Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
7077ab5685f753d94192aca8e3158fb5.exe
Resource
win7-20231129-en
General
-
Target
7077ab5685f753d94192aca8e3158fb5.exe
-
Size
6.2MB
-
MD5
7077ab5685f753d94192aca8e3158fb5
-
SHA1
a73f1b79f6a1fccc0cb4f10b875a0b5a0182dc90
-
SHA256
751ad0b26586c0dbb06379c8bbb1b7a47e77adc19c3f068d6305f47faec551b2
-
SHA512
64001b470b17434a051b64477955175f5c35db89761477dd5473f8229e6b141a252ab0ed0cef6655135be4fa70f13313475a427195e3013a7a2c061cd260ef26
-
SSDEEP
98304:Xrxkmr7CWoqbb4ngAFGw7WClREnjwaeSkMc88QS+qE0AaG8MlftjxeUZH:XKyzoLgkW4RmKMcJWqE0AaGxftjx/Z
Malware Config
Extracted
amadey
4.19
http://creationofprogress.com
-
install_dir
603179bf2d
-
install_file
Dctooux.exe
-
strings_key
e6d1abb3e9573b823ce443b691fcda47
-
url_paths
/8BvxwQdec3/index.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 2656 3004 7077ab5685f753d94192aca8e3158fb5.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3004 7077ab5685f753d94192aca8e3158fb5.exe 3004 7077ab5685f753d94192aca8e3158fb5.exe 2656 cmd.exe 2656 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3004 7077ab5685f753d94192aca8e3158fb5.exe 2656 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2656 3004 7077ab5685f753d94192aca8e3158fb5.exe 29 PID 3004 wrote to memory of 2656 3004 7077ab5685f753d94192aca8e3158fb5.exe 29 PID 3004 wrote to memory of 2656 3004 7077ab5685f753d94192aca8e3158fb5.exe 29 PID 3004 wrote to memory of 2656 3004 7077ab5685f753d94192aca8e3158fb5.exe 29 PID 3004 wrote to memory of 2656 3004 7077ab5685f753d94192aca8e3158fb5.exe 29 PID 2656 wrote to memory of 1804 2656 cmd.exe 33 PID 2656 wrote to memory of 1804 2656 cmd.exe 33 PID 2656 wrote to memory of 1804 2656 cmd.exe 33 PID 2656 wrote to memory of 1804 2656 cmd.exe 33 PID 2656 wrote to memory of 1804 2656 cmd.exe 33 PID 2656 wrote to memory of 1804 2656 cmd.exe 33 PID 2656 wrote to memory of 1804 2656 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7077ab5685f753d94192aca8e3158fb5.exe"C:\Users\Admin\AppData\Local\Temp\7077ab5685f753d94192aca8e3158fb5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:1804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52067bc4915fe76186dcb9c0f5432c608
SHA1fff611f9712a3a7a01b81b4072f0d157ac32912c
SHA2562f7ba6f9e552418a89e02cb66fca42f7fef9f58b8ca99030b29a1a7ebcd0299f
SHA51218d7edb4a03e278b26323ce1dc2d76bdbdc033917b5033a78b0dda02c33a7b5ac218be63499fe26393ee8a25a7a9893e97b18c3209d9355e9c3aea93aece14c9
-
Filesize
1.1MB
MD5560dc14e93e0928c1d9f98acf47e2e20
SHA1f342bcc21f5c8c61ed65245152e774a85fbf0536
SHA256ca9bfcdf5c2400c360fb62c2381a6bf737796a83662aef057ed2d859049a5cde
SHA5122a9a99b0eb1098143505427c362775885276014f3cc9efed6dc7f447764a7240ad999b401908a8305305e0ed2a610345a41e493368f481b99e22cd4c996a7242