Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 22:54
Behavioral task
behavioral1
Sample
e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe
Resource
win7-20231129-en
General
-
Target
e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe
-
Size
422KB
-
MD5
9d4a02c07badf0c7de81bc010f5857be
-
SHA1
d5a6ee5af482315c722e2baf38cb7a48e256e0c1
-
SHA256
a7c8566bc2744a0d4bfdd643097d7dcca745a8eded3d3d0199f78b25e9aebfd8
-
SHA512
ddfc825bfa1bdea83c8b2b74a95b285a817862d513edbdf655a712b616c1194e3524f3f5b819343091162cf247064cac847dad861c388f9df3f45418d1b99924
-
SSDEEP
6144:T1hP9dWA4d2TXUPD94AfiUoMtda7Q0DeaO50fkrX6CKdCIBfi9BvLauZeQn4TF5G:T9oSUvfiR7CokrK1dC2UBjauZeQMa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 Dctooux.exe -
Loads dropped DLL 1 IoCs
pid Process 2880 e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 3008 2880 e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe 28 PID 2880 wrote to memory of 3008 2880 e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe 28 PID 2880 wrote to memory of 3008 2880 e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe 28 PID 2880 wrote to memory of 3008 2880 e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe"C:\Users\Admin\AppData\Local\Temp\e2368a816d8abee913dffad7dc4516146154705d8cdf36d4335d533a02070d3a_dump.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exe"2⤵
- Executes dropped EXE
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD50ed6ba4601afa0965e611b6bfd358a25
SHA13666ca3989a6451c7fc1934b38470f8e46679f5b
SHA256aef59a43b76ef8096c3d4a5ea8219ec62ddc1acb8bb565b654caa28683e4dd22
SHA51226e340890e3f81c8c1b3c654ec6fab5c068e0ddc384bbbfaa362ea773fc87a8e60e4e030228ff054575f2e7ab1ffa51b9cc5329b543d7e938cb6b01d94c85238
-
Filesize
422KB
MD59d4a02c07badf0c7de81bc010f5857be
SHA1d5a6ee5af482315c722e2baf38cb7a48e256e0c1
SHA256a7c8566bc2744a0d4bfdd643097d7dcca745a8eded3d3d0199f78b25e9aebfd8
SHA512ddfc825bfa1bdea83c8b2b74a95b285a817862d513edbdf655a712b616c1194e3524f3f5b819343091162cf247064cac847dad861c388f9df3f45418d1b99924