Analysis
-
max time kernel
209s -
max time network
210s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 04:45
Static task
static1
Behavioral task
behavioral1
Sample
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
Resource
win10v2004-20241007-en
General
-
Target
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
-
Size
783KB
-
MD5
e33af9e602cbb7ac3634c2608150dd18
-
SHA1
8f6ec9bc137822bc1ddf439c35fedc3b847ce3fe
-
SHA256
8c870eec48bc4ea1aca1f0c63c8a82aaadaf837f197708a7f0321238da8b6b75
-
SHA512
2ae5003e64b525049535ebd5c42a9d1f6d76052cccaa623026758aabe5b1d1b5781ca91c727f3ecb9ac30b829b8ce56f11b177f220330c704915b19b37f8f418
-
SSDEEP
12288:0E9uQlDTt8c/wtocu3HhGSrIilDhlPnRq/iI7UOvqF8dtbcZl36VBqWPH:FuqD2cYWzBGZohlE/zUD8/bgl2qW/
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0006000000018744-16.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2328 DPBJ.exe -
Loads dropped DLL 6 IoCs
pid Process 3060 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 3060 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 2328 DPBJ.exe 2328 DPBJ.exe 1300 WINWORD.EXE 1300 WINWORD.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DPBJ Agent = "C:\\Windows\\SysWOW64\\28463\\DPBJ.exe" DPBJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_30.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_04.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_45.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_00.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.001 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_25.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_54.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_56.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_49_06.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_23.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_50.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_23.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_49_07.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_49_12.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_49.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_43.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_38.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_41.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_49.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_49_02.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_49_09.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_49_18.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_28.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_16.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_05.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_26.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_02.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_01.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_07.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_29.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_34.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_24.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_48.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_55.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_14.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_52.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_32.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_39.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_50.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_44.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_11.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_55.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_04.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_58.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_24.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_37.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_57.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_07.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_12.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_24.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_52.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_28.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_52.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.exe ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_45_59.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_31.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_36.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_06.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_43.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_48_18.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.006 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_22.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_51.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_21.jpg DPBJ.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPBJ.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\ProgID DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\ProgID\ = "Msxml2.FreeThreadedDOMDocument.3.0" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9} DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\FLAGS\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\HELPDIR\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\ProgID\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0 DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\TypeLib\ = "{385DE8C5-AF57-09D3-6695-7200B769F1E9}" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\Version DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\VersionIndependentProgID\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\InProcServer32\ = "%SystemRoot%\\SysWow64\\msxml3.dll" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108} DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\InProcServer32\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\0 DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\TypeLib\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\Version\ = "3.0" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\VersionIndependentProgID DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\VersionIndependentProgID\ = "Msxml2.FreeThreadedDOMDocument" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\ = "Ahitokfaz Kisim Eropeqi class" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\0\win32\ = "%CommonProgramFiles%\\microsoft shared\\ink\\tiptsf.dll" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\HELPDIR DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\Version\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\InProcServer32 DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\0\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\0\win32\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\HELPDIR\ = "%CommonProgramFiles%\\microsoft shared\\ink\\" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C55C7AB8-E897-4EE7-889E-7368ECEE5108}\TypeLib DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\ = "Microsoft PenInputPanel 1.7" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\0\win32 DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\FLAGS DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{385DE8C5-AF57-09D3-6695-7200B769F1E9}\1.0\FLAGS\ = "0" DPBJ.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1300 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1052 chrome.exe 1052 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2328 DPBJ.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2328 DPBJ.exe Token: SeIncBasePriorityPrivilege 2328 DPBJ.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe Token: SeShutdownPrivilege 1052 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe 1052 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2328 DPBJ.exe 2328 DPBJ.exe 2328 DPBJ.exe 2328 DPBJ.exe 2328 DPBJ.exe 1300 WINWORD.EXE 1300 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2328 3060 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 30 PID 3060 wrote to memory of 2328 3060 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 30 PID 3060 wrote to memory of 2328 3060 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 30 PID 3060 wrote to memory of 2328 3060 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 30 PID 1300 wrote to memory of 1252 1300 WINWORD.EXE 36 PID 1300 wrote to memory of 1252 1300 WINWORD.EXE 36 PID 1300 wrote to memory of 1252 1300 WINWORD.EXE 36 PID 1300 wrote to memory of 1252 1300 WINWORD.EXE 36 PID 1052 wrote to memory of 2068 1052 chrome.exe 38 PID 1052 wrote to memory of 2068 1052 chrome.exe 38 PID 1052 wrote to memory of 2068 1052 chrome.exe 38 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2792 1052 chrome.exe 40 PID 1052 wrote to memory of 2252 1052 chrome.exe 41 PID 1052 wrote to memory of 2252 1052 chrome.exe 41 PID 1052 wrote to memory of 2252 1052 chrome.exe 41 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42 PID 1052 wrote to memory of 2012 1052 chrome.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\28463\DPBJ.exe"C:\Windows\system32\28463\DPBJ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2328
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\SendImport.docx"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f99758,0x7fef6f99768,0x7fef6f997782⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:22⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1540 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:82⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2340 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1176 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:22⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1332 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:12⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD5ffb8f55aae0edde17319377b124967ba
SHA1b1f7ada599d358e2af2344c446297dd05cee2c1d
SHA25685c6b17f8d3be83336078151ca86444779fb7eb4372251f9a4ec82b6a6557af3
SHA512e02922a308ade6a12ae377099d4fc44d34721b6ed1282f8e02cbfac25b4be4dd4f7a8c844659baf1c65e2dc90391c48c8252f86a6977af21c667e3b387fa2376
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD506241d09c0be34063737a92007b2424c
SHA167d86c8b300a2e1e49b4df2a41184aaea36eff25
SHA2563ee0a2a4db8b3b9316d9409233cf0bf3a78c65433bda4887c6a9bd85e9fe8459
SHA512260c794bf1372b6630fd4c5cdd0add0b6febda00360e9bc79426f529af45e6788446133647b4849b5821867a8611cfde53928defd477942f5225b1504fbb7342
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
357KB
MD52c92cb0850aa63def4c6396870137d84
SHA128f975d335a202a43bea1abed201d81a4f9382f5
SHA256671fc5b24c451f59fb2d16d62faadb6fe84343cc874547981044b706eee5127d
SHA512caf82008d5917644d31971fea4549b25f9e0f2424bc3401da7122ed322358484ae5e9a0ce873ddb594d588d44148908f49f4949f04124c344623586c2f847a88
-
Filesize
404B
MD5926256611d68b40db3993adc1571692a
SHA16fc17bb3388b79c3b24cc7ceb29dbc2feea2c123
SHA25667126e2fa3db01e3f01cfd0baca9b3d277edb41f392e57fe6c4ae119d8c74495
SHA51254ec3a80cc8ec19f82e5d0bdf0bdd76b74fd03c20c3f5c848c2b438d1845e3542d37cf6c2920615468b2f6b765b731916a92583d7663de3c8f95f679469b488f
-
Filesize
19KB
MD55b5c68f64ad97284b8fedb5b7ac07146
SHA11e5f7f3219541ce8c1db348c97469b6fbd1d1d5a
SHA256c21e932b2070d37a70df90c294567677dc696a829b317e74f089468fe4f66688
SHA512ba512e040de2d58380f47776285a2fc956131f0869c208539a04aea7d8dbf87ea2141e2bf97b069902d21249ae5edbe85f3e1ecf02d37e19e9c2530329e22edb
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
492B
MD57a0f1fa20fd40c047b07379da5290f2b
SHA1e0fb8305de6b661a747d849edb77d95959186fca
SHA256b0ad9e9d3d51e8434cc466bec16e2b94fc2d03bab03b48ccf57db86ae8e2c9b6
SHA512bb5b3138b863811a8b9dcba079ac8a2828dae73943a1cc1d107d27faca509fda9f03409db7c23d5d70b48d299146de14b656314a24b854f3ae4fdb6ef6770346
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
1.5MB
MD5f3c172423d1829d7ab93a475ef0199db
SHA11a88098244fac3a3b0a6f87a821b87301643ff1b
SHA256dba1b256b164dd0ad8f655fbe1f713479765fc7faebe909978d05f4f872ca862
SHA512db7641f978cfdd62df9a4340d9e64dfc8cb126651c0268babc53ffc2a192d6f5139b8ea0b28cdc47fc9f0bebab68a7f138de212ba3b1149724b26b7faf011f99
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a
-
Filesize
115KB
MD50ca4acb29c78582998d9d91919c4174a
SHA103f9465355e5c003ceac31fcdf42d48cb96877dc
SHA256f11dfd0b15ca3c09bc26d67848b36468369b08abb370efc718f64e65785210c7
SHA51224fdd8a3a04bb41f5190f089951408d000f967a1bc1d62cf93a5a8773a2af78a3466640b6900788bd1e42e81afa926e6c4723e607e6e0ca390e7f7a35e9b5a04
-
Filesize
282KB
MD5f424d5e4c184dd93cbb71e932f6ff9fc
SHA12ef2d7277e5abd06799f6d715a2dd51421a62518
SHA2569a475727ee990352da81100dafc1022eb52ad6f3672071487cb493b3c1d68356
SHA512f8ef94fe31e539507854c574de34ac2638f8022add8209a25729e416c0907835284d9a1c6827e8d05b240113662fdb2f20d153a66cfe1d5e1f2d769096b3e34a
-
Filesize
60KB
MD5bcc74f0311dde6550cb132a45e2ac0a9
SHA1685dbb9d99f1d5f06e46b78f6e9e0cf6013fc73b
SHA25677f32b75dd4e8a064ce0bc6226081af20f4500891012a0c93ea2be66d88642d7
SHA512d015548eaae12401727945caa4fb5b9c99be105362eb15866d5de509fbb7d1c77ab6c48674e536977d44e7c9b3dfd7f7169ed768bc4f8594ebddaa3343724485
-
Filesize
72KB
MD53ed6d7125e1d99d3bcbea1b00b977015
SHA1d5d693656a75bb70f52ac98d237af593b6a00581
SHA2569e8a5cc6faab223b1909584c3265f6d386412518750c65f11243297facb6184d
SHA512b25f296c000d5ce4965adec4e3671a491b478f70e750f98a5d2effc6100eed82244eb869796f287492a5c7fdd9249952c730fc4934166cba3571d759e608bf24
-
Filesize
72KB
MD5314d7c2341118fa7cc4d9ab76f91de84
SHA104ee0a56d844d9fd2a9c4480f16f3fbae961f4a8
SHA25609d2d82704586b793d6bdbf500557aaf832e17d9874c890e80315a157c99e115
SHA512b2e86340afaafb45ef2379429ea31f5b67d14507ff9069b6e549e9917d64f9229b7466d4615f160d940c57bcc19557bd98edfe0a8e1cfede937c05a24cb297a8
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41