0ed653246c5f358891f8c1241913bb2
SHA256e6e29699840ae26c452227f9a1c9fd0e3cda0c2413c4255df9fc066c47af0e07
SHA512815477e8681e38dd3110171adbaf06738eb9d63839671a959a296ec1a1fb17d788682dde5e6a1f0bffa3b4deda4577292ffa37ce10b95ad14276ffcd0795ac0b