Analysis
-
max time kernel
291s -
max time network
255s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe
Resource
win7-20240221-en
General
-
Target
639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe
-
Size
420KB
-
MD5
8219dda07acbb3e33bf0683527e57bfe
-
SHA1
b918fe7c55f89360ffe7dd8545287dbde3c2607c
-
SHA256
639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b
-
SHA512
330715518f51207db3a8a90ae036cdb7d0c8e873a1c2480887c26a5ab0c6c18b111577fe2f095d9e5134fc5829c13625ceb3cd13fff310050690dc67f8d341a6
-
SSDEEP
6144:00BAcIN3u6RznWo2PX9526kR2MlNa6GO2rMRZzApr5vYqkN:FSN3u6lnWo6+6kR2MHax4R2FSX
Malware Config
Extracted
amadey
4.18
-
install_dir
154561dcbf
-
install_file
Dctooux.exe
-
strings_key
2cd47fa043c815e1a033c67832f3c6a5
-
url_paths
/j4Fvskd3/index.php
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exeDctooux.exeDctooux.exepid process 3540 Dctooux.exe 3820 Dctooux.exe 396 Dctooux.exe 4692 Dctooux.exe 3428 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3008 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 196 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 168 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 4680 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 1192 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 4052 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 4424 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 652 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 4212 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 3536 1172 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe"C:\Users\Admin\AppData\Local\Temp\639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe"1⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 6882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 7402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 8162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 8202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 8482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 7802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 10602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 10882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 11402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 12002⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeFilesize
420KB
MD58219dda07acbb3e33bf0683527e57bfe
SHA1b918fe7c55f89360ffe7dd8545287dbde3c2607c
SHA256639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b
SHA512330715518f51207db3a8a90ae036cdb7d0c8e873a1c2480887c26a5ab0c6c18b111577fe2f095d9e5134fc5829c13625ceb3cd13fff310050690dc67f8d341a6
-
memory/396-39-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/396-38-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/396-37-0x0000000000DE0000-0x0000000000EE0000-memory.dmpFilesize
1024KB
-
memory/1172-11-0x0000000002720000-0x000000000278F000-memory.dmpFilesize
444KB
-
memory/1172-8-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/1172-10-0x0000000000D50000-0x0000000000E50000-memory.dmpFilesize
1024KB
-
memory/1172-1-0x0000000000D50000-0x0000000000E50000-memory.dmpFilesize
1024KB
-
memory/1172-2-0x0000000002720000-0x000000000278F000-memory.dmpFilesize
444KB
-
memory/1172-3-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3428-61-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3428-60-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3428-59-0x0000000000B30000-0x0000000000C30000-memory.dmpFilesize
1024KB
-
memory/3540-17-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3540-16-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3540-15-0x0000000000CF0000-0x0000000000DF0000-memory.dmpFilesize
1024KB
-
memory/3820-28-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3820-27-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3820-26-0x0000000000D10000-0x0000000000E10000-memory.dmpFilesize
1024KB
-
memory/4692-48-0x0000000000D90000-0x0000000000E90000-memory.dmpFilesize
1024KB
-
memory/4692-49-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4692-50-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB