Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe
Resource
win10v2004-20240611-en
General
-
Target
a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe
-
Size
424KB
-
MD5
61f57206e3d3d3d1621fe10c0a7f2d71
-
SHA1
13657383a9fac80797fed9027b19dc14996dd3ac
-
SHA256
a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25
-
SHA512
5940c324406527ceaf1b37d0e00759e2c7831a4db01adf2339036ab113280ae01aee00254f2d87961b8f896fe29c331ec803f25cf0e8b88e33e6b4ca6132ef98
-
SSDEEP
6144:snnUun/fcHlLgQ7CBa1PmU7iGvHvVTCZPy+isHfAt4mP/:+nUu/fclcQ76a1PmGX8Pms8
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe -
Executes dropped EXE 3 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exepid process 3144 Dctooux.exe 1096 Dctooux.exe 3608 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4312 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 3904 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 1780 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 2112 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 4628 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 3432 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 5068 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 4740 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 944 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 5100 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 892 988 WerFault.exe a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe 1908 3144 WerFault.exe Dctooux.exe 5044 3144 WerFault.exe Dctooux.exe 3180 3144 WerFault.exe Dctooux.exe 4508 3144 WerFault.exe Dctooux.exe 2192 3144 WerFault.exe Dctooux.exe 5096 3144 WerFault.exe Dctooux.exe 3860 3144 WerFault.exe Dctooux.exe 3832 3144 WerFault.exe Dctooux.exe 4348 3144 WerFault.exe Dctooux.exe 536 3144 WerFault.exe Dctooux.exe 2680 3144 WerFault.exe Dctooux.exe 3148 3144 WerFault.exe Dctooux.exe 4028 3144 WerFault.exe Dctooux.exe 2420 3144 WerFault.exe Dctooux.exe 3012 3144 WerFault.exe Dctooux.exe 4676 3144 WerFault.exe Dctooux.exe 4616 3144 WerFault.exe Dctooux.exe 3472 1096 WerFault.exe Dctooux.exe 2208 3608 WerFault.exe Dctooux.exe 5064 3144 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exepid process 988 a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exedescription pid process target process PID 988 wrote to memory of 3144 988 a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe Dctooux.exe PID 988 wrote to memory of 3144 988 a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe Dctooux.exe PID 988 wrote to memory of 3144 988 a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe"C:\Users\Admin\AppData\Local\Temp\a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 7562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 8282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 8682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 8762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 8802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 9362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 11282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 11602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 12642⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 5603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 5803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 6043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 6083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 7203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 7323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 8123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 9003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 9083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 9083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 9483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 10203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 11883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 14083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 14083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 14563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 14763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 7803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 10282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 8362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 988 -ip 9881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3144 -ip 31441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3144 -ip 31441⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 4482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1096 -ip 10961⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 4402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3608 -ip 36081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3144 -ip 31441⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\204450073126Filesize
80KB
MD54154139df84e27acbed452c969722120
SHA13c100aa4b8ecf6417deb6b8f16e255159cc57c40
SHA2561ef9e8bf8fcd7d64a941d8f2bddd16e27f5065c7cb27b31525c1fc489e97aa30
SHA512facfad4c1b18a0494fe43f5b8a93d4e7787d240d0cbb8e35f2c0665315d7da39bcc0e2c93f9c06a312be4ee2433778e22cf93b3ffee34fc093c9764c71a08e4c
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeFilesize
424KB
MD561f57206e3d3d3d1621fe10c0a7f2d71
SHA113657383a9fac80797fed9027b19dc14996dd3ac
SHA256a7a92d89003582772abd453355a3bf6eacb2c71ebd3ee286ad51b8b4eb2ebf25
SHA5125940c324406527ceaf1b37d0e00759e2c7831a4db01adf2339036ab113280ae01aee00254f2d87961b8f896fe29c331ec803f25cf0e8b88e33e6b4ca6132ef98
-
memory/988-1-0x0000000000720000-0x0000000000820000-memory.dmpFilesize
1024KB
-
memory/988-3-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/988-16-0x00000000020C0000-0x000000000212F000-memory.dmpFilesize
444KB
-
memory/988-17-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/988-15-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/988-2-0x00000000020C0000-0x000000000212F000-memory.dmpFilesize
444KB
-
memory/1096-44-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/1096-46-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/1096-45-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/1096-43-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/3144-19-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/3144-38-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/3144-34-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/3144-21-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/3144-20-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/3608-55-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB