Analysis
-
max time kernel
292s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
29-03-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe
Resource
win7-20240221-en
General
-
Target
639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe
-
Size
420KB
-
MD5
8219dda07acbb3e33bf0683527e57bfe
-
SHA1
b918fe7c55f89360ffe7dd8545287dbde3c2607c
-
SHA256
639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b
-
SHA512
330715518f51207db3a8a90ae036cdb7d0c8e873a1c2480887c26a5ab0c6c18b111577fe2f095d9e5134fc5829c13625ceb3cd13fff310050690dc67f8d341a6
-
SSDEEP
6144:00BAcIN3u6RznWo2PX9526kR2MlNa6GO2rMRZzApr5vYqkN:FSN3u6lnWo6+6kR2MHax4R2FSX
Malware Config
Extracted
amadey
4.18
-
install_dir
154561dcbf
-
install_file
Dctooux.exe
-
strings_key
2cd47fa043c815e1a033c67832f3c6a5
-
url_paths
/j4Fvskd3/index.php
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exeDctooux.exeDctooux.exepid process 4600 Dctooux.exe 1096 Dctooux.exe 3280 Dctooux.exe 3688 Dctooux.exe 4232 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1476 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 2412 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 1460 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 1564 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 3248 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 2176 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 1776 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 2112 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 1724 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 2272 916 WerFault.exe 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe 644 3280 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exepid process 916 639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe"C:\Users\Admin\AppData\Local\Temp\639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 6882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 7402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 8122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 8602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 8642⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 8922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 10602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 10882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 11402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 12162⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 5082⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\154561dcbf\Dctooux.exeFilesize
420KB
MD58219dda07acbb3e33bf0683527e57bfe
SHA1b918fe7c55f89360ffe7dd8545287dbde3c2607c
SHA256639d94ee512db05588f1964308d82adc6f62b27565ec5561f9d1e609ba58899b
SHA512330715518f51207db3a8a90ae036cdb7d0c8e873a1c2480887c26a5ab0c6c18b111577fe2f095d9e5134fc5829c13625ceb3cd13fff310050690dc67f8d341a6
-
memory/916-16-0x0000000000C00000-0x0000000000D00000-memory.dmpFilesize
1024KB
-
memory/916-2-0x0000000002700000-0x000000000276F000-memory.dmpFilesize
444KB
-
memory/916-3-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/916-8-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/916-1-0x0000000000C00000-0x0000000000D00000-memory.dmpFilesize
1024KB
-
memory/1096-27-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/1096-26-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/1096-25-0x0000000000D00000-0x0000000000E00000-memory.dmpFilesize
1024KB
-
memory/3280-38-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3280-36-0x0000000000C50000-0x0000000000D50000-memory.dmpFilesize
1024KB
-
memory/3280-37-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3688-47-0x0000000000C20000-0x0000000000D20000-memory.dmpFilesize
1024KB
-
memory/3688-48-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/3688-49-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4232-58-0x0000000000CB0000-0x0000000000DB0000-memory.dmpFilesize
1024KB
-
memory/4232-59-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4232-60-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4600-15-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4600-14-0x0000000000400000-0x0000000000B12000-memory.dmpFilesize
7.1MB
-
memory/4600-12-0x0000000000EA0000-0x0000000000FA0000-memory.dmpFilesize
1024KB
-
memory/4600-13-0x0000000002740000-0x00000000027AF000-memory.dmpFilesize
444KB