Analysis
-
max time kernel
120s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 07:12
Static task
static1
Behavioral task
behavioral1
Sample
NeoMc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NeoMc.exe
Resource
win10v2004-20241007-en
General
-
Target
NeoMc.exe
-
Size
1.1MB
-
MD5
4f255e042e257c230a643e67bef86d79
-
SHA1
d62aace2c8ac45f5485a3f3daf8fbaab2193dd8b
-
SHA256
e816fe735894aed6786fff66c1794364c25f518808d8968f3aa38856904886ff
-
SHA512
8d0dfb77548207ee876b55d9366862b146f54477bc0b6e8981cf627dd41069238bf39d5eb9375d929d0a3a3cabbf97e8086244c645f55b85f96e81e24f433f93
-
SSDEEP
24576:VbPTHFFG9exqCdx4bc7dam0vQdCrgrNi9NsxQ8F+xVpd:V7Ta9c9EIxBCWusx5F+x
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023ca0-8.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation NeoMc.exe -
Executes dropped EXE 2 IoCs
pid Process 4532 REO.exe 4224 NeoMC (second).exe -
Loads dropped DLL 2 IoCs
pid Process 4532 REO.exe 2820 NeoMc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\REO Start = "C:\\Windows\\SysWOW64\\HISQCS\\REO.exe" REO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\HISQCS\REO.exe NeoMc.exe File opened for modification C:\Windows\SysWOW64\HISQCS\ REO.exe File created C:\Windows\SysWOW64\HISQCS\REO.004 NeoMc.exe File created C:\Windows\SysWOW64\HISQCS\REO.001 NeoMc.exe File created C:\Windows\SysWOW64\HISQCS\REO.002 NeoMc.exe File created C:\Windows\SysWOW64\HISQCS\AKV.exe NeoMc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4224 NeoMC (second).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NeoMc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NeoMC (second).exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4532 REO.exe Token: SeIncBasePriorityPrivilege 4532 REO.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4532 REO.exe 4532 REO.exe 4532 REO.exe 4532 REO.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4532 2820 NeoMc.exe 82 PID 2820 wrote to memory of 4532 2820 NeoMc.exe 82 PID 2820 wrote to memory of 4532 2820 NeoMc.exe 82 PID 2820 wrote to memory of 4224 2820 NeoMc.exe 83 PID 2820 wrote to memory of 4224 2820 NeoMc.exe 83 PID 2820 wrote to memory of 4224 2820 NeoMc.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\NeoMc.exe"C:\Users\Admin\AppData\Local\Temp\NeoMc.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\HISQCS\REO.exe"C:\Windows\system32\HISQCS\REO.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\NeoMC (second).exe"C:\Users\Admin\AppData\Local\Temp\NeoMC (second).exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD518efdb37e71d23292eec9932df472512
SHA14be8a740f6c7eee22fb7a313f044466e9fe33d18
SHA25659695317a1359b4d366e2cc3b9741e54f1efc4a76b5472b03e46259cdff4bb1a
SHA512bcddeda7e87c073cea1d0d855f18693a197e49bd98fcaeaf5dac2d5b2b76590f2d6c8fc2c41405f9139f38e03dec61441198f871fbac40ed52489004b79bf8f9
-
Filesize
448KB
MD5c49125a39e0ae69b1cc77040ba8a9441
SHA192941e9559d9b1a0a944595377b6c5d44b53a6a4
SHA256f7e3d70532b7a0b04bde2fc3a9439b8a95ba7b89eff5f214ef53041a58c97524
SHA512f61f42e500ebdd0559c420f05849265964e58aba7bb2be1095d41dddc1393ccf2191de0ed61d5fefd3957c4890c61fced1497481b76f158a12f7d95e626224c6
-
Filesize
61KB
MD529136121b1c0307a02a8826477995613
SHA14dffe908036a21be56a9caa739ec1bf1cf9bd0ca
SHA256f9dd403e696d2128cafe9a4bab54a28161745934df6d3479a066083a61515402
SHA5122c7077ff82e948b9a9b6b16214dfdd11e222f07fb0a75aec59a9dafc29906907f24e0c625cefd5032321cc7883c00fd0abc7801f185983190f353b6dff2774c7
-
Filesize
43KB
MD5d977f26d7f7ffcb0f002813b55ff032d
SHA17e17b642dc1286908c18caba6fedb890de8fcc86
SHA2562ce6c66843f0d0f156ae523f25d2cf4c9886fcae7b4f69deefbde4bc5328bf29
SHA512e291f6acf5df88c52eb9232d55eb43fc08cbd423b7ae46148f710de909db49c04fc1d64e05b8e307ddd880134c525188109b94182ca99ea5934b66b9316e9e25
-
Filesize
726B
MD538af9146b8acaee4103cb00d0b56bcc6
SHA15cb1b54b72175625eb1163ce51ef0cef0717deb8
SHA2562cf50e952e1564d7760a6257a3efe1cb7fe63f7252de5f0f5026a270cb46a817
SHA512c98a4a8ac89ec66f92fa1c9887a8b4a542b2c16ebee240f0552034c73e0451c0183c403c5dc6e9027386ba8435c94bcef00d04a40d3493c691383b116591992a
-
Filesize
1.4MB
MD527a49221ba75a90934342bbe70f6c954
SHA1751e322d6f7e46c132f0f97c56d60344248f1959
SHA256946611f5091452aa46310d3ba8a885e808617b8ae9c57a468f7fe3abda4b052d
SHA5129476f49d2e3c10f3e5cd91313e03405f944bc9887fd65e6c2236caab3a42e2c9a5392d7c34f6c5787a7dc8c3cfd43a3a90a6e052176aa60a43da0327d7ff78d6