Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 23:03
Behavioral task
behavioral1
Sample
254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe
Resource
win7-20231215-en
General
-
Target
254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe
-
Size
5.0MB
-
MD5
b1339ad6250fec1d3a23a937e5bac9e8
-
SHA1
9168638e8819de7a7415412f2bac059db500ca4b
-
SHA256
254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76
-
SHA512
5c2b630985e7f79bee3a5851b2344ea109457dce4b6d1e792f4d293889d4b8fe44107231a06972a8335ef928398533d1c3288b87f6619a961d71e8d2748c8d01
-
SSDEEP
49152:10PYJq3qZ4XZr2Uuac+kp5Zu0i93Dg2rXlBAz55QENm3rUEexR3OFwqGu+AUUWUv:1XJq3qZYnAl+2m3rFeR+6R0HG
Malware Config
Extracted
amadey
4.15
http://185.172.128.63
-
install_dir
6187fcb526
-
install_file
Dctooux.exe
-
strings_key
cd3b2619c9009c441355ae581d53163e
-
url_paths
/v8sjh3hs8/index.php
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1936-1-0x0000000000C10000-0x000000000110A000-memory.dmp family_zgrat_v1 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1936-1-0x0000000000C10000-0x000000000110A000-memory.dmp net_reactor -
Loads dropped DLL 1 IoCs
pid Process 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1936 set thread context of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2728 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 28 PID 1936 wrote to memory of 2728 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 28 PID 1936 wrote to memory of 2728 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 28 PID 1936 wrote to memory of 2728 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 28 PID 1936 wrote to memory of 2728 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 28 PID 1936 wrote to memory of 2728 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 28 PID 1936 wrote to memory of 2728 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 28 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29 PID 1936 wrote to memory of 2576 1936 254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe"C:\Users\Admin\AppData\Local\Temp\254f8d074c069e55870426682a68552a95faf35df76b024d7069ddccd7e58e76.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:2728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:2576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD53603777425746d87189ed7d540ac9ef6
SHA1ea624afc02e39a5007c7c3dc025b5a024597fc1c
SHA256aad0716758711948b6779cd22de462b39b315b132d66b66a376971cedd16921d
SHA51236bcf216242e89e4360d1739e803aa77069f5f2ee3299b4c093ab7bf706ecc4dd3b182db6d2c231e92be74ec9f6cceec11a37ee714ae44765a66e7a8919abdb0