Malware Analysis Report

2024-09-11 14:25

Sample ID 240616-145w6avblk
Target ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8
SHA256 ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8
Tags
amadey 8fc809 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8

Threat Level: Known bad

The file ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8 was found to be: Known bad.

Malicious Activity Summary

amadey 8fc809 trojan

Amadey

Checks computer location settings

Executes dropped EXE

Suspicious use of SetThreadContext

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-16 22:13

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 22:13

Reported

2024-06-16 22:15

Platform

win10v2004-20240611-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe"

Signatures

Amadey

trojan amadey

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2884 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 2144 wrote to memory of 4696 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2144 wrote to memory of 4696 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2144 wrote to memory of 4696 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4696 wrote to memory of 4180 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2332 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 2292 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe

"C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe"

C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe

"C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
BE 88.221.83.224:443 www.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 224.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 selltix.org udp
MD 188.237.2.116:80 selltix.org tcp
MD 188.237.2.116:80 selltix.org tcp
MD 188.237.2.116:80 selltix.org tcp
US 8.8.8.8:53 116.2.237.188.in-addr.arpa udp
MD 188.237.2.116:80 selltix.org tcp
MD 188.237.2.116:80 selltix.org tcp
MD 188.237.2.116:80 selltix.org tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
MD 188.237.2.116:80 selltix.org tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
MD 188.237.2.116:80 selltix.org tcp
MD 188.237.2.116:80 selltix.org tcp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 nudump.com udp
US 8.8.8.8:53 171.117.168.52.in-addr.arpa udp

Files

memory/2884-1-0x0000000002640000-0x0000000002740000-memory.dmp

memory/2884-2-0x0000000003FE0000-0x000000000404F000-memory.dmp

memory/2144-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2144-4-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2144-5-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2144-6-0x0000000000400000-0x0000000000472000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 7e21139b2ee068b54e0a8c8a2ae2da55
SHA1 44519c4665d33143a19100cf9e2884a5d8c5677f
SHA256 ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8
SHA512 b158bce9c6ff838f75bc515b9d6f3d4f953d293179cfd3c52c7b9b0bfa36499e22b1d87bd0694628fd0545809154f52fdd764b1a61c0caf9677644d8d2ca4285

memory/2144-20-0x0000000000400000-0x0000000000472000-memory.dmp

memory/4180-24-0x0000000000400000-0x0000000000472000-memory.dmp

memory/4180-25-0x0000000000400000-0x0000000000472000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\204450073126

MD5 2fd22a19e9418dfaac9a94535d7ae2d5
SHA1 9df9fd7a99dd930f538a5d646368f3fefd6f83fe
SHA256 77f30d19205c6c6505c3813ffc3589352e21e73eca9ca817ab05cef7879e7e82
SHA512 f6ee6fda31d6f28f924eb735c79e645cbbca4145dff76c1cb1fc0920ce32795ee30c21bdb2a4c7ad6c0385371c9c7835bef5628f407913fc969bf9f8a05b340e

memory/4180-45-0x0000000000400000-0x0000000000472000-memory.dmp

memory/4180-46-0x0000000000400000-0x0000000000472000-memory.dmp

memory/4508-53-0x0000000000400000-0x0000000000472000-memory.dmp

memory/4508-54-0x0000000000400000-0x0000000000472000-memory.dmp

memory/4860-66-0x0000000000400000-0x0000000000472000-memory.dmp

memory/4860-67-0x0000000000400000-0x0000000000472000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 22:13

Reported

2024-06-16 22:15

Platform

win11-20240611-en

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe"

Signatures

Amadey

trojan amadey

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 5024 wrote to memory of 708 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
PID 708 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 708 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 708 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4888 wrote to memory of 3184 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4748 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe
PID 4664 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe

"C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe"

C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe

"C:\Users\Admin\AppData\Local\Temp\ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 selltix.org udp
US 8.8.8.8:53 otyt.ru udp
US 8.8.8.8:53 nudump.com udp
ET 196.188.120.80:80 selltix.org tcp
ET 196.188.120.80:80 selltix.org tcp
ET 196.188.120.80:80 selltix.org tcp
AU 40.79.173.41:443 tcp
ET 196.188.120.80:80 selltix.org tcp
ET 196.188.120.80:80 selltix.org tcp
ET 196.188.120.80:80 selltix.org tcp

Files

memory/5024-1-0x0000000002650000-0x0000000002750000-memory.dmp

memory/5024-2-0x00000000040F0000-0x000000000415F000-memory.dmp

memory/708-3-0x0000000000400000-0x0000000000472000-memory.dmp

memory/708-4-0x0000000000400000-0x0000000000472000-memory.dmp

memory/708-5-0x0000000000400000-0x0000000000472000-memory.dmp

memory/708-6-0x0000000000400000-0x0000000000472000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe

MD5 7e21139b2ee068b54e0a8c8a2ae2da55
SHA1 44519c4665d33143a19100cf9e2884a5d8c5677f
SHA256 ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8
SHA512 b158bce9c6ff838f75bc515b9d6f3d4f953d293179cfd3c52c7b9b0bfa36499e22b1d87bd0694628fd0545809154f52fdd764b1a61c0caf9677644d8d2ca4285

memory/708-20-0x0000000000400000-0x0000000000472000-memory.dmp

memory/3184-24-0x0000000000400000-0x0000000000472000-memory.dmp

memory/3184-25-0x0000000000400000-0x0000000000472000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\524922173293

MD5 da6e020c0fce571b37793a1d192af120
SHA1 5e2cf7e144c4944a2f087f5da2a80097daf2ca4a
SHA256 0b54abed231df3c038e6252c63207e421b00216af0aeb930bfc8690f64c26dfe
SHA512 c1b6c41595f378ae81caa43725f61dfc6481efdba6c32142ba07cfea105c4b250d074cf3f962243a44a04163eb424a0cd3f1d3f07eb005060271efcab226ce1e

memory/3184-45-0x0000000000400000-0x0000000000472000-memory.dmp

memory/3184-46-0x0000000000400000-0x0000000000472000-memory.dmp

memory/3632-53-0x0000000000400000-0x0000000000472000-memory.dmp

memory/3632-54-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2248-66-0x0000000000400000-0x0000000000472000-memory.dmp

memory/2248-67-0x0000000000400000-0x0000000000472000-memory.dmp