Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 17:40
Behavioral task
behavioral1
Sample
dctooux.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dctooux.exe
Resource
win10v2004-20241007-en
General
-
Target
dctooux.exe
-
Size
437KB
-
MD5
d317ee086ebeccf5e01e002ca6b0ead9
-
SHA1
48e8c5846d9c67649b3c2fb8d76aa951828dd84e
-
SHA256
dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c
-
SHA512
5fc335758f587e9f9f35309b101c16a4e2faa840013f8024f45eb33b9aa402a2877cbc07f76f389d25e2cf20607486997218de52c46364e2c89a5fa28a785032
-
SSDEEP
12288:fHxmm31uLFn23TURCwbH8SnBkKuJ+RctSaWrQz:/BuLFn2DUELSS7s
Malware Config
Extracted
amadey
4.18
1cc3fe
http://vitantgroup.com
-
install_dir
431a343abc
-
install_file
Dctooux.exe
-
strings_key
5a2387e2bfef84adb686c856b4155237
-
url_paths
/xmlrpc.php
Signatures
-
Amadey family
-
Executes dropped EXE 1 IoCs
pid Process 2328 Dctooux.exe -
Loads dropped DLL 1 IoCs
pid Process 1876 dctooux.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job dctooux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dctooux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 dctooux.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2328 1876 dctooux.exe 28 PID 1876 wrote to memory of 2328 1876 dctooux.exe 28 PID 1876 wrote to memory of 2328 1876 dctooux.exe 28 PID 1876 wrote to memory of 2328 1876 dctooux.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dctooux.exe"C:\Users\Admin\AppData\Local\Temp\dctooux.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD598ea9fd6821d626692be9316d4b4f5ea
SHA166d559686446732ecfca6863a32da10e65bc89e1
SHA256254c8e26b59ffb20e088078bdfb1809920d4b6511a4a4dc58543b75036842a79
SHA5127b942b64b156a01a0717b70a0ee9c5d9b68dfdd5e1acbbea01f8837a864d2d87552ca15c34207e72bd90bf8fb27157b4c720b2de307e189e5bedaebe2936670b
-
Filesize
4KB
MD509f7d6c721418f078b6f570558e10c10
SHA1e570eb96c28915f6da5b679cc013578d22afbb7f
SHA2566c7837bcdf9244977fc76bfbbdeecae4cf77169ec6f6a2eea6786ca469e0a687
SHA512bd5af73c4ea930d224b7437ef2384b2c4ec3a8bb06823519e3ac244851cc0c03872e6ce4489393aab4dae4491076456dd178da29064cbaf6693057eeed052a71
-
Filesize
437KB
MD5d317ee086ebeccf5e01e002ca6b0ead9
SHA148e8c5846d9c67649b3c2fb8d76aa951828dd84e
SHA256dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c
SHA5125fc335758f587e9f9f35309b101c16a4e2faa840013f8024f45eb33b9aa402a2877cbc07f76f389d25e2cf20607486997218de52c46364e2c89a5fa28a785032