Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 17:57
Static task
static1
Behavioral task
behavioral1
Sample
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
Resource
win10v2004-20241007-en
General
-
Target
ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
-
Size
783KB
-
MD5
e33af9e602cbb7ac3634c2608150dd18
-
SHA1
8f6ec9bc137822bc1ddf439c35fedc3b847ce3fe
-
SHA256
8c870eec48bc4ea1aca1f0c63c8a82aaadaf837f197708a7f0321238da8b6b75
-
SHA512
2ae5003e64b525049535ebd5c42a9d1f6d76052cccaa623026758aabe5b1d1b5781ca91c727f3ecb9ac30b829b8ce56f11b177f220330c704915b19b37f8f418
-
SSDEEP
12288:0E9uQlDTt8c/wtocu3HhGSrIilDhlPnRq/iI7UOvqF8dtbcZl36VBqWPH:FuqD2cYWzBGZohlE/zUD8/bgl2qW/
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0031000000023b88-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe -
Executes dropped EXE 1 IoCs
pid Process 1376 DPBJ.exe -
Loads dropped DLL 4 IoCs
pid Process 4068 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 1376 DPBJ.exe 1376 DPBJ.exe 1376 DPBJ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPBJ Agent = "C:\\Windows\\SysWOW64\\28463\\DPBJ.exe" DPBJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_42.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_53.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_16.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_28.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_29.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_50.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_18.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_17.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_19.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_04.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_14.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_24.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_27.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_36.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_21.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_26.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_20.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_21.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.exe ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_02.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_09.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\AKV.exe ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_43.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_05.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_44.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_25.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_32.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_45.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_11.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.001 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_38.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_42.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_05.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_28.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_36.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_02.jpg DPBJ.exe File opened for modification C:\Windows\SysWOW64\28463\DPBJ.009 DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.009.tmp DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_21.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_40.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_19.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_26.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_59.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_24.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_50.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_31.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_20.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_14.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_17.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_25.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_03.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_06.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_08.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_37.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_58.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_19.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_01.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\DPBJ.006 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_39.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_01_33.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_02_12.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_30.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_51.jpg DPBJ.exe File created C:\Windows\SysWOW64\28463\Nov_23_2024__18_00_55.jpg DPBJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPBJ.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0 DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\0\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\VersionIndependentProgID\ = "RAServer.RASrv" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\ = "Ovetar Object" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\0\win32\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\FLAGS DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\TypeLib\ = "{87DA800F-EAE4-43D2-A6F7-A074705FDE53}" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\ProgID\ = "RAServer.RASrv.1" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\LocalServer32\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\ProgID DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\ProgID\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\ = "CertEnc 1.0 Type Library" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\0\win32 DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\0\win32\ = "%systemroot%\\SysWow64\\certenc.dll" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\Version\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\LocalServer32\ = "C:\\Windows\\SysWOW64\\RAServer.exe" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\FLAGS\ = "0" DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\Version\ = "1.0" DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B} DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\0 DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\TypeLib DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\TypeLib\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\LocalServer32 DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\1.0\FLAGS\ DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\Version DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\VersionIndependentProgID DPBJ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53} DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{87DA800F-EAE4-43D2-A6F7-A074705FDE53}\ DPBJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35FE44B4-A4A3-46E3-F081-A4B85DBAE75B}\VersionIndependentProgID\ DPBJ.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2428 msedge.exe 2428 msedge.exe 4280 msedge.exe 4280 msedge.exe 744 identity_helper.exe 744 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1376 DPBJ.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1376 DPBJ.exe Token: SeIncBasePriorityPrivilege 1376 DPBJ.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1376 DPBJ.exe 1376 DPBJ.exe 1376 DPBJ.exe 1376 DPBJ.exe 1376 DPBJ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1376 4068 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 82 PID 4068 wrote to memory of 1376 4068 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 82 PID 4068 wrote to memory of 1376 4068 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 82 PID 4280 wrote to memory of 1032 4280 msedge.exe 95 PID 4280 wrote to memory of 1032 4280 msedge.exe 95 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 3420 4280 msedge.exe 96 PID 4280 wrote to memory of 2428 4280 msedge.exe 97 PID 4280 wrote to memory of 2428 4280 msedge.exe 97 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98 PID 4280 wrote to memory of 1092 4280 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\28463\DPBJ.exe"C:\Windows\system32\28463\DPBJ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffec11a46f8,0x7ffec11a4708,0x7ffec11a47182⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 /prefetch:82⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3617131094935035861,6524825405537420468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:4052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5a985e4887f744054c26bec829f986621
SHA11907ac9b634db8df3a5741318bd52889026148fa
SHA256434d2c25094343bf84271b68436c5983f9c57a4e9c75b7a7a0dd8aae85169ac0
SHA512126082ebb8189b1d2f106d1a1e0a5e3cddc6785eaa0f268ad225a8e6a956b90dce9782120c1e4db1c3d471ad72540dc5b832321941e0555929d076a36cccce5b
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
5KB
MD5bb2a951b66a88f762f66876b3af92b47
SHA1f652bfe9830a384d4183eb1ece69e90e9ed7c845
SHA2566356e5edcd04f0e8962a9209993513ab7c559565a0d5ab8e09d57c868e40e2fd
SHA51227e0a293f79abce7a0a535f3bec6b86496db5452be580484aba94718dae191a0900cfe7734e0cf8caa5e9af9d88c5f44e2f78584400fc8915465f9657c53efd6
-
Filesize
6KB
MD54e5c15b8f5bb4837c3eabe77df18e655
SHA1cea344d94461480daf89984cbf6209b7bd0db10a
SHA256bdad2b319a33177454107e8fe15d0ce41376835550fe80193e3e2f744782feaa
SHA512f543018202548ba9631159bae19c7230efa4fe3b4655eb85944b17c2acdc17627d561fddd1cb47064b803ffd086265f94754b11bd5c5e9c83c5e290903dbce0d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
492B
MD57a0f1fa20fd40c047b07379da5290f2b
SHA1e0fb8305de6b661a747d849edb77d95959186fca
SHA256b0ad9e9d3d51e8434cc466bec16e2b94fc2d03bab03b48ccf57db86ae8e2c9b6
SHA512bb5b3138b863811a8b9dcba079ac8a2828dae73943a1cc1d107d27faca509fda9f03409db7c23d5d70b48d299146de14b656314a24b854f3ae4fdb6ef6770346
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
1.4MB
MD5f418cac6297c2b5fc2f892b57452a9df
SHA169159e2d609d9d31d1b7636f96a5904778c7375a
SHA256009fa274444bc81cfd36403b9dcceade05f7efe20b63c25f058fd42ffaeaec26
SHA512bb39c360f7f942521c74011fee487d4b0f0c540cd832bdf40e2b7b55cbc05a0134c47432d0f50fbf654ef65b4dbda0b312e44ef2ebd84ef8971cf7a49b121425
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a
-
Filesize
103KB
MD5f648e0debc81ba657ac0c46034ea7c9a
SHA1e7999020edc31cb37372a858e762490414afde4d
SHA256426e3cb987a5421f1aac24e28781f2f83341d97d438435aca64e4ecfaa3209e3
SHA51206edefae00bc3b27f0b27d38e28f998f7889817e874a17b3a56270dd074dfa1fc073cb6ed21db4a74c93f8d78e9d966a3defe547667e9734fba350db15c0b096
-
Filesize
144KB
MD575c7b21cfc75e8e6ff4bad71bf7c9986
SHA1d9393f3a95b364dd175982a65c968c0a965f468f
SHA25661da5227b593dc15a057c9b5425a4ea5724388e2f25c141df884f91f82616369
SHA5120f339b46d39ecef4b8768ed8481a1075be3910b43e2fb79d0ba32073b0fe5768150e3d75e8bba6149e2364ce94edff7b04c20e807a62ad11d5827e775f0ca210
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2