Analysis

  • max time kernel
    93s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2025 10:23

General

  • Target

    8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe

  • Size

    479KB

  • MD5

    905370da155f401544bf14f95fb6fa90

  • SHA1

    b64c56ec92b44c34cbb802e7939c61d2812d7b85

  • SHA256

    8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18

  • SHA512

    32f66818a74f5c2df936aab9098b880a720d4995d64a05a5c4a3d2bec1d48a5697dcbe92c808c0714bf62fa37fc19f835c50deeeecb28e4b3878093e8d7f4b1a

  • SSDEEP

    12288:/1fzpgKtQ0/vLJpHb2r0qSlCCpl2WhuTqdX9lI:JzpguFrHyhSM6dhuqI

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe
    "C:\Users\Admin\AppData\Local\Temp\8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\system32WWKO.exe
      "C:\Windows\system32WWKO.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3864
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MkIxNEZGQTEtRTM2Mi00RkQzLTgxNTEtMjJDRDA5NEQ2REUzfSIgdXNlcmlkPSJ7QkE3NTMxOTAtQkVDRS00NDFFLUI0QjUtM0NGRURGQjYzMkYyfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7OEU1RTY0MEUtNEVFMC00OTgwLUEwRjgtNDhEQkJGMkEzOTI0fSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzAwODk5NzI5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@7EA.tmp

    Filesize

    4KB

    MD5

    08c0e7cb9f56d7a8f6acfd2268ea7142

    SHA1

    e885ffa0db9b4dd38e547135eb5446cc89fe6865

    SHA256

    fe9304a2f41e446e3672a26b338cde680d34fd07b0c5a6866ef108366ed92eb9

    SHA512

    6325410c99d703b3181c4eb4d9cbcdf1d8e08cc57a8ef7c8334e5be02b2499997829a3d6fd708dd83541efd1712330c5163daffe68a09aa2863cc76d5cbdccf9

  • C:\Windows\system32WWKO.001

    Filesize

    458B

    MD5

    f57607418680b3433ae9b65892b9164f

    SHA1

    4d0a5455f96d1fa0a1dd1f64322a83d2f759cb34

    SHA256

    b9fa0c5a350416a19bdb7b9e2a5e9668631bcebee683ce527af6e2103399cadf

    SHA512

    eb2e6ff62e623fcc891a7b0e19efa5163b60a0e6f147f8a8282ce9cb19b936215fdba16faa5aae5874166c65db9aa593946a5a738f6a6673d7c34545229060f6

  • C:\Windows\system32WWKO.006

    Filesize

    7KB

    MD5

    840a1ae793d07aed4585781697178bc1

    SHA1

    5d42f9763e32c1dced9cdd14144926c43044d6ad

    SHA256

    af73b0a6c98eec78e121cb1fed4ee4b5df052833242179cdeec04c75b6df2cfc

    SHA512

    078ddc10ebccd4c108e52555ae7aeb644aadfc006dbc2aa1aad319b6e9bd35b779fee9e3d063c22f48a7e082e1a01e1f70ab11f8c26827750b13a1c8cb636689

  • C:\Windows\system32WWKO.007

    Filesize

    5KB

    MD5

    530d177fa3d66ca092ecbdb4eb02a0d9

    SHA1

    868a3c3fa51df0fe5ffbba3aeeca20aa23da0fc4

    SHA256

    037e9a3e82e1a8902d8220c82650e52f549d6acc490ff30481a497130b7208f2

    SHA512

    44d84513aaab0eb5f2c0c9be64cc78beb8caf0ddf6039fe726d39834d19d4c1084cec1611b565529920d4edf4d432dba6e67a01d94a845b7fd083dd284545002

  • C:\Windows\system32WWKO.exe

    Filesize

    471KB

    MD5

    040be8249f1b7b90730867c398e40568

    SHA1

    d6908d242bed9d7d04dcf98c7e46571121f0b7f1

    SHA256

    84ce204e2d8ef6cc519fbabf8356999de06af6250ca4a170ecfb776952d855ca

    SHA512

    3c63436c6412f127a2ca64891af185678cde71846c52331ae4dda03b1313392ba3655699305d6ce05723d50aec0e4d227616536592bb5a23449e1eaddba94516

  • memory/3864-20-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB

  • memory/3864-26-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB