Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-06-2024 09:50
Static task
static1
Behavioral task
behavioral1
Sample
3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe
Resource
win10v2004-20240611-en
General
-
Target
3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe
-
Size
406KB
-
MD5
0bd32722e092eff1ef9e88a945824715
-
SHA1
af868c26f0a9cce64e30020e99d014efafa22e62
-
SHA256
3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd
-
SHA512
eab9d5f9f27adff92612df9a8a76ca403f7acb99a528772f9d389f7f6dc50919340c6e1c679f405b79b72ee8419d710fb5dcdcf2e1b8df5a74960437423ed2c7
-
SSDEEP
6144:BAL8MLRdnsW4U15jicEvsPqd3OWy1e4R2naajY/:B+1x515icEMol04a
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exeDctooux.exepid process 4736 Dctooux.exe 4548 Dctooux.exe 4040 Dctooux.exe 1352 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1960 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 3172 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 800 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 4172 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 1088 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 1672 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 972 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 2344 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 2208 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 2976 4388 WerFault.exe 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe 3556 4736 WerFault.exe Dctooux.exe 2772 4736 WerFault.exe Dctooux.exe 3944 4736 WerFault.exe Dctooux.exe 5044 4736 WerFault.exe Dctooux.exe 3696 4736 WerFault.exe Dctooux.exe 4764 4736 WerFault.exe Dctooux.exe 1772 4736 WerFault.exe Dctooux.exe 3760 4736 WerFault.exe Dctooux.exe 1416 4736 WerFault.exe Dctooux.exe 4792 4736 WerFault.exe Dctooux.exe 4576 4736 WerFault.exe Dctooux.exe 552 4736 WerFault.exe Dctooux.exe 4244 4736 WerFault.exe Dctooux.exe 1840 4736 WerFault.exe Dctooux.exe 4652 4736 WerFault.exe Dctooux.exe 3116 4736 WerFault.exe Dctooux.exe 2036 4736 WerFault.exe Dctooux.exe 1920 4548 WerFault.exe Dctooux.exe 3084 4040 WerFault.exe Dctooux.exe 3944 4736 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exepid process 4388 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exedescription pid process target process PID 4388 wrote to memory of 4736 4388 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe Dctooux.exe PID 4388 wrote to memory of 4736 4388 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe Dctooux.exe PID 4388 wrote to memory of 4736 4388 3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe"C:\Users\Admin\AppData\Local\Temp\3f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 7762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 8202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 8362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 9442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 8402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 9802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 9402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 10442⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 10482⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 5883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 6083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 6043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 5923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 6883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 7163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 9003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 9003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 9443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 9443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 9763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 10683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 12083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 12363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 14363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 15443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 12443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 9043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 10762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 4736 -ip 47361⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 4802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 4548 -ip 45481⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 4802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 4040 -ip 40401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 4736 -ip 47361⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\276817940128Filesize
77KB
MD58d0aae7a788d975e2bebd4ab835540e7
SHA15f418e39bb78725170207e04ee0d08c2804cc656
SHA2567674e421fc476cf38ce12faa1530d4b2433562bc1f420081c8f0190f16fcfa51
SHA5127de2ca2e78ea3da3831272cd220c87fbee18b3950d93bdcc696d038e999383a4e7fbf881f9f559021483f2e181d8acd4bbd7c1183f8c34b569b5f8ecbc61e7df
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeFilesize
406KB
MD50bd32722e092eff1ef9e88a945824715
SHA1af868c26f0a9cce64e30020e99d014efafa22e62
SHA2563f6d052baefd62e33e7ac301d6f1c37d5874d823c422e097324fae9e0c0451bd
SHA512eab9d5f9f27adff92612df9a8a76ca403f7acb99a528772f9d389f7f6dc50919340c6e1c679f405b79b72ee8419d710fb5dcdcf2e1b8df5a74960437423ed2c7
-
memory/4040-51-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4388-1-0x00000000006A0000-0x00000000007A0000-memory.dmpFilesize
1024KB
-
memory/4388-3-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4388-16-0x0000000002210000-0x000000000227F000-memory.dmpFilesize
444KB
-
memory/4388-17-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4388-2-0x0000000002210000-0x000000000227F000-memory.dmpFilesize
444KB
-
memory/4548-41-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4548-42-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4548-40-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4548-39-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4736-19-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4736-36-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4736-35-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB