Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-03-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
7b432411c12d3d0d31ecaf9011450e42.exe
Resource
win7-20240221-en
General
-
Target
7b432411c12d3d0d31ecaf9011450e42.exe
-
Size
420KB
-
MD5
7b432411c12d3d0d31ecaf9011450e42
-
SHA1
968943d42ba1e8938989b6ed1884195c2285396f
-
SHA256
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348
-
SHA512
6881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b
-
SSDEEP
6144:lfBwgfV+aXoGJR1xpppStlxu4qGilNZZDLxFLWj4+36o9:l3V+anFxZUq1NZJ9N8qu
Malware Config
Extracted
amadey
4.18
-
install_dir
154561dcbf
-
install_file
Dctooux.exe
-
strings_key
2cd47fa043c815e1a033c67832f3c6a5
-
url_paths
/j4Fvskd3/index.php
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 9 1180 rundll32.exe 12 2392 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
Dctooux.exerisepro.exepid process 2604 Dctooux.exe 2832 risepro.exe -
Loads dropped DLL 17 IoCs
Processes:
7b432411c12d3d0d31ecaf9011450e42.exeDctooux.exerundll32.exerundll32.exerundll32.exepid process 1540 7b432411c12d3d0d31ecaf9011450e42.exe 1540 7b432411c12d3d0d31ecaf9011450e42.exe 2604 Dctooux.exe 2604 Dctooux.exe 2604 Dctooux.exe 1592 rundll32.exe 1592 rundll32.exe 1592 rundll32.exe 1592 rundll32.exe 1180 rundll32.exe 1180 rundll32.exe 1180 rundll32.exe 1180 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe 2392 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
Processes:
7b432411c12d3d0d31ecaf9011450e42.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 7b432411c12d3d0d31ecaf9011450e42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exepowershell.exepid process 1180 rundll32.exe 1180 rundll32.exe 1180 rundll32.exe 1180 rundll32.exe 1180 rundll32.exe 2008 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2008 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7b432411c12d3d0d31ecaf9011450e42.exepid process 1540 7b432411c12d3d0d31ecaf9011450e42.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
7b432411c12d3d0d31ecaf9011450e42.exeDctooux.exerundll32.exerundll32.exedescription pid process target process PID 1540 wrote to memory of 2604 1540 7b432411c12d3d0d31ecaf9011450e42.exe Dctooux.exe PID 1540 wrote to memory of 2604 1540 7b432411c12d3d0d31ecaf9011450e42.exe Dctooux.exe PID 1540 wrote to memory of 2604 1540 7b432411c12d3d0d31ecaf9011450e42.exe Dctooux.exe PID 1540 wrote to memory of 2604 1540 7b432411c12d3d0d31ecaf9011450e42.exe Dctooux.exe PID 2604 wrote to memory of 2884 2604 Dctooux.exe Dctooux.exe PID 2604 wrote to memory of 2884 2604 Dctooux.exe Dctooux.exe PID 2604 wrote to memory of 2884 2604 Dctooux.exe Dctooux.exe PID 2604 wrote to memory of 2884 2604 Dctooux.exe Dctooux.exe PID 2604 wrote to memory of 2832 2604 Dctooux.exe risepro.exe PID 2604 wrote to memory of 2832 2604 Dctooux.exe risepro.exe PID 2604 wrote to memory of 2832 2604 Dctooux.exe risepro.exe PID 2604 wrote to memory of 2832 2604 Dctooux.exe risepro.exe PID 2604 wrote to memory of 1592 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 1592 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 1592 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 1592 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 1592 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 1592 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 1592 2604 Dctooux.exe rundll32.exe PID 1592 wrote to memory of 1180 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1180 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1180 1592 rundll32.exe rundll32.exe PID 1592 wrote to memory of 1180 1592 rundll32.exe rundll32.exe PID 1180 wrote to memory of 2864 1180 rundll32.exe netsh.exe PID 1180 wrote to memory of 2864 1180 rundll32.exe netsh.exe PID 1180 wrote to memory of 2864 1180 rundll32.exe netsh.exe PID 1180 wrote to memory of 2008 1180 rundll32.exe powershell.exe PID 1180 wrote to memory of 2008 1180 rundll32.exe powershell.exe PID 1180 wrote to memory of 2008 1180 rundll32.exe powershell.exe PID 2604 wrote to memory of 2392 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 2392 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 2392 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 2392 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 2392 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 2392 2604 Dctooux.exe rundll32.exe PID 2604 wrote to memory of 2392 2604 Dctooux.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b432411c12d3d0d31ecaf9011450e42.exe"C:\Users\Admin\AppData\Local\Temp\7b432411c12d3d0d31ecaf9011450e42.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"3⤵PID:2884
-
-
C:\Users\Admin\AppData\Roaming\1000065000\risepro.exe"C:\Users\Admin\AppData\Roaming\1000065000\risepro.exe"3⤵
- Executes dropped EXE
PID:2832
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\309405411416_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\810b84e2bfa3a9\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5fea7c53f7c744c6334967baaf0a06456
SHA109b67d1004625c4eb3a164cdcf9e726b3d7d1272
SHA25600ecc968ba2a942bcb02d61162cd763b62352fd2b7b23dbe16ecf9de31936622
SHA512d3570947de312af3ec095212a1b990025b98c0d074cdc04c666302160aae252f2f1f324f668fd3846330267b16973cc6a9cdc708fd9b3b330210ef8098cf9d04
-
Filesize
420KB
MD57b432411c12d3d0d31ecaf9011450e42
SHA1968943d42ba1e8938989b6ed1884195c2285396f
SHA2563fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348
SHA5126881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b
-
Filesize
65KB
MD5e25f9348f0b7aa5298671c7a1aaef4a1
SHA1ac5d0f13974c0d9bf6ac29a5e2d13c3d1decfd72
SHA256bd5ee04123e7326c4c0b68d7693b705dc4d442a53f017a0e0874309865790d1b
SHA512dff4378893b682f48e8032359a0f5086c7864842cb602f48d5438145f760f1264eecbd5b063f97973bba20b38cf49a3ab849677b83c0baef48082e68f0a4485a
-
Filesize
855KB
MD5b9f7dc70d95e29e1859b77354a7028d0
SHA1263d3729b26e43ac270aa5aaf57e25096a945b66
SHA256b23701e1ea1f053cec61ef613e672f707500644b598e945c6b56fa60bea0cca2
SHA512b51e8f644160b7082db3491cf3f9e7f0c5cf6c226441ddda0c22591ff54a2425cc9e683dcd27a299799123eede59e945e7683cd0069fa682a508adfadfe90f14
-
Filesize
109KB
MD5ca684dc5ebed4381701a39f1cc3a0fb2
SHA18c4a375aa583bd1c705597a7f45fd18934276770
SHA256b8c5ad09c5b62fa8d8bcb8e1c317700274b4756d04fc964ccae38103c318ddd2
SHA5128b414799e37d50f664e04e704ab06a8f6f25cb9f9c24f157e998a72aad9c0a0cd9435b42c629dc26643f039725d22a89ca3468dc39009d11d910420a80e9c510
-
Filesize
1.2MB
MD54876ee75ce2712147c41ff1277cd2d30
SHA13733dc92318f0c6b92cb201e49151686281acda6
SHA256bbfba2d40f48c16a53b5806555c08aff1982c3fe4a77964963edbab9d7e672ed
SHA5129bf25d4d0dfebd287b0c84abb64612b3db00a26b0217490b35925e77487d6c872632c936cedf1205c46ecbf9d4dfc9bc7600bee05afc550b30ae0d0964c5afe9
-
Filesize
126KB
MD56a3105e04d50ffa3cd69b173f7d26625
SHA1b5b7e44efc1053bf8f104aa2aa4760a128663b74
SHA256a8b94cadfa4891d5e162b2b8c531de75cce800d732e93a9b42684dea1e9c2a2f
SHA51241e3edbd7d3794e6b6f058b4bd871b91c9c5d38aad596957f302cfaee2de0665110c90268a11a9a3d84e496e26a34806f76ce3ba3982aa62de60d765b3bad950