Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/03/2025, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe
Resource
win10v2004-20250314-en
General
-
Target
91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe
-
Size
600KB
-
MD5
788e554c0938109f4ec5cb40af7bd228
-
SHA1
62709ae17f8bdc45d5afae2fee3b954aed9005a0
-
SHA256
91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454
-
SHA512
93670d12a873650f94d5d55e09f51ceab2db50e18d1a217a4a0e938cc786cbaed1b534ee55bf92c95d46c45b6a226d37608aa6d820caa814b592f88a8c1ab027
-
SSDEEP
12288:fRhzupXfGlLO5MKsTDqtOotOBuI9NxpyLnZg:Zhz+ulKJS2PtmuSNxULZ
Malware Config
Extracted
Protocol: ftp- Host:
ftp.drivehq.com - Port:
21 - Username:
cet90
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00050000000194e4-44.dat family_ardamax -
Executes dropped EXE 3 IoCs
pid Process 2248 ardamax.EXE 2840 Install.exe 2908 RKYT.exe -
Loads dropped DLL 9 IoCs
pid Process 2840 Install.exe 2840 Install.exe 2840 Install.exe 2840 Install.exe 2840 Install.exe 2908 RKYT.exe 2908 RKYT.exe 2908 RKYT.exe 2908 RKYT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RKYT Agent = "C:\\Windows\\SysWOW64\\28463\\RKYT.exe" RKYT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463\RKYT.009 RKYT.exe File created C:\Windows\SysWOW64\28463\RKYT.001 Install.exe File created C:\Windows\SysWOW64\28463\RKYT.006 Install.exe File created C:\Windows\SysWOW64\28463\RKYT.007 Install.exe File opened for modification C:\Windows\SysWOW64\28463 RKYT.exe File created C:\Windows\SysWOW64\28463\RKYT.009 RKYT.exe File created C:\Windows\SysWOW64\28463\RKYT.exe Install.exe File created C:\Windows\SysWOW64\28463\key.bin Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RKYT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\TypeLib\ = "{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\ProgID\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\409\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\409\win32\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\VersionIndependentProgID\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\409 RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\FLAGS RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\FLAGS\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\HELPDIR RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\Version RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\Version\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\InprocServer32 RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\InprocServer32\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\409\win32\ = "C:\\Windows\\SysWow64\\msi.dll" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\HELPDIR\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\HELPDIR\ = "C:\\Windows\\system32" RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D} RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\ProgID\ = "SAPI.SpResourceManager.1" RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6} RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\FLAGS\ = "0" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\VersionIndependentProgID\ = "SAPI.SpResourceManager" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\ = "Ajicokax.Ivafibiq.Lesihkex Class" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\InprocServer32\ = "%SystemRoot%\\SysWow64\\Speech\\Common\\sapi.dll" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\ RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\ = "Microsoft Windows Installer Object Library" RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\TypeLib\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\ProgID RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0 RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\ RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E30992A5-B9AC-2DAE-64EF-3504CA08D5C6}\1.0\409\win32 RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\TypeLib RKYT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\Version\ = "5.4" RKYT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{174076F4-B280-4E3D-B5A4-B04321C6230D}\VersionIndependentProgID RKYT.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2908 RKYT.exe Token: SeIncBasePriorityPrivilege 2908 RKYT.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2908 RKYT.exe 2908 RKYT.exe 2908 RKYT.exe 2908 RKYT.exe 2908 RKYT.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2540 2560 91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe 31 PID 2560 wrote to memory of 2540 2560 91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe 31 PID 2560 wrote to memory of 2540 2560 91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe 31 PID 2560 wrote to memory of 2248 2560 91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe 33 PID 2560 wrote to memory of 2248 2560 91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe 33 PID 2560 wrote to memory of 2248 2560 91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe 33 PID 2248 wrote to memory of 2840 2248 ardamax.EXE 34 PID 2248 wrote to memory of 2840 2248 ardamax.EXE 34 PID 2248 wrote to memory of 2840 2248 ardamax.EXE 34 PID 2248 wrote to memory of 2840 2248 ardamax.EXE 34 PID 2248 wrote to memory of 2840 2248 ardamax.EXE 34 PID 2248 wrote to memory of 2840 2248 ardamax.EXE 34 PID 2248 wrote to memory of 2840 2248 ardamax.EXE 34 PID 2840 wrote to memory of 2908 2840 Install.exe 35 PID 2840 wrote to memory of 2908 2840 Install.exe 35 PID 2840 wrote to memory of 2908 2840 Install.exe 35 PID 2840 wrote to memory of 2908 2840 Install.exe 35 PID 2840 wrote to memory of 2908 2840 Install.exe 35 PID 2840 wrote to memory of 2908 2840 Install.exe 35 PID 2840 wrote to memory of 2908 2840 Install.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe"C:\Users\Admin\AppData\Local\Temp\91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "2⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\ardamax.EXE"C:\Users\Admin\AppData\Local\Temp\ardamax.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\28463\RKYT.exe"C:\Windows\system32\28463\RKYT.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566KB
MD541dc0fc1fff90a9d5d28f64da7f5b4f4
SHA103fb38cfec8e4cb088c9f2d3edb08afbf5c08f3d
SHA2569c8ad7d35fa160b6254c62c99487e9d846c7da0e7d4900c7c6b707294aed4eaf
SHA51229b816459333dfe4b269ee16eb6f11c622e0b10959f2431a7d14efe3861e24acf546e955736a1554404050bf1adc34abdd25ea178ae3a16c836aa8004db11377
-
Filesize
581KB
MD53a19cabf65e0f578e8bb61e2579017f6
SHA1c12f4dfe9f4082ddd5b321a70a70e2eeeeeaa2eb
SHA2563e26364fc5c4799e494eeab424fa632c4a7a629819e1582dd931fe08f9e43998
SHA5126759f73b0462f6be26051dcbb4e78b8f13f5b3da74145aa0ac9fa05d85d1ae5c626ee4d06bdb99d48b26c772a32dce13cd20be15c3e712e703d47eee795d6f6e
-
Filesize
23B
MD5234dbc908f632fc9fed55bd63e19e1f5
SHA139e7adf222e3eff34d33f65bbd56399aaeede7a7
SHA256b110b65a0722a06873690dba696b25dd321365313c6f0e2db908d6544c8c5f98
SHA512b4d32a3da8f1e9bd245303607b59df9eea19cc8776587defbac9384783004b150f2adad49e9ca369e643a64de7b747e276fef9486dd8ee1f3e263bb4e1521493
-
Filesize
374B
MD52e33a26777c1717ee92cc27e6f1c3979
SHA1dbe6ecd86d9887415e7793e22cf5aefd606cfb7e
SHA256035eff176236050769524579965c1781280b61e78278ee45bb1962737bfcab32
SHA51276e6f99566288f4737c2122935bfaf13560406e8400cd372b4f1000d789d7834be5ae2aec0305a5436266945d9546a6dca342923ba1ffabdbe4ddc6a3f6ba342
-
Filesize
8KB
MD531854a50b294dd312eb7fa9eb1c99537
SHA1e0b1682a001e15d0e0e1c1ca732cafb5c80b3160
SHA2562fe2d55aae2deef38a37c9679d74ecf05699d6919760794f69583b43b7fe308c
SHA5120482a4981ba242d4e931bd8b9eb5d606492cffb7609fb69fb349ed19c7a9e36a7e240e5ebe759505d253c5e72fb771612a76419c36fb035987a166569a5111c2
-
Filesize
5KB
MD5603451f504bedb28c3a7bae4c89abf24
SHA1cbfe12186b54663f60663c349739c7a49950c44e
SHA256e4d6577ea390274308877284b6d0cd6672aeb0e76c9c9847ac59c0964f050d13
SHA512136e28e288b3ce26b37c82b078a3440e3232c0f874d7d33e8e6fb6eadfd0024b9009448500c716523b81f142fa3bebf7d11f1dd3e8e6143867b06335eb5f9612
-
Filesize
916KB
MD5278f6a02bf1e2a5b46517154d3f9d493
SHA1f2d0a61546d71f776e0aed4d14f37f5929d1cd6b
SHA25619352328577317cc0f752595d9b74d09bca73214f459e8312d2904909cfab5ce
SHA512298312ca6c2565086e4203391e9e507bdb66513043981beb0286275fc6a3ab02f0b6d28118f3ac31b01162c2151d5c065fddd2746c770461ca5a131ba29fe2b2
-
Filesize
648KB
MD5ce568bcaf7285124f764aff92f5079d4
SHA1886f698e2239cf615f12b503853a5fa28c53aefc
SHA25659d7d6de8a9e2d5535703d22c36888889530fd011d7f71cf034e93e36e7527af
SHA5129f6e3496930cb5dd9c9403acc865bc94f63f64af49a27ffeedbc9d9082d50bff4a7a772bb98d4a2719f0ecae144393de9cc273ba83ae00abe347b0be0d7c9866
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
Filesize
4KB
MD5f1cf9fcbddeadabb738de497ffefdced
SHA17385a7c87e245da89cc5ef8f9295678c1566f25d
SHA256086083bc73b14286f9c3c29df8b8dc6f014d8b084267fbaeee0af56344d1f779
SHA5123a3b9d279b4c131ef3f358e0163f60ec9e60160a2cc45488adb915fea6642f3df5d35da2ccb6983d790401d237fbc808829f42c42ef958e7a0eac98fc33bb3f6