Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2024 03:19
Static task
static1
Behavioral task
behavioral1
Sample
be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe
Resource
win7-20240220-en
General
-
Target
be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe
-
Size
411KB
-
MD5
cb0abfec359d8dbf934857d9448c898a
-
SHA1
51a64cf93eee96dd1b885e51f363e86acd2ff98b
-
SHA256
be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81
-
SHA512
ea5dd2d297f5b98e1f73bbfc782421241ea1205c411f017841d64a9e60774c010187188e48481cbe2c37868cff033664f24f38371dd3ef9951b5a94ef35313a3
-
SSDEEP
6144:Pm6VY1xewHVboL706awaWqgIorlzanEcD2pStdHFIm09r8wuOXzbHszA:u6VY1xxK7X/aWIgzxvpSFm93/iA
Malware Config
Extracted
amadey
4.18
-
install_dir
154561dcbf
-
install_file
Dctooux.exe
-
strings_key
2cd47fa043c815e1a033c67832f3c6a5
-
url_paths
/j4Fvskd3/index.php
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 45 5108 rundll32.exe 47 4856 rundll32.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exeDctooux.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Dctooux.exe -
Executes dropped EXE 3 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exepid process 2968 Dctooux.exe 4860 Dctooux.exe 1796 Dctooux.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 4636 rundll32.exe 5108 rundll32.exe 4856 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
Processes:
be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 25 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4024 5096 WerFault.exe be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe 4636 5096 WerFault.exe be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe 800 5096 WerFault.exe be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe 764 5096 WerFault.exe be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe 4584 5096 WerFault.exe be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe 2568 5096 WerFault.exe be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe 3320 5096 WerFault.exe be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe 2732 5096 WerFault.exe be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe 1708 5096 WerFault.exe be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe 4088 2968 WerFault.exe Dctooux.exe 800 2968 WerFault.exe Dctooux.exe 676 2968 WerFault.exe Dctooux.exe 3192 2968 WerFault.exe Dctooux.exe 2448 2968 WerFault.exe Dctooux.exe 3512 2968 WerFault.exe Dctooux.exe 4928 2968 WerFault.exe Dctooux.exe 2232 2968 WerFault.exe Dctooux.exe 384 2968 WerFault.exe Dctooux.exe 4048 2968 WerFault.exe Dctooux.exe 3564 2968 WerFault.exe Dctooux.exe 4124 2968 WerFault.exe Dctooux.exe 4412 2968 WerFault.exe Dctooux.exe 4296 2968 WerFault.exe Dctooux.exe 3972 2968 WerFault.exe Dctooux.exe 3780 2968 WerFault.exe Dctooux.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
rundll32.exepowershell.exepid process 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 4992 powershell.exe 4992 powershell.exe 4992 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4992 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exepid process 5096 be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exeDctooux.exerundll32.exerundll32.exedescription pid process target process PID 5096 wrote to memory of 2968 5096 be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe Dctooux.exe PID 5096 wrote to memory of 2968 5096 be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe Dctooux.exe PID 5096 wrote to memory of 2968 5096 be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe Dctooux.exe PID 2968 wrote to memory of 4636 2968 Dctooux.exe rundll32.exe PID 2968 wrote to memory of 4636 2968 Dctooux.exe rundll32.exe PID 2968 wrote to memory of 4636 2968 Dctooux.exe rundll32.exe PID 4636 wrote to memory of 5108 4636 rundll32.exe rundll32.exe PID 4636 wrote to memory of 5108 4636 rundll32.exe rundll32.exe PID 5108 wrote to memory of 1608 5108 rundll32.exe netsh.exe PID 5108 wrote to memory of 1608 5108 rundll32.exe netsh.exe PID 5108 wrote to memory of 4992 5108 rundll32.exe powershell.exe PID 5108 wrote to memory of 4992 5108 rundll32.exe powershell.exe PID 2968 wrote to memory of 4856 2968 Dctooux.exe rundll32.exe PID 2968 wrote to memory of 4856 2968 Dctooux.exe rundll32.exe PID 2968 wrote to memory of 4856 2968 Dctooux.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe"C:\Users\Admin\AppData\Local\Temp\be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 7642⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 7082⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 8602⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 9362⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 9402⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 9202⤵
- Program crash
PID:2568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 11442⤵
- Program crash
PID:3320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 11562⤵
- Program crash
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 12442⤵
- Program crash
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 5563⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 5643⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 5963⤵
- Program crash
PID:676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 6003⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 5843⤵
- Program crash
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 8643⤵
- Program crash
PID:3512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 9003⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 9003⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 9363⤵
- Program crash
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 10123⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 11163⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 11163⤵
- Program crash
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 11923⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 15843⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:1608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 6363⤵
- Program crash
PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 15963⤵
- Program crash
PID:3780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5096 -ip 50961⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5096 -ip 50961⤵PID:4048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5096 -ip 50961⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5096 -ip 50961⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5096 -ip 50961⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5096 -ip 50961⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5096 -ip 50961⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5096 -ip 50961⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5096 -ip 50961⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2968 -ip 29681⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2968 -ip 29681⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2968 -ip 29681⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2968 -ip 29681⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2968 -ip 29681⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2968 -ip 29681⤵PID:372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2968 -ip 29681⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2968 -ip 29681⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2968 -ip 29681⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 2968 -ip 29681⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2968 -ip 29681⤵PID:832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2968 -ip 29681⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2968 -ip 29681⤵PID:552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1428 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:4416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2968 -ip 29681⤵PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2968 -ip 29681⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2968 -ip 29681⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5cb0abfec359d8dbf934857d9448c898a
SHA151a64cf93eee96dd1b885e51f363e86acd2ff98b
SHA256be331c725bb8691b4cdc441bff8dac6138ad5498f48177691ce311a08a3a1b81
SHA512ea5dd2d297f5b98e1f73bbfc782421241ea1205c411f017841d64a9e60774c010187188e48481cbe2c37868cff033664f24f38371dd3ef9951b5a94ef35313a3
-
Filesize
64KB
MD512d6bf4ec538feb02b68b69294f87de2
SHA14e74f0316ddc2161ea432b9f9e80ab6cc0445572
SHA2562523b83b8e9b57ea3e78ecf12d68d997fb834fdbfe1c9b0377b87deeddb51b34
SHA512129585ccef336aa8377a7fddee14867cba81530ea79806a163b5dc11a3c130993e62bbb704402c2b71da37689150607dafce558e93e9a95583983b094d444b00
-
Filesize
81KB
MD5a9242a019064040946cc2d7df73c6364
SHA151df0df383b161b7310815341beec800a863ef4b
SHA256ca8d6feb5b9290783709e621c3e6667dec3c7d66f71053ba73a0a97310edc8d2
SHA512d8809bc7c0da95089396ae1f500b472574629f7632b8d31f519bcf4a08ab7662ec3c1af682a6f52044f8ead8f8c5d7d7801a1796202498e8aef76cbe81621103
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
109KB
MD5ca684dc5ebed4381701a39f1cc3a0fb2
SHA18c4a375aa583bd1c705597a7f45fd18934276770
SHA256b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2
SHA5128b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510
-
Filesize
1.2MB
MD54876ee75ce2712147c41ff1277cd2d30
SHA13733dc92318f0c6b92cb201e49151686281acda6
SHA256bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed
SHA5129bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9