Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe
Resource
win7-20240221-en
General
-
Target
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe
-
Size
420KB
-
MD5
7b432411c12d3d0d31ecaf9011450e42
-
SHA1
968943d42ba1e8938989b6ed1884195c2285396f
-
SHA256
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348
-
SHA512
6881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b
-
SSDEEP
6144:lfBwgfV+aXoGJR1xpppStlxu4qGilNZZDLxFLWj4+36o9:l3V+anFxZUq1NZJ9N8qu
Malware Config
Extracted
amadey
4.18
-
install_dir
154561dcbf
-
install_file
Dctooux.exe
-
strings_key
2cd47fa043c815e1a033c67832f3c6a5
-
url_paths
/j4Fvskd3/index.php
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Dctooux.exepid process 2600 Dctooux.exe -
Loads dropped DLL 2 IoCs
Processes:
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exepid process 2684 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe 2684 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe -
Drops file in Windows directory 1 IoCs
Processes:
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exepid process 2684 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exedescription pid process target process PID 2684 wrote to memory of 2600 2684 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe Dctooux.exe PID 2684 wrote to memory of 2600 2684 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe Dctooux.exe PID 2684 wrote to memory of 2600 2684 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe Dctooux.exe PID 2684 wrote to memory of 2600 2684 3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe"C:\Users\Admin\AppData\Local\Temp\3fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeFilesize
420KB
MD57b432411c12d3d0d31ecaf9011450e42
SHA1968943d42ba1e8938989b6ed1884195c2285396f
SHA2563fa8f8c64210e0949184380e438a86e4d8e597c7b63cd8591232083b97fa5348
SHA5126881c00ec9674a90b6390e18bcff67d0a5c837411f83955869a9cb2b62bccdedbc93561e70f6ddab7baaf908c8154de3a5bb982d0ee9ecc62363cc67d9cf563b
-
memory/2600-18-0x0000000000CA0000-0x0000000000DA0000-memory.dmpFilesize
1024KB
-
memory/2600-22-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/2600-23-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/2684-1-0x0000000000C40000-0x0000000000D40000-memory.dmpFilesize
1024KB
-
memory/2684-2-0x0000000000220000-0x000000000028F000-memory.dmpFilesize
444KB
-
memory/2684-3-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/2684-5-0x0000000002D00000-0x0000000002D01000-memory.dmpFilesize
4KB
-
memory/2684-19-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/2684-20-0x0000000000220000-0x000000000028F000-memory.dmpFilesize
444KB
-
memory/2684-21-0x0000000000C40000-0x0000000000D40000-memory.dmpFilesize
1024KB