Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2025 10:23

General

  • Target

    8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe

  • Size

    479KB

  • MD5

    905370da155f401544bf14f95fb6fa90

  • SHA1

    b64c56ec92b44c34cbb802e7939c61d2812d7b85

  • SHA256

    8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18

  • SHA512

    32f66818a74f5c2df936aab9098b880a720d4995d64a05a5c4a3d2bec1d48a5697dcbe92c808c0714bf62fa37fc19f835c50deeeecb28e4b3878093e8d7f4b1a

  • SSDEEP

    12288:/1fzpgKtQ0/vLJpHb2r0qSlCCpl2WhuTqdX9lI:JzpguFrHyhSM6dhuqI

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe
    "C:\Users\Admin\AppData\Local\Temp\8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Windows\system32WWKO.exe
      "C:\Windows\system32WWKO.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system32WWKO.001

    Filesize

    458B

    MD5

    f57607418680b3433ae9b65892b9164f

    SHA1

    4d0a5455f96d1fa0a1dd1f64322a83d2f759cb34

    SHA256

    b9fa0c5a350416a19bdb7b9e2a5e9668631bcebee683ce527af6e2103399cadf

    SHA512

    eb2e6ff62e623fcc891a7b0e19efa5163b60a0e6f147f8a8282ce9cb19b936215fdba16faa5aae5874166c65db9aa593946a5a738f6a6673d7c34545229060f6

  • C:\Windows\system32WWKO.006

    Filesize

    7KB

    MD5

    840a1ae793d07aed4585781697178bc1

    SHA1

    5d42f9763e32c1dced9cdd14144926c43044d6ad

    SHA256

    af73b0a6c98eec78e121cb1fed4ee4b5df052833242179cdeec04c75b6df2cfc

    SHA512

    078ddc10ebccd4c108e52555ae7aeb644aadfc006dbc2aa1aad319b6e9bd35b779fee9e3d063c22f48a7e082e1a01e1f70ab11f8c26827750b13a1c8cb636689

  • C:\Windows\system32WWKO.007

    Filesize

    5KB

    MD5

    530d177fa3d66ca092ecbdb4eb02a0d9

    SHA1

    868a3c3fa51df0fe5ffbba3aeeca20aa23da0fc4

    SHA256

    037e9a3e82e1a8902d8220c82650e52f549d6acc490ff30481a497130b7208f2

    SHA512

    44d84513aaab0eb5f2c0c9be64cc78beb8caf0ddf6039fe726d39834d19d4c1084cec1611b565529920d4edf4d432dba6e67a01d94a845b7fd083dd284545002

  • C:\Windows\system32WWKO.exe

    Filesize

    471KB

    MD5

    040be8249f1b7b90730867c398e40568

    SHA1

    d6908d242bed9d7d04dcf98c7e46571121f0b7f1

    SHA256

    84ce204e2d8ef6cc519fbabf8356999de06af6250ca4a170ecfb776952d855ca

    SHA512

    3c63436c6412f127a2ca64891af185678cde71846c52331ae4dda03b1313392ba3655699305d6ce05723d50aec0e4d227616536592bb5a23449e1eaddba94516

  • \Users\Admin\AppData\Local\Temp\@9F5B.tmp

    Filesize

    4KB

    MD5

    08c0e7cb9f56d7a8f6acfd2268ea7142

    SHA1

    e885ffa0db9b4dd38e547135eb5446cc89fe6865

    SHA256

    fe9304a2f41e446e3672a26b338cde680d34fd07b0c5a6866ef108366ed92eb9

    SHA512

    6325410c99d703b3181c4eb4d9cbcdf1d8e08cc57a8ef7c8334e5be02b2499997829a3d6fd708dd83541efd1712330c5163daffe68a09aa2863cc76d5cbdccf9

  • memory/2840-18-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2840-21-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/2840-23-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2840-22-0x00000000004F0000-0x00000000004F6000-memory.dmp

    Filesize

    24KB