Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-06-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe
Resource
win10v2004-20240611-en
General
-
Target
7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe
-
Size
424KB
-
MD5
badc61693070247ddf7474c29470696c
-
SHA1
7c86bdcadd17edf3e4f5765f4db5d9593d208212
-
SHA256
7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0
-
SHA512
474b441de6951da4bd7c4b55dc2641296be502fc1b85d6ce0eb1aab638bf54cbcbd904045ddd7a96ad63867c4da58806036005e037c426e77c9d12061caf7bbb
-
SSDEEP
6144:LnnUuhPG5Dvk6MjdR7bHCqyIeROk7xR84q4hZpmaeO9NYGg/:jnUu76MD7biikOkxqcZpmaeYc
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exeDctooux.exepid process 4348 Dctooux.exe 4864 Dctooux.exe 2772 Dctooux.exe 4364 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4064 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 3436 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 1576 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 3160 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 2024 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 1996 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 884 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 4264 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 2852 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 1924 5068 WerFault.exe 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe 4552 4348 WerFault.exe Dctooux.exe 4796 4348 WerFault.exe Dctooux.exe 3612 4348 WerFault.exe Dctooux.exe 4816 4348 WerFault.exe Dctooux.exe 4076 4348 WerFault.exe Dctooux.exe 2164 4348 WerFault.exe Dctooux.exe 4492 4348 WerFault.exe Dctooux.exe 3828 4348 WerFault.exe Dctooux.exe 3576 4348 WerFault.exe Dctooux.exe 3068 4348 WerFault.exe Dctooux.exe 5028 4348 WerFault.exe Dctooux.exe 232 4348 WerFault.exe Dctooux.exe 2072 4348 WerFault.exe Dctooux.exe 5084 4348 WerFault.exe Dctooux.exe 3624 4348 WerFault.exe Dctooux.exe 2204 4348 WerFault.exe Dctooux.exe 1388 4348 WerFault.exe Dctooux.exe 3532 4864 WerFault.exe Dctooux.exe 2000 2772 WerFault.exe Dctooux.exe 4012 4348 WerFault.exe Dctooux.exe 2504 4364 WerFault.exe Dctooux.exe 1816 4364 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exepid process 5068 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exedescription pid process target process PID 5068 wrote to memory of 4348 5068 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe Dctooux.exe PID 5068 wrote to memory of 4348 5068 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe Dctooux.exe PID 5068 wrote to memory of 4348 5068 7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe"C:\Users\Admin\AppData\Local\Temp\7b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 7762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 8202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 8762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 9402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 9322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 9482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 10202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 10202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 10442⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 5883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 6323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 6523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 6763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 6643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 5923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 9003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 9203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 9363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 9323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 7843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 10683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 10763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 14523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 14443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 13483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 15443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 9043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 11762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4348 -ip 43481⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 4722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4864 -ip 48641⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 4722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2772 -ip 27721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4348 -ip 43481⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 4682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 4722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4364 -ip 43641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4364 -ip 43641⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\001105534270Filesize
80KB
MD55ba33df8daea8d3989e16bc7c1c15518
SHA14f01cc7e4afae705bdd28f1e5b91edeff314022c
SHA25627ee5b822016ba6176c175de52627a58063e4ac3cb4fc2c3cd27a236b0beaf86
SHA5128abe453ed2cb7d89c20a9bd1721972ec362f481ac48bf7729314a278062741fd8e9576eda0e490a33f3c68d983f38d657dca6f74769123356c240c23f075a646
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeFilesize
424KB
MD5badc61693070247ddf7474c29470696c
SHA17c86bdcadd17edf3e4f5765f4db5d9593d208212
SHA2567b5be56fafa1f9cd746dbea6da0b7b549bbfb68eedd3b69ff2767c0095bda3d0
SHA512474b441de6951da4bd7c4b55dc2641296be502fc1b85d6ce0eb1aab638bf54cbcbd904045ddd7a96ad63867c4da58806036005e037c426e77c9d12061caf7bbb
-
memory/2772-49-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4348-24-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4348-19-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4348-29-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4348-41-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4364-58-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4864-27-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4864-28-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/5068-17-0x0000000002190000-0x00000000021FF000-memory.dmpFilesize
444KB
-
memory/5068-16-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/5068-15-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/5068-3-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/5068-1-0x0000000000550000-0x0000000000650000-memory.dmpFilesize
1024KB
-
memory/5068-2-0x0000000002190000-0x00000000021FF000-memory.dmpFilesize
444KB