Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-06-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe
Resource
win10v2004-20240508-en
General
-
Target
dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe
-
Size
406KB
-
MD5
264bff6ce8a5df06c5a6fbe486a8ad1d
-
SHA1
eabf6024e86ffe5ca8433b24a1fdd464dcf37821
-
SHA256
dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10
-
SHA512
0e9a4ebfb6b236cafa0b01aa91f5067f2f52c0f64bc94d8d386955ea4209f6ce711f1a6410b11d9766ffe311a742e2ba02f119fbf65610f6c8dc67b6abd296ea
-
SSDEEP
6144:ErX9Fb/Z/e+VWVzV/aogart1sxLI21r44Isc04auxxO7lli1OvKOOO/:MNuv/aolCIaZIRglKOdO0
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exepid process 4872 Dctooux.exe 3580 Dctooux.exe 3540 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 360 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 2312 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 1844 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 4928 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 3348 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 1260 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 3332 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 4584 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 4516 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 1968 3808 WerFault.exe dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe 2296 4872 WerFault.exe Dctooux.exe 1964 4872 WerFault.exe Dctooux.exe 1496 4872 WerFault.exe Dctooux.exe 3172 4872 WerFault.exe Dctooux.exe 1864 4872 WerFault.exe Dctooux.exe 4968 4872 WerFault.exe Dctooux.exe 1984 4872 WerFault.exe Dctooux.exe 484 4872 WerFault.exe Dctooux.exe 4936 4872 WerFault.exe Dctooux.exe 3824 4872 WerFault.exe Dctooux.exe 1988 4872 WerFault.exe Dctooux.exe 4608 4872 WerFault.exe Dctooux.exe 2728 4872 WerFault.exe Dctooux.exe 1668 4872 WerFault.exe Dctooux.exe 1312 4872 WerFault.exe Dctooux.exe 5092 4872 WerFault.exe Dctooux.exe 3528 4872 WerFault.exe Dctooux.exe 2420 3580 WerFault.exe Dctooux.exe 2972 3540 WerFault.exe Dctooux.exe 4980 4872 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exepid process 3808 dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exedescription pid process target process PID 3808 wrote to memory of 4872 3808 dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe Dctooux.exe PID 3808 wrote to memory of 4872 3808 dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe Dctooux.exe PID 3808 wrote to memory of 4872 3808 dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe"C:\Users\Admin\AppData\Local\Temp\dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 7762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 7882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 8762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 9482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 8762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 9482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 10122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 10122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 11322⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 5883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 5963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 6163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 5883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 7043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 7323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 9003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 9323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 9523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 6283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 7363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 10683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 10723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 14523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 14243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 14403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 15283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 15643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 11802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4872 -ip 48721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4872 -ip 48721⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 4722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3580 -ip 35801⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 4882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3540 -ip 35401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4872 -ip 48721⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\474490143322Filesize
78KB
MD570689d5bce5d5bccfce2e9d2efddf3a5
SHA14e0abc9b3d0f28263ec78c06c8604290a762a276
SHA256fe07e22ef97b78ee0f94edce2b21c9e0629500b960ffd2b08b7850b28579fe74
SHA5120f3a6f1ffd85e0faf60d1cd394e59dd3baac77f3e6d8fe4904c84e280758346423797ae90ef0ce2893bae0bf6d047b3b84d9ea5eef7243677e41363351b40cd1
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeFilesize
406KB
MD5264bff6ce8a5df06c5a6fbe486a8ad1d
SHA1eabf6024e86ffe5ca8433b24a1fdd464dcf37821
SHA256dcc79633a8bcb5bfdf3b24c17791ad83091d3696b05e44eccf124a6d87dbfd10
SHA5120e9a4ebfb6b236cafa0b01aa91f5067f2f52c0f64bc94d8d386955ea4209f6ce711f1a6410b11d9766ffe311a742e2ba02f119fbf65610f6c8dc67b6abd296ea
-
memory/3540-52-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3580-42-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3580-43-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3808-1-0x0000000000500000-0x0000000000600000-memory.dmpFilesize
1024KB
-
memory/3808-17-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3808-16-0x0000000002180000-0x00000000021EF000-memory.dmpFilesize
444KB
-
memory/3808-3-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3808-2-0x0000000002180000-0x00000000021EF000-memory.dmpFilesize
444KB
-
memory/4872-25-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4872-39-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4872-30-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4872-20-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4872-19-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB