Analysis
-
max time kernel
149s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe
Resource
win7-20240220-en
General
-
Target
827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe
-
Size
486KB
-
MD5
a301fc20b8e6b07d0ddb6909e3169b93
-
SHA1
d69d2f49fb497a9b7afb23e1b57b73f8967923c3
-
SHA256
827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49
-
SHA512
37e31daf432bad8e6b1455f6deba7cfbf44b646cf2f95ddf58e20abfb2f31ed9839cc959546dbef60613244c92b106ee0f532f360686273e0fbdfde2d9790924
-
SSDEEP
12288:6i6Q52wyGleITJYOlKO98B8CF6Yi3U1sSK:63G2wyHsCE8R6YZ1sS
Malware Config
Extracted
amadey
4.21
9a3efc
http://check-ftp.ru
-
install_dir
b9695770f1
-
install_file
Dctooux.exe
-
strings_key
1d3a0f2941c4060dba7f23a378474944
-
url_paths
/forum/index.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe -
Executes dropped EXE 3 IoCs
pid Process 4064 Dctooux.exe 2120 Dctooux.exe 1564 Dctooux.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job 827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
pid pid_target Process procid_target 2444 868 WerFault.exe 81 4080 868 WerFault.exe 81 1116 868 WerFault.exe 81 3600 868 WerFault.exe 81 4820 868 WerFault.exe 81 1576 868 WerFault.exe 81 1196 868 WerFault.exe 81 4076 868 WerFault.exe 81 1812 868 WerFault.exe 81 3556 868 WerFault.exe 81 5020 4064 WerFault.exe 108 4104 4064 WerFault.exe 108 2524 4064 WerFault.exe 108 4172 4064 WerFault.exe 108 2300 4064 WerFault.exe 108 3552 4064 WerFault.exe 108 412 4064 WerFault.exe 108 4636 4064 WerFault.exe 108 4596 4064 WerFault.exe 108 2988 4064 WerFault.exe 108 3344 4064 WerFault.exe 108 704 4064 WerFault.exe 108 2592 4064 WerFault.exe 108 2612 4064 WerFault.exe 108 4776 4064 WerFault.exe 108 3040 2120 WerFault.exe 145 4596 1564 WerFault.exe 148 3920 4064 WerFault.exe 108 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 868 827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 868 wrote to memory of 4064 868 827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe 108 PID 868 wrote to memory of 4064 868 827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe 108 PID 868 wrote to memory of 4064 868 827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe"C:\Users\Admin\AppData\Local\Temp\827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 7482⤵
- Program crash
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 8042⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 8202⤵
- Program crash
PID:1116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 9082⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 9322⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 8322⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 11442⤵
- Program crash
PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 12322⤵
- Program crash
PID:4076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 12962⤵
- Program crash
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe"2⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 5603⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 6003⤵
- Program crash
PID:4104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 6243⤵
- Program crash
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 6643⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 7203⤵
- Program crash
PID:2300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 8883⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 9083⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 9323⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 7363⤵
- Program crash
PID:4596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 9163⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 10363⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 11603⤵
- Program crash
PID:704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 13723⤵
- Program crash
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 14243⤵
- Program crash
PID:2612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 14363⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 8923⤵
- Program crash
PID:3920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 14922⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 868 -ip 8681⤵PID:540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 868 -ip 8681⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 868 -ip 8681⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 868 -ip 8681⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 868 -ip 8681⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 868 -ip 8681⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 868 -ip 8681⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 868 -ip 8681⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 868 -ip 8681⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 868 -ip 8681⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4064 -ip 40641⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4064 -ip 40641⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4064 -ip 40641⤵PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4064 -ip 40641⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4064 -ip 40641⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4064 -ip 40641⤵PID:4112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4064 -ip 40641⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4064 -ip 40641⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4064 -ip 40641⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4064 -ip 40641⤵PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4064 -ip 40641⤵PID:3268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4064 -ip 40641⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4064 -ip 40641⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4064 -ip 40641⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4064 -ip 40641⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe1⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 4482⤵
- Program crash
PID:3040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2120 -ip 21201⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe1⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 4442⤵
- Program crash
PID:4596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 1564 -ip 15641⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4064 -ip 40641⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD59d884cd5b6ac3f356790545c830d82fb
SHA17741e72614e4f3b245b824710b37f4b0c03f1480
SHA256550bdbbdf14441e8867ba4f19e896f81599c72d9d9830c1584ad601ba1df768f
SHA512407772bf7954d50808bf53beba02df30850881fface8355753544579d6417567e128adf941ea7ae9bdf2aec192f134403252325fa829c1102320c82d33f99cf0
-
Filesize
192KB
MD5f9a97381b1b5ba0c17db9630133dfb76
SHA1d9b741b642c17e1a06a326ca7fa03b1818309948
SHA2567fc7db121088920a52c655164b52b14c96d87f3a0487f7c87b1e7e93780ffba4
SHA512f8795b85ce135db33bd3e2842cc8499d889a114e6bdd1cc9742ceddf4e4e887974f3ae6413ee9cda37477df5196a5cba5a242167a6921567e1e845b59f22cb36
-
Filesize
448KB
MD5b41caa84b9fd732fda19634bba3ede3d
SHA155cb6ffc5708da4ffb9700a02dd4d43960b6c13d
SHA256876edfb20e3d3a0bb7b2aefd8abda077fe0d10b523fe477b310de4ec3f3056fb
SHA5120c6a40439a8853e1e718d80802525d261ffd6711bff30efbfa496100632fe10fadc11bdcb8537aa0bf28bcbb2ae039276deceb22946be21fba4fefb2beda26a6
-
Filesize
486KB
MD5a301fc20b8e6b07d0ddb6909e3169b93
SHA1d69d2f49fb497a9b7afb23e1b57b73f8967923c3
SHA256827052af840de6cb2310b29985b84428828a8d2aebb4bd76c23395fc7fefec49
SHA51237e31daf432bad8e6b1455f6deba7cfbf44b646cf2f95ddf58e20abfb2f31ed9839cc959546dbef60613244c92b106ee0f532f360686273e0fbdfde2d9790924