Analysis
-
max time kernel
93s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 10:23
Static task
static1
Behavioral task
behavioral1
Sample
8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe
Resource
win10v2004-20250207-en
General
-
Target
8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe
-
Size
479KB
-
MD5
905370da155f401544bf14f95fb6fa90
-
SHA1
b64c56ec92b44c34cbb802e7939c61d2812d7b85
-
SHA256
8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18
-
SHA512
32f66818a74f5c2df936aab9098b880a720d4995d64a05a5c4a3d2bec1d48a5697dcbe92c808c0714bf62fa37fc19f835c50deeeecb28e4b3878093e8d7f4b1a
-
SSDEEP
12288:/1fzpgKtQ0/vLJpHb2r0qSlCCpl2WhuTqdX9lI:JzpguFrHyhSM6dhuqI
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023e19-12.dat family_ardamax -
Downloads MZ/PE file 1 IoCs
flow pid Process 36 3076 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe -
Executes dropped EXE 1 IoCs
pid Process 3864 system32WWKO.exe -
Loads dropped DLL 4 IoCs
pid Process 2740 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe 3864 system32WWKO.exe 3864 system32WWKO.exe 3864 system32WWKO.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32WWKO Agent = "C:\\Windows\\system32WWKO.exe" system32WWKO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\system32WWKO.exe 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe File created C:\Windows\system32AKV.exe 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe File created C:\Windows\system32WWKO.001 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe File created C:\Windows\system32WWKO.006 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe File created C:\Windows\system32WWKO.007 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32WWKO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2632 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3864 system32WWKO.exe Token: SeIncBasePriorityPrivilege 3864 system32WWKO.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3864 system32WWKO.exe 3864 system32WWKO.exe 3864 system32WWKO.exe 3864 system32WWKO.exe 3864 system32WWKO.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2740 wrote to memory of 3864 2740 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe 88 PID 2740 wrote to memory of 3864 2740 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe 88 PID 2740 wrote to memory of 3864 2740 8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe"C:\Users\Admin\AppData\Local\Temp\8637fb88ce464843f0f58e061351b0ada5e13f5ec9002d21074bd5fe390adf18N.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32WWKO.exe"C:\Windows\system32WWKO.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3864
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzAwODk5NzI5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2632
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD508c0e7cb9f56d7a8f6acfd2268ea7142
SHA1e885ffa0db9b4dd38e547135eb5446cc89fe6865
SHA256fe9304a2f41e446e3672a26b338cde680d34fd07b0c5a6866ef108366ed92eb9
SHA5126325410c99d703b3181c4eb4d9cbcdf1d8e08cc57a8ef7c8334e5be02b2499997829a3d6fd708dd83541efd1712330c5163daffe68a09aa2863cc76d5cbdccf9
-
Filesize
458B
MD5f57607418680b3433ae9b65892b9164f
SHA14d0a5455f96d1fa0a1dd1f64322a83d2f759cb34
SHA256b9fa0c5a350416a19bdb7b9e2a5e9668631bcebee683ce527af6e2103399cadf
SHA512eb2e6ff62e623fcc891a7b0e19efa5163b60a0e6f147f8a8282ce9cb19b936215fdba16faa5aae5874166c65db9aa593946a5a738f6a6673d7c34545229060f6
-
Filesize
7KB
MD5840a1ae793d07aed4585781697178bc1
SHA15d42f9763e32c1dced9cdd14144926c43044d6ad
SHA256af73b0a6c98eec78e121cb1fed4ee4b5df052833242179cdeec04c75b6df2cfc
SHA512078ddc10ebccd4c108e52555ae7aeb644aadfc006dbc2aa1aad319b6e9bd35b779fee9e3d063c22f48a7e082e1a01e1f70ab11f8c26827750b13a1c8cb636689
-
Filesize
5KB
MD5530d177fa3d66ca092ecbdb4eb02a0d9
SHA1868a3c3fa51df0fe5ffbba3aeeca20aa23da0fc4
SHA256037e9a3e82e1a8902d8220c82650e52f549d6acc490ff30481a497130b7208f2
SHA51244d84513aaab0eb5f2c0c9be64cc78beb8caf0ddf6039fe726d39834d19d4c1084cec1611b565529920d4edf4d432dba6e67a01d94a845b7fd083dd284545002
-
Filesize
471KB
MD5040be8249f1b7b90730867c398e40568
SHA1d6908d242bed9d7d04dcf98c7e46571121f0b7f1
SHA25684ce204e2d8ef6cc519fbabf8356999de06af6250ca4a170ecfb776952d855ca
SHA5123c63436c6412f127a2ca64891af185678cde71846c52331ae4dda03b1313392ba3655699305d6ce05723d50aec0e4d227616536592bb5a23449e1eaddba94516