Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-06-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe
Resource
win10v2004-20240508-en
General
-
Target
2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe
-
Size
398KB
-
MD5
efccb8ebc3cee38b7656617bd1b670ad
-
SHA1
6754e5a59ff6c2e569d61bd400e50beccc86f81b
-
SHA256
2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4
-
SHA512
6b9acfb5c7edd0dced0fc4358faa291a608ed5da1412f92b613a025ed462b9b9fb83e27d3f430f25cbf86a4d33032b573919faa8493981d2d4153fbf4ef6706e
-
SSDEEP
6144:zNyo3FETe9jaAjGExnmq15CWhFzVVB7JPueHPLEmeukdMdcH:zxFEi9jJHnmqCwF7B7dVOFH
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4060 Dctooux.exe 2612 Dctooux.exe 1044 Dctooux.exe 2268 Dctooux.exe 8 Dctooux.exe 3912 Dctooux.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4120 set thread context of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4060 set thread context of 2612 4060 Dctooux.exe 79 PID 1044 set thread context of 2268 1044 Dctooux.exe 81 PID 8 set thread context of 3912 8 Dctooux.exe 83 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 4120 wrote to memory of 1108 4120 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 77 PID 1108 wrote to memory of 4060 1108 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 78 PID 1108 wrote to memory of 4060 1108 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 78 PID 1108 wrote to memory of 4060 1108 2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe 78 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 4060 wrote to memory of 2612 4060 Dctooux.exe 79 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 1044 wrote to memory of 2268 1044 Dctooux.exe 81 PID 8 wrote to memory of 3912 8 Dctooux.exe 83 PID 8 wrote to memory of 3912 8 Dctooux.exe 83 PID 8 wrote to memory of 3912 8 Dctooux.exe 83 PID 8 wrote to memory of 3912 8 Dctooux.exe 83 PID 8 wrote to memory of 3912 8 Dctooux.exe 83 PID 8 wrote to memory of 3912 8 Dctooux.exe 83 PID 8 wrote to memory of 3912 8 Dctooux.exe 83 PID 8 wrote to memory of 3912 8 Dctooux.exe 83 PID 8 wrote to memory of 3912 8 Dctooux.exe 83 PID 8 wrote to memory of 3912 8 Dctooux.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe"C:\Users\Admin\AppData\Local\Temp\2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe"C:\Users\Admin\AppData\Local\Temp\2b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"4⤵
- Executes dropped EXE
PID:2612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe2⤵
- Executes dropped EXE
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe2⤵
- Executes dropped EXE
PID:3912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD52b46cecf0f8852ef966a58bc0a9e17e2
SHA1d02fe3d9a7be78087d2bdd0df99b020059be7236
SHA25679f7386963c690ea71a5033e12a0a212a7bd79d81d759a791e26887fc41db73b
SHA5127389ee945f5b66053b384f12a65976afa2c7a8bddeb697c86a0f1c86336110315b62be6e3d2e6bb113bf80aec1f68f3ad3ac2e6744469f1c0da405b244f5e9a0
-
Filesize
398KB
MD5efccb8ebc3cee38b7656617bd1b670ad
SHA16754e5a59ff6c2e569d61bd400e50beccc86f81b
SHA2562b8547bf6bdafef07f9624d47a541a9734c39ae4c0c2ada330031c30d39826b4
SHA5126b9acfb5c7edd0dced0fc4358faa291a608ed5da1412f92b613a025ed462b9b9fb83e27d3f430f25cbf86a4d33032b573919faa8493981d2d4153fbf4ef6706e