Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe
Resource
win10v2004-20240508-en
General
-
Target
81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe
-
Size
424KB
-
MD5
cfe9e898505ab7ee6363426ebbe47103
-
SHA1
103e65a8dd5cbfcb47b830573da1c141e566bdd2
-
SHA256
81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19
-
SHA512
d4ee968efccf7979f94f5e35adee6efe48a4c99bf23f14eefbb4beac206ec7c18a619feb4d8e0e1ec7c600abb739dd879335babf063510a2d360b844e70d5904
-
SSDEEP
6144:HnnUujpl1gxSfHvL+wizyxojjHi3SjMvjtGBKXcBtG95v+bgG21/:HnUuj15vzEzjjHi3bRGBKXX+2R
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe -
Executes dropped EXE 3 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exepid process 4888 Dctooux.exe 2176 Dctooux.exe 2464 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4080 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 3536 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 4780 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 4404 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 1472 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 1684 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 3312 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 1252 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 2864 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 4048 4392 WerFault.exe 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe 1864 4888 WerFault.exe Dctooux.exe 2248 4888 WerFault.exe Dctooux.exe 2188 4888 WerFault.exe Dctooux.exe 972 4888 WerFault.exe Dctooux.exe 3688 4888 WerFault.exe Dctooux.exe 5020 4888 WerFault.exe Dctooux.exe 4940 4888 WerFault.exe Dctooux.exe 1896 4888 WerFault.exe Dctooux.exe 1596 4888 WerFault.exe Dctooux.exe 728 4888 WerFault.exe Dctooux.exe 3228 4888 WerFault.exe Dctooux.exe 3880 4888 WerFault.exe Dctooux.exe 3920 4888 WerFault.exe Dctooux.exe 2272 4888 WerFault.exe Dctooux.exe 1964 4888 WerFault.exe Dctooux.exe 1364 4888 WerFault.exe Dctooux.exe 544 4888 WerFault.exe Dctooux.exe 4452 2176 WerFault.exe Dctooux.exe 3972 2464 WerFault.exe Dctooux.exe 4680 4888 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exepid process 4392 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exedescription pid process target process PID 4392 wrote to memory of 4888 4392 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe Dctooux.exe PID 4392 wrote to memory of 4888 4392 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe Dctooux.exe PID 4392 wrote to memory of 4888 4392 81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe"C:\Users\Admin\AppData\Local\Temp\81ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 7562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 7762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 8562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 9282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 9322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 9002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 11402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 12242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 13002⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 5603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 5803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 6203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 6523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 7243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 8883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 9243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 9443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 9883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 5563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 10203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 11683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 14003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 14083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 14603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 13963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 8923⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 13202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4392 -ip 43921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 4888 -ip 48881⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 4402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 2176 -ip 21761⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 4402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 2464 -ip 24641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 4888 -ip 48881⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\539840389126Filesize
76KB
MD5aa9d3768b5e3cf60775b4461204b63e0
SHA115c1bac17a4c4386844aaa240350bb2de8d9f413
SHA25655d76d5102ba2caf0b68bc662fbb243018693ca57cc1469168e2d333e3b0380a
SHA5122460c4839a88fcb9af94308dd1da8a3efa97edc7a644adad9a952d8eaaef035a51ecf294e94b2230e905ffb546bd4d314caeecccdbcf69bf5627010320a828ca
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeFilesize
424KB
MD5cfe9e898505ab7ee6363426ebbe47103
SHA1103e65a8dd5cbfcb47b830573da1c141e566bdd2
SHA25681ed4a6ffdc3d2afa4daba88da47480b3152fc2e3ba40c07c815eca57c1e8b19
SHA512d4ee968efccf7979f94f5e35adee6efe48a4c99bf23f14eefbb4beac206ec7c18a619feb4d8e0e1ec7c600abb739dd879335babf063510a2d360b844e70d5904
-
memory/2176-41-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/2176-42-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/2176-39-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/2176-40-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/2464-51-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4392-1-0x00000000006D0000-0x00000000007D0000-memory.dmpFilesize
1024KB
-
memory/4392-16-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4392-15-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4392-2-0x00000000020E0000-0x000000000214F000-memory.dmpFilesize
444KB
-
memory/4392-3-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4888-18-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4888-36-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4888-28-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4888-23-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB