Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe
Resource
win7-20240221-en
General
-
Target
d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe
-
Size
370KB
-
MD5
1f68fe6fc999460d808a243a15232611
-
SHA1
2c5b12ad940e1772b001d85b77c5b86f84b9eb03
-
SHA256
d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719
-
SHA512
e5faf7c55297860b5304699e304b5ebe8527f73bf2b7f71d30111712df6eec50e9f38b2930f87c14c762b2143d74ff7ce71953ce261c93a6857193389f8c278f
-
SSDEEP
6144:4iHP5o9P45e/kejyjel3IUIBaouNfiAtC+Qgm7f1vOFqx:4aP5yZDjQgIUIBaoQfieQg61mFqx
Malware Config
Extracted
amadey
4.21
667bac
http://94.156.68.141
-
install_dir
716b9e4c6b
-
install_file
Dctooux.exe
-
strings_key
8e31b2add27c52b4aedc47b90f997046
-
url_paths
/h9fmdW5/index.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe -
Executes dropped EXE 4 IoCs
pid Process 4008 Dctooux.exe 3716 Dctooux.exe 3940 Dctooux.exe 3992 Dctooux.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 25 IoCs
pid pid_target Process procid_target 4732 4160 WerFault.exe 81 232 4160 WerFault.exe 81 1428 4160 WerFault.exe 81 4132 4160 WerFault.exe 81 4516 4160 WerFault.exe 81 3016 4160 WerFault.exe 81 1400 4160 WerFault.exe 81 2920 4160 WerFault.exe 81 4672 4160 WerFault.exe 81 4304 4160 WerFault.exe 81 4408 4160 WerFault.exe 81 2692 4008 WerFault.exe 113 3200 4008 WerFault.exe 113 396 4008 WerFault.exe 113 4312 4008 WerFault.exe 113 4876 4008 WerFault.exe 113 2620 4008 WerFault.exe 113 1712 4008 WerFault.exe 113 3476 4008 WerFault.exe 113 4172 4008 WerFault.exe 113 436 4008 WerFault.exe 113 212 4008 WerFault.exe 113 3700 3716 WerFault.exe 143 2624 3940 WerFault.exe 149 624 4008 WerFault.exe 113 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4160 d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4008 4160 d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe 113 PID 4160 wrote to memory of 4008 4160 d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe 113 PID 4160 wrote to memory of 4008 4160 d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe"C:\Users\Admin\AppData\Local\Temp\d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 7562⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8002⤵
- Program crash
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8562⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 9322⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 9682⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 9282⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11082⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11082⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11202⤵
- Program crash
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exe"2⤵
- Executes dropped EXE
PID:4008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 5483⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 5683⤵
- Program crash
PID:3200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 6203⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 8403⤵
- Program crash
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 8883⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 9083⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 9083⤵
- Program crash
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 9523⤵
- Program crash
PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 9443⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 11323⤵
- Program crash
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 13243⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 8923⤵
- Program crash
PID:624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 9042⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 13322⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4160 -ip 41601⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4160 -ip 41601⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4160 -ip 41601⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4160 -ip 41601⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4160 -ip 41601⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4160 -ip 41601⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4160 -ip 41601⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4160 -ip 41601⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4160 -ip 41601⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4160 -ip 41601⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4160 -ip 41601⤵PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4008 -ip 40081⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4008 -ip 40081⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4008 -ip 40081⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4008 -ip 40081⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4008 -ip 40081⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4008 -ip 40081⤵PID:884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4008 -ip 40081⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4008 -ip 40081⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4008 -ip 40081⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4008 -ip 40081⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4008 -ip 40081⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exe1⤵
- Executes dropped EXE
PID:3716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 4482⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3716 -ip 37161⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exe1⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 4402⤵
- Program crash
PID:2624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3940 -ip 39401⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4008 -ip 40081⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\716b9e4c6b\Dctooux.exe1⤵
- Executes dropped EXE
PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD51f68fe6fc999460d808a243a15232611
SHA12c5b12ad940e1772b001d85b77c5b86f84b9eb03
SHA256d10fd57ed5550212a4bfbb65732c489479c49c888737d3dc818290189fc2e719
SHA512e5faf7c55297860b5304699e304b5ebe8527f73bf2b7f71d30111712df6eec50e9f38b2930f87c14c762b2143d74ff7ce71953ce261c93a6857193389f8c278f
-
Filesize
78KB
MD53bc4112b87a601950f9df448d8b6e20c
SHA15e2902d6a47bc99bca9fb5579df84c3ec807394d
SHA2565a95b8cfbd2027d688454b49b27e18997037813687a504a9980292529626abfc
SHA512d4eb9e7f174377b19d9d4fae2539305f3119a6f548db6dd44b511a3bafc7e9078084fe5dd79a5bc9a54cc1028261516a432ad73add1b6946fb4b47b2312b6f0f