Overview
overview
10Static
static
10Small Malw...un.exe
windows10-2004-x64
10Small Malw...ld.exe
windows10-2004-x64
5Small Malw...it.exe
windows10-2004-x64
10Small Malw...23.exe
windows10-2004-x64
10Small Malw...pd.exe
windows10-2004-x64
10Small Malw...23.exe
windows10-2004-x64
5Small Malw...c4.exe
windows10-2004-x64
10Small Malw...a2.exe
windows10-2004-x64
10Small Malw...wd.exe
windows10-2004-x64
10Small Malw...ac.exe
windows10-2004-x64
7Small Malw...64.exe
windows10-2004-x64
8Small Malw...ng.exe
windows10-2004-x64
10Small Malw...tu.exe
windows10-2004-x64
10Small Malw...ux.exe
windows10-2004-x64
10Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 22:15
Behavioral task
behavioral1
Sample
Small Malwares/1000002001/file300un.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Small Malwares/1000004001/gold.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Small Malwares/1000005001/judit.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Small Malwares/1000007001/redline123123.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Small Malwares/1000008001/upd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
Small Malwares/1000009001/lumma123.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Small Malwares/1000011002/3a45e77bc4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
Small Malwares/1000012001/c9f61fb9a2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Small Malwares/1000012001/lrthijawd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
Small Malwares/1000013001/8f8936a9ac.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Small Malwares/1000014001/services64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
Small Malwares/8254624243/axplong.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
Small Malwares/9217037dc9/explortu.exe
Resource
win10v2004-20240508-en
General
-
Target
Small Malwares/b9695770f1/Dctooux.exe
-
Size
493KB
-
MD5
b7a26c9dadcbae2e051249a60f140d13
-
SHA1
a182b26486812a906c2ffa378a80757ed80eee31
-
SHA256
962cca9204f7efb95be4e5527de264977482414640bb5e8b56113036fe280460
-
SHA512
b65e4187178031e705f2cf9a64a248331b4ad491549fd7ed82b521c9d4421eb9b7a85b486d633681a76f830db5a79177daee15efd59f0c0efe311337343781a2
-
SSDEEP
6144:if0tTd7LNEY+uVKBt2vZuRS+4nBDfKxc+rWC8+LtmImC8BG0qEjWYkH1WT/:iCTd/Nz+usBshu74lfH+yCrC97xkg
Malware Config
Extracted
amadey
4.21
9a3efc
http://check-ftp.ru
-
install_dir
b9695770f1
-
install_file
Dctooux.exe
-
strings_key
1d3a0f2941c4060dba7f23a378474944
-
url_paths
/forum/index.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Dctooux.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Dctooux.exe -
Executes dropped EXE 2 IoCs
Processes:
Dctooux.exeDctooux.exepid process 1228 Dctooux.exe 3180 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
Dctooux.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job Dctooux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4816 1480 WerFault.exe Dctooux.exe 3184 1480 WerFault.exe Dctooux.exe 2468 1480 WerFault.exe Dctooux.exe 4704 1480 WerFault.exe Dctooux.exe 3816 1480 WerFault.exe Dctooux.exe 1488 1480 WerFault.exe Dctooux.exe 4868 1480 WerFault.exe Dctooux.exe 3904 1480 WerFault.exe Dctooux.exe 4484 1480 WerFault.exe Dctooux.exe 4476 1480 WerFault.exe Dctooux.exe 3344 1480 WerFault.exe Dctooux.exe 888 1480 WerFault.exe Dctooux.exe 1820 1480 WerFault.exe Dctooux.exe 208 1228 WerFault.exe Dctooux.exe 4808 1228 WerFault.exe Dctooux.exe 3152 1228 WerFault.exe Dctooux.exe 4836 1228 WerFault.exe Dctooux.exe 3912 1228 WerFault.exe Dctooux.exe 648 1228 WerFault.exe Dctooux.exe 4664 1228 WerFault.exe Dctooux.exe 2148 1228 WerFault.exe Dctooux.exe 3956 1228 WerFault.exe Dctooux.exe 5100 1228 WerFault.exe Dctooux.exe 1404 1228 WerFault.exe Dctooux.exe 2476 1228 WerFault.exe Dctooux.exe 2364 1228 WerFault.exe Dctooux.exe 448 1228 WerFault.exe Dctooux.exe 5076 1228 WerFault.exe Dctooux.exe 4420 1228 WerFault.exe Dctooux.exe 3840 3180 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Dctooux.exepid process 1480 Dctooux.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Dctooux.exedescription pid process target process PID 1480 wrote to memory of 1228 1480 Dctooux.exe Dctooux.exe PID 1480 wrote to memory of 1228 1480 Dctooux.exe Dctooux.exe PID 1480 wrote to memory of 1228 1480 Dctooux.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Small Malwares\b9695770f1\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\Small Malwares\b9695770f1\Dctooux.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 7602⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 8082⤵
- Program crash
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 8642⤵
- Program crash
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 8722⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 8842⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 9362⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 11402⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 12002⤵
- Program crash
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 12562⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 10762⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 8122⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 8802⤵
- Program crash
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe"2⤵
- Executes dropped EXE
PID:1228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 5603⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 6003⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 6203⤵
- Program crash
PID:3152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 5923⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 7163⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 7483⤵
- Program crash
PID:648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 7483⤵
- Program crash
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 8923⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 9523⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 7203⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 10163⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 10203⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 14043⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 14203⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 14403⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 14563⤵
- Program crash
PID:4420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 10682⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1480 -ip 14801⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1480 -ip 14801⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1480 -ip 14801⤵PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1480 -ip 14801⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1480 -ip 14801⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1480 -ip 14801⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1480 -ip 14801⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1480 -ip 14801⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1480 -ip 14801⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1480 -ip 14801⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1480 -ip 14801⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1480 -ip 14801⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1480 -ip 14801⤵PID:3180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1228 -ip 12281⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1228 -ip 12281⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1228 -ip 12281⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1228 -ip 12281⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1228 -ip 12281⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1228 -ip 12281⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1228 -ip 12281⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1228 -ip 12281⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1228 -ip 12281⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1228 -ip 12281⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 1228 -ip 12281⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1228 -ip 12281⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1228 -ip 12281⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1228 -ip 12281⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1228 -ip 12281⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1228 -ip 12281⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe1⤵
- Executes dropped EXE
PID:3180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 4522⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3180 -ip 31801⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5b5fbb36d66e9d9446b9be304ce5508b8
SHA16b08db4d0c9c759d49cef7543d096e1309299e0f
SHA2564bd84ad4da4cdf85ea6536f6bb4959c9b959b11ffb5dd1255b61cd1856bb4691
SHA512364516d419a77092f3a4580490a0d1aa7dd256dd7d878046124de831c00263d5474c617b47d831c56be589b1e3e96c9f02cdd5605e55e04ca8d3c00202679e48
-
Filesize
493KB
MD5b7a26c9dadcbae2e051249a60f140d13
SHA1a182b26486812a906c2ffa378a80757ed80eee31
SHA256962cca9204f7efb95be4e5527de264977482414640bb5e8b56113036fe280460
SHA512b65e4187178031e705f2cf9a64a248331b4ad491549fd7ed82b521c9d4421eb9b7a85b486d633681a76f830db5a79177daee15efd59f0c0efe311337343781a2