Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe
Resource
win10v2004-20240611-en
General
-
Target
29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe
-
Size
493KB
-
MD5
a5fa094e095dfb920a4220705a532a2d
-
SHA1
8941012262f65c77c0b02dd14f8e5e815d5501a2
-
SHA256
29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47
-
SHA512
20ce7a15bc21b1344692d997a2bb66ca23acefa8cba33c92ef18e62a619776c3a8ca03e94e05ee79cb20b5420c2ee1376eccf4856f4055853856ccd13bd5f336
-
SSDEEP
6144:YKFLGh6SZ6dHocboIPT8mT7yMhNnyvTBe9Gmki8xN/ew7I84Qs+Pg2X:B6kSZ627coJMvnytvVixEIb
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe -
Executes dropped EXE 3 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exepid process 4004 Dctooux.exe 756 Dctooux.exe 1764 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2624 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 2648 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 4456 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 4940 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 3984 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 5052 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 4820 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 844 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 3976 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 2584 4972 WerFault.exe 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe 4968 4004 WerFault.exe Dctooux.exe 4868 4004 WerFault.exe Dctooux.exe 1868 4004 WerFault.exe Dctooux.exe 1380 4004 WerFault.exe Dctooux.exe 2328 4004 WerFault.exe Dctooux.exe 116 4004 WerFault.exe Dctooux.exe 1200 4004 WerFault.exe Dctooux.exe 2448 4004 WerFault.exe Dctooux.exe 2376 4004 WerFault.exe Dctooux.exe 4184 4004 WerFault.exe Dctooux.exe 2660 4004 WerFault.exe Dctooux.exe 4964 4004 WerFault.exe Dctooux.exe 4768 4004 WerFault.exe Dctooux.exe 3952 4004 WerFault.exe Dctooux.exe 3012 4004 WerFault.exe Dctooux.exe 4780 4004 WerFault.exe Dctooux.exe 844 4004 WerFault.exe Dctooux.exe 688 756 WerFault.exe Dctooux.exe 4432 1764 WerFault.exe Dctooux.exe 2832 4004 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exepid process 4972 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exedescription pid process target process PID 4972 wrote to memory of 4004 4972 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe Dctooux.exe PID 4972 wrote to memory of 4004 4972 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe Dctooux.exe PID 4972 wrote to memory of 4004 4972 29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe"C:\Users\Admin\AppData\Local\Temp\29973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 7442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 9242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 9602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 11362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 11682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 12362⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 5603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 5683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 6603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 6683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 7443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 8883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 9323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 9523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 9283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 10203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 11643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 14083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 14843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 15083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 15043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 8923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 8642⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4004 -ip 40041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4004 -ip 40041⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 4482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 756 -ip 7561⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 4442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1764 -ip 17641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4004 -ip 40041⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\080292272204Filesize
77KB
MD5f2366c62604093d32a798a8692e62eec
SHA11a6077d0a089c32fe2560b7a94c6a9f03bc11a88
SHA256d1fcf3b579a5505b496f684bc890850675f128fef54c71dbd08ac022d01cc07b
SHA5128cbcbaea5c173b837eb3e5e194c17e456754a80eddd28b202b9037ebb7f5d73bccb5116145b783eec8137d8bd790deaa14c496a216a2af80795d05f9e34c8856
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeFilesize
493KB
MD5a5fa094e095dfb920a4220705a532a2d
SHA18941012262f65c77c0b02dd14f8e5e815d5501a2
SHA25629973d8dbf57f0140fa4790ebf3ef07f8abd3b87c487817475253f5349d4ee47
SHA51220ce7a15bc21b1344692d997a2bb66ca23acefa8cba33c92ef18e62a619776c3a8ca03e94e05ee79cb20b5420c2ee1376eccf4856f4055853856ccd13bd5f336
-
memory/756-43-0x0000000000400000-0x0000000002768000-memory.dmpFilesize
35.4MB
-
memory/1764-52-0x0000000000400000-0x0000000002768000-memory.dmpFilesize
35.4MB
-
memory/4004-25-0x0000000000400000-0x0000000002768000-memory.dmpFilesize
35.4MB
-
memory/4004-17-0x0000000000400000-0x0000000002768000-memory.dmpFilesize
35.4MB
-
memory/4004-16-0x0000000000400000-0x0000000002768000-memory.dmpFilesize
35.4MB
-
memory/4004-37-0x0000000000400000-0x0000000002768000-memory.dmpFilesize
35.4MB
-
memory/4972-20-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4972-19-0x00000000043A0000-0x000000000440F000-memory.dmpFilesize
444KB
-
memory/4972-18-0x0000000000400000-0x0000000002768000-memory.dmpFilesize
35.4MB
-
memory/4972-1-0x00000000027F0000-0x00000000028F0000-memory.dmpFilesize
1024KB
-
memory/4972-3-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4972-2-0x00000000043A0000-0x000000000440F000-memory.dmpFilesize
444KB