Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
fb9187c149528468a82c95ce22cdcc89.exe
Resource
win7-20231129-en
General
-
Target
fb9187c149528468a82c95ce22cdcc89.exe
-
Size
394KB
-
MD5
fb9187c149528468a82c95ce22cdcc89
-
SHA1
1b119e90d3c281357fcaa57a48ae62498b423a45
-
SHA256
6ea1b7fc2afd69e401cf82a20c32a800a18bcfd16f29926d6660df7c271fdff4
-
SHA512
a89f27c6510046aa3dc88b2a0268077a060c7bf04cac0e49c6666144d8d861067ff33bd5142896a9fd8ec5669271db7c9e78db91b4eb123b73edc184a6cc50be
-
SSDEEP
6144:ulue+pRC5/Stc0+f7W0Q+3ag8s07pHepb9RiPY0BBrz+wyjTxxsDhkfC9JkCyuT:RjpRCprlQ+qqpbbig0nv+wc/GWW
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 Dctooux.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 fb9187c149528468a82c95ce22cdcc89.exe 1988 fb9187c149528468a82c95ce22cdcc89.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job fb9187c149528468a82c95ce22cdcc89.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 fb9187c149528468a82c95ce22cdcc89.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3008 1988 fb9187c149528468a82c95ce22cdcc89.exe 28 PID 1988 wrote to memory of 3008 1988 fb9187c149528468a82c95ce22cdcc89.exe 28 PID 1988 wrote to memory of 3008 1988 fb9187c149528468a82c95ce22cdcc89.exe 28 PID 1988 wrote to memory of 3008 1988 fb9187c149528468a82c95ce22cdcc89.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb9187c149528468a82c95ce22cdcc89.exe"C:\Users\Admin\AppData\Local\Temp\fb9187c149528468a82c95ce22cdcc89.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5c4526a5e6cc6bbc4f78a9396c1d6e3d3
SHA1090bf5b37365980497542a4313c4bff598d8804e
SHA256b4ae2573706e85eb9766957f568808cf885328cab164ec22040e1a17e938bd73
SHA51247e7225a61e6d2e62ad07b5c5a608f5198871c803498be67dcd621b3d35e438c569a1c9f49c8b44a3fa83f141ba4eebba0d01b224822b5235d48f6ecd011deec
-
Filesize
153B
MD5d47b646093dd84d34885a714ce4bd74e
SHA1c4df23671b6440e29159093dc52cb8c4aa184597
SHA2566807c84bf35d67496e020c1528303b87d4759933c09817e514a7159ac689d352
SHA512906fb89d5ec9dc4338f9d5e26fdc9ccc041225157a8f114465449106128d69e9fbc7723b2bcdd56a17c74c29983f7126a1d970b24e3902a3c4e817834f21f338
-
Filesize
394KB
MD5fb9187c149528468a82c95ce22cdcc89
SHA11b119e90d3c281357fcaa57a48ae62498b423a45
SHA2566ea1b7fc2afd69e401cf82a20c32a800a18bcfd16f29926d6660df7c271fdff4
SHA512a89f27c6510046aa3dc88b2a0268077a060c7bf04cac0e49c6666144d8d861067ff33bd5142896a9fd8ec5669271db7c9e78db91b4eb123b73edc184a6cc50be