Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 10:30
Static task
static1
Behavioral task
behavioral1
Sample
4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe
Resource
win10v2004-20240611-en
General
-
Target
4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe
-
Size
392KB
-
MD5
583c42042090b9bd50c7ea340d2d0614
-
SHA1
52fc8c85e4e34c9f070ac5664ebf6b615003ab85
-
SHA256
4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880
-
SHA512
e8bd1f2c2042f9d4f69e37ebba00ea82e3cccb51acd3dbb5efa1da970451edae2616412382d8066a18ad73154394cc4b197285ad7a60f77554b5ef2f820034b1
-
SSDEEP
6144:0ST9EeMepodzbmsh4PN3a3hhvEqnXRZSbTXqcT2vBTet91Ra1YnC/:DT6eMM2zbXoNyLLnXRS6cTMTet9LQ
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe -
Executes dropped EXE 3 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exepid process 3872 Dctooux.exe 2364 Dctooux.exe 1624 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3124 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 2868 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 1636 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 3520 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 4560 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 5036 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 1000 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 3808 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 760 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 1872 3912 WerFault.exe 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe 920 3872 WerFault.exe Dctooux.exe 4676 3872 WerFault.exe Dctooux.exe 3816 3872 WerFault.exe Dctooux.exe 1192 3872 WerFault.exe Dctooux.exe 4768 3872 WerFault.exe Dctooux.exe 1828 3872 WerFault.exe Dctooux.exe 4456 3872 WerFault.exe Dctooux.exe 2836 3872 WerFault.exe Dctooux.exe 5024 3872 WerFault.exe Dctooux.exe 3988 3872 WerFault.exe Dctooux.exe 2868 3872 WerFault.exe Dctooux.exe 3904 3872 WerFault.exe Dctooux.exe 2608 3872 WerFault.exe Dctooux.exe 2128 3872 WerFault.exe Dctooux.exe 3348 3872 WerFault.exe Dctooux.exe 3612 3872 WerFault.exe Dctooux.exe 3700 3872 WerFault.exe Dctooux.exe 936 2364 WerFault.exe Dctooux.exe 4768 1624 WerFault.exe Dctooux.exe 4352 3872 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exepid process 3912 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exedescription pid process target process PID 3912 wrote to memory of 3872 3912 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe Dctooux.exe PID 3912 wrote to memory of 3872 3912 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe Dctooux.exe PID 3912 wrote to memory of 3872 3912 4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe"C:\Users\Admin\AppData\Local\Temp\4435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 7562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 8002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 8562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 9042⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 9082⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 8562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 11522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 12522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 12322⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 5603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 5803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 6083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 6163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 7363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 8883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 5603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 8883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 9563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 9803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 10203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 11643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 14163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 14843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 13923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 11083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 8923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 13362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3912 -ip 39121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3872 -ip 38721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3872 -ip 38721⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 4402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2364 -ip 23641⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 4482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1624 -ip 16241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3872 -ip 38721⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\169499791354Filesize
83KB
MD51b0fc8d442065a9b56f97b78c4fa1137
SHA1555e50095e21f4a68950770f062ffc5c47d43fb3
SHA2564b6995070fedc78ec90c714cabcac316683fcb4ca6f3303d524ccf5644d8cd44
SHA5122b2713d95f3328685bc9599baa821d6024425737119ac742676a6cfc69cb18b38fcdf29d714ce1fb22684c4bbeeada8ce852a3277e4996141057c2ab857f8a36
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeFilesize
392KB
MD5583c42042090b9bd50c7ea340d2d0614
SHA152fc8c85e4e34c9f070ac5664ebf6b615003ab85
SHA2564435f30ee62bdf665a126cfffa47f8271f74d579bd48c8418495aac79d6e0880
SHA512e8bd1f2c2042f9d4f69e37ebba00ea82e3cccb51acd3dbb5efa1da970451edae2616412382d8066a18ad73154394cc4b197285ad7a60f77554b5ef2f820034b1
-
memory/1624-57-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2364-48-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2364-47-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2364-45-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2364-46-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3872-21-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3872-19-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3872-30-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3872-38-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3872-20-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3912-1-0x00000000004C0000-0x00000000005C0000-memory.dmpFilesize
1024KB
-
memory/3912-16-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3912-17-0x0000000001FA0000-0x000000000200F000-memory.dmpFilesize
444KB
-
memory/3912-2-0x0000000001FA0000-0x000000000200F000-memory.dmpFilesize
444KB
-
memory/3912-3-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB