Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-06-2024 07:30
Static task
static1
Behavioral task
behavioral1
Sample
3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe
Resource
win10v2004-20240508-en
General
-
Target
3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe
-
Size
407KB
-
MD5
98392f80bcfbb4a2d5e2966696e76f9d
-
SHA1
65720cf5bababcdc4a27fadfae2dc811979dae06
-
SHA256
3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1
-
SHA512
29ff145b655dac61c7e3f358657f2068a9b0bf8b1658649a7dccb9ff8b8485b5a77ca41cf319a1d9c1b16c778f0807fb343747079cbb26dd35e6f5a883561ca6
-
SSDEEP
6144:gALTZpdoaVORPT862GHuGOnOz4XquD6YcwD/ag/:gIx88W4nXqCcwR
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exepid process 3864 Dctooux.exe 648 Dctooux.exe 1920 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3692 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 3528 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 3180 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 1704 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 2284 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 2084 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 5064 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 464 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 1872 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 4828 3288 WerFault.exe 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe 3544 3864 WerFault.exe Dctooux.exe 3704 3864 WerFault.exe Dctooux.exe 3148 3864 WerFault.exe Dctooux.exe 4900 3864 WerFault.exe Dctooux.exe 1956 3864 WerFault.exe Dctooux.exe 436 3864 WerFault.exe Dctooux.exe 4524 3864 WerFault.exe Dctooux.exe 1112 3864 WerFault.exe Dctooux.exe 720 3864 WerFault.exe Dctooux.exe 1044 3864 WerFault.exe Dctooux.exe 3928 3864 WerFault.exe Dctooux.exe 5004 3864 WerFault.exe Dctooux.exe 5092 3864 WerFault.exe Dctooux.exe 3992 3864 WerFault.exe Dctooux.exe 2272 3864 WerFault.exe Dctooux.exe 2860 3864 WerFault.exe Dctooux.exe 2784 3864 WerFault.exe Dctooux.exe 4080 648 WerFault.exe Dctooux.exe 1848 1920 WerFault.exe Dctooux.exe 3504 3864 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exepid process 3288 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exedescription pid process target process PID 3288 wrote to memory of 3864 3288 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe Dctooux.exe PID 3288 wrote to memory of 3864 3288 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe Dctooux.exe PID 3288 wrote to memory of 3864 3288 3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe"C:\Users\Admin\AppData\Local\Temp\3c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 7762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 7962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 8522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 9322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 9602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 9762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 9242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 9242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 11362⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 5883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 6283⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 6483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 6723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 6803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 7043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 6243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 9363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 9723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 9923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 8163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 10683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 12083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 14523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 13963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 13523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 15043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 9403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 11802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3288 -ip 32881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3864 -ip 38641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3864 -ip 38641⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 4722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 648 -ip 6481⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 4802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1920 -ip 19201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3864 -ip 38641⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\474490143322Filesize
80KB
MD5305109a5360c3df40fc95e90c552db9a
SHA1416741b2ec5acd0c2f0f3de67e302e7acc0c06e6
SHA25654bbbc304e95e7b88ec3d36a99fa359f1f9afb69ba48161b3dce98ea3e0453a2
SHA5122df506fa6a1c74d7b4d78956b79d24edeb9e7276e32be4e71348b12aa5126ee4c640a161716a693671ef440e50066209cdf05c7031e781459706850775b76781
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeFilesize
407KB
MD598392f80bcfbb4a2d5e2966696e76f9d
SHA165720cf5bababcdc4a27fadfae2dc811979dae06
SHA2563c424dad86619cb197396cb510bd472ca97aba729d289e2b50f3c0986241adf1
SHA51229ff145b655dac61c7e3f358657f2068a9b0bf8b1658649a7dccb9ff8b8485b5a77ca41cf319a1d9c1b16c778f0807fb343747079cbb26dd35e6f5a883561ca6
-
memory/648-43-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/648-45-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/648-44-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/648-42-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/1920-54-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3288-2-0x0000000002180000-0x00000000021EF000-memory.dmpFilesize
444KB
-
memory/3288-3-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3288-17-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3288-16-0x0000000002180000-0x00000000021EF000-memory.dmpFilesize
444KB
-
memory/3288-1-0x00000000006A0000-0x00000000007A0000-memory.dmpFilesize
1024KB
-
memory/3864-21-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3864-39-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3864-27-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3864-26-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3864-20-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3864-19-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB