Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
7077ab5685f753d94192aca8e3158fb5.exe
Resource
win7-20231129-en
General
-
Target
7077ab5685f753d94192aca8e3158fb5.exe
-
Size
6.2MB
-
MD5
7077ab5685f753d94192aca8e3158fb5
-
SHA1
a73f1b79f6a1fccc0cb4f10b875a0b5a0182dc90
-
SHA256
751ad0b26586c0dbb06379c8bbb1b7a47e77adc19c3f068d6305f47faec551b2
-
SHA512
64001b470b17434a051b64477955175f5c35db89761477dd5473f8229e6b141a252ab0ed0cef6655135be4fa70f13313475a427195e3013a7a2c061cd260ef26
-
SSDEEP
98304:Xrxkmr7CWoqbb4ngAFGw7WClREnjwaeSkMc88QS+qE0AaG8MlftjxeUZH:XKyzoLgkW4RmKMcJWqE0AaGxftjx/Z
Malware Config
Extracted
amadey
4.19
http://creationofprogress.com
-
install_dir
603179bf2d
-
install_file
Dctooux.exe
-
strings_key
e6d1abb3e9573b823ce443b691fcda47
-
url_paths
/8BvxwQdec3/index.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3096 set thread context of 1208 3096 7077ab5685f753d94192aca8e3158fb5.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3096 7077ab5685f753d94192aca8e3158fb5.exe 3096 7077ab5685f753d94192aca8e3158fb5.exe 1208 cmd.exe 1208 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3096 7077ab5685f753d94192aca8e3158fb5.exe 1208 cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3096 wrote to memory of 1208 3096 7077ab5685f753d94192aca8e3158fb5.exe 89 PID 3096 wrote to memory of 1208 3096 7077ab5685f753d94192aca8e3158fb5.exe 89 PID 3096 wrote to memory of 1208 3096 7077ab5685f753d94192aca8e3158fb5.exe 89 PID 3096 wrote to memory of 1208 3096 7077ab5685f753d94192aca8e3158fb5.exe 89 PID 1208 wrote to memory of 3600 1208 cmd.exe 105 PID 1208 wrote to memory of 3600 1208 cmd.exe 105 PID 1208 wrote to memory of 3600 1208 cmd.exe 105 PID 1208 wrote to memory of 3600 1208 cmd.exe 105 PID 1208 wrote to memory of 3600 1208 cmd.exe 105 PID 1208 wrote to memory of 3600 1208 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\7077ab5685f753d94192aca8e3158fb5.exe"C:\Users\Admin\AppData\Local\Temp\7077ab5685f753d94192aca8e3158fb5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:3600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52067bc4915fe76186dcb9c0f5432c608
SHA1fff611f9712a3a7a01b81b4072f0d157ac32912c
SHA2562f7ba6f9e552418a89e02cb66fca42f7fef9f58b8ca99030b29a1a7ebcd0299f
SHA51218d7edb4a03e278b26323ce1dc2d76bdbdc033917b5033a78b0dda02c33a7b5ac218be63499fe26393ee8a25a7a9893e97b18c3209d9355e9c3aea93aece14c9
-
Filesize
1.1MB
MD5ce64db9cb00fafb3d29a69159dbdf713
SHA12066e9c7eb42a4303be3890b7c03dcd05c9af5b0
SHA256928c03ae29a2051953b8325d9e2ba537670411643bc645ebaf20591df5c5d5a4
SHA5127e3b1150acb8ef46d7d4cacca6b953f53d0d33d3a994760bc66ebba9e01198e7cf3679ad9828d2fa98a0f1b6ea49a5960228f0e9f6a36029eebd50a7551200a0