Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2025, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe
Resource
win10v2004-20250313-en
General
-
Target
19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe
-
Size
2.0MB
-
MD5
7316ff29df450097b933e376a63641ef
-
SHA1
e5b5d24aa3447a33160967256d8f46e90b827b12
-
SHA256
19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f
-
SHA512
2c1cc8a1671114ea6c5087b2cc260b272e3cdadc51377c3aec306b34d14d27d9ce7962c4f743c42b6efefa0c9c6d1f559b0b0ba70a2985b24a2a6ef7e09c680a
-
SSDEEP
49152:UDD9nDJj95rciYipTNrgjk9rVPI/ML5bYMqptqv:UDDzHrciYirRDg/MLK9ptA
Malware Config
Signatures
-
Ardamax family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe -
Executes dropped EXE 1 IoCs
pid Process 2460 JNO.exe -
Loads dropped DLL 2 IoCs
pid Process 2460 JNO.exe 2460 JNO.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JNO Start = "C:\\ProgramData\\XPGSFC\\JNO.exe" JNO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JNO.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2460 JNO.exe 2460 JNO.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2460 JNO.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2460 JNO.exe 2460 JNO.exe 2460 JNO.exe 2460 JNO.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 548 wrote to memory of 2460 548 19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe 88 PID 548 wrote to memory of 2460 548 19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe 88 PID 548 wrote to memory of 2460 548 19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe"C:\Users\Admin\AppData\Local\Temp\19042bf693d3b24f519fd00721e8c6e3706d17e4b42f2566da12dc42b58cdf4f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\ProgramData\XPGSFC\JNO.exe"C:\ProgramData\XPGSFC\JNO.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5efb969afde2ec0cd6cf0a8ae22ccc137
SHA1ada194202fbc64190a87dd845db0eb2d03b3be2c
SHA2565488789b099584e4f1a9efc8a0ab77613fb06705fc562dbd168fb59d97d96662
SHA5127255cb7594aaea4918d4ecd01dfec63572b47e6b632631e589afc65457d8a30d2d0cb2dc1df5f03b7a232666d1cd6696e4777956d917ddec8d54f4b99c19e94a
-
Filesize
80KB
MD5c5b79d794cfea3adfd1307e882668885
SHA1b86e92f61616251ed70b0319225ec9b1d29050c4
SHA256514c161c625713fb800e7920f7efc4d55a1167a16885fa3aa3ae2e4ae25a20c6
SHA512ed12e55c1e26cd44e5273e00c739df9ffc5f378f048809796e2e4a3fd144dd033e4f5ab4317b5066db582dddf5da9d27d036749a738fcc5cf4873535055427a6
-
Filesize
2.3MB
MD529ca8cd6b4da6f0c729cf0a0edb52c9f
SHA10a509edd7a68eee2f32fbf62708731edf4c6d551
SHA256fa7d72437dbf948ae462b7126747f52144c6613d889a930b180362b009470393
SHA512521aad2ef65a52b002bd4a855a6c696e070549b0f450775b99647f7f681b669080e5e321bfde530bc7ca6a0f95452b6585fa0ba5161bf9a0b07a40336660a582