Analysis
-
max time kernel
290s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe
Resource
win7-20240221-en
General
-
Target
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe
-
Size
420KB
-
MD5
7b432411c12d3d0d31ecaf9011450e42
-
SHA1
968943d42ba1e8938989b6ed1884195c2285396f
-
SHA256
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348
-
SHA512
6881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b
-
SSDEEP
6144:lfBwgfV+aXoGJR1xpppStlxu4qGilNZZDLxFLWj4+36o9:l3V+anFxZUq1NZJ9N8qu
Malware Config
Extracted
amadey
4.18
-
install_dir
154561dcbf
-
install_file
Dctooux.exe
-
strings_key
2cd47fa043c815e1a033c67832f3c6a5
-
url_paths
/j4Fvskd3/index.php
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exeDctooux.exeDctooux.exepid process 4944 Dctooux.exe 4728 Dctooux.exe 1356 Dctooux.exe 4504 Dctooux.exe 5100 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4496 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 4620 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 4124 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 2808 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 3784 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 5100 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 3240 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 568 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 2208 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 4900 3132 WerFault.exe 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exepid process 3132 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe"C:\Users\Admin\AppData\Local\Temp\3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 6922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 7402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 8122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 8202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 8482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 8602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 10642⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 10922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 11682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 12242⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeFilesize
420KB
MD57b432411c12d3d0d31ecaf9011450e42
SHA1968943d42ba1e8938989b6ed1884195c2285396f
SHA2563fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348
SHA5126881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b
-
memory/1356-41-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/1356-40-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/1356-39-0x0000000000CB0000-0x0000000000DB0000-memory.dmpFilesize
1024KB
-
memory/3132-11-0x0000000000CF0000-0x0000000000DF0000-memory.dmpFilesize
1024KB
-
memory/3132-8-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3132-9-0x0000000000C60000-0x0000000000CCF000-memory.dmpFilesize
444KB
-
memory/3132-1-0x0000000000CF0000-0x0000000000DF0000-memory.dmpFilesize
1024KB
-
memory/3132-2-0x0000000000C60000-0x0000000000CCF000-memory.dmpFilesize
444KB
-
memory/3132-3-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4504-51-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4504-50-0x0000000000E50000-0x0000000000F50000-memory.dmpFilesize
1024KB
-
memory/4504-52-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4728-29-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4728-30-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4728-28-0x0000000000DC0000-0x0000000000EC0000-memory.dmpFilesize
1024KB
-
memory/4944-19-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4944-18-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4944-17-0x0000000000D50000-0x0000000000E50000-memory.dmpFilesize
1024KB
-
memory/5100-61-0x0000000000BE0000-0x0000000000CE0000-memory.dmpFilesize
1024KB
-
memory/5100-62-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/5100-63-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB