Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 08:18
Static task
static1
Behavioral task
behavioral1
Sample
a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe
Resource
win7-20240221-en
General
-
Target
a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe
-
Size
489KB
-
MD5
640b35e62443a62ba15beba6aa317500
-
SHA1
09bac93ca0e9e16cc840d22e45a7f14f54a0745c
-
SHA256
a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d
-
SHA512
0046cbe3974aa855c4746270873bb5976727f325606538f15e82c30f3a4225894840b8c2a853267780d99ecd83c5ee56120adae4d079f7683d9481a29bd6b10a
-
SSDEEP
6144:Oc0LIpbZrTSoNGAtGMbJ/Po13iKoBcymNzUEpKRzCnuzZs9rxzkETgY4Tavc:r0spbZrTJGMdkRoBjVZCnuzZs9rZTgN
Malware Config
Extracted
amadey
4.21
9a3efc
http://check-ftp.ru
-
install_dir
b9695770f1
-
install_file
Dctooux.exe
-
strings_key
1d3a0f2941c4060dba7f23a378474944
-
url_paths
/forum/index.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 Dctooux.exe -
Loads dropped DLL 2 IoCs
pid Process 1640 a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe 1640 a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2836 1640 a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe 28 PID 1640 wrote to memory of 2836 1640 a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe 28 PID 1640 wrote to memory of 2836 1640 a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe 28 PID 1640 wrote to memory of 2836 1640 a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe"C:\Users\Admin\AppData\Local\Temp\a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b9695770f1\Dctooux.exe"2⤵
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD545c5d95eea149c8491e9d1fd9b8594db
SHA1f3ba7d5fc5920c49405589ab9f7ff34752188d45
SHA256e53ec32c5a65f17aa2dbfcd26bef3f6a72da9d060a2dcfa4daaf3ed868ea5154
SHA5124436a2a318b3e4e506f609aea67aad7f6026f9434b853350ee41cf3577ed16d70b50f4e3199e6e23f3c685547845db566025ead3fb95399fa2ccb697ed629d53
-
Filesize
489KB
MD5640b35e62443a62ba15beba6aa317500
SHA109bac93ca0e9e16cc840d22e45a7f14f54a0745c
SHA256a6008984e97e2336a4a267cd3c5cce17a67468c783f8ea9134081a260a02007d
SHA5120046cbe3974aa855c4746270873bb5976727f325606538f15e82c30f3a4225894840b8c2a853267780d99ecd83c5ee56120adae4d079f7683d9481a29bd6b10a