Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 17:40
Behavioral task
behavioral1
Sample
dctooux.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dctooux.exe
Resource
win10v2004-20241007-en
General
-
Target
dctooux.exe
-
Size
437KB
-
MD5
d317ee086ebeccf5e01e002ca6b0ead9
-
SHA1
48e8c5846d9c67649b3c2fb8d76aa951828dd84e
-
SHA256
dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c
-
SHA512
5fc335758f587e9f9f35309b101c16a4e2faa840013f8024f45eb33b9aa402a2877cbc07f76f389d25e2cf20607486997218de52c46364e2c89a5fa28a785032
-
SSDEEP
12288:fHxmm31uLFn23TURCwbH8SnBkKuJ+RctSaWrQz:/BuLFn2DUELSS7s
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dctooux.exe -
Executes dropped EXE 4 IoCs
pid Process 4836 Dctooux.exe 3560 Dctooux.exe 4496 Dctooux.exe 4516 Dctooux.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job dctooux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dctooux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dctooux.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4836 5016 dctooux.exe 83 PID 5016 wrote to memory of 4836 5016 dctooux.exe 83 PID 5016 wrote to memory of 4836 5016 dctooux.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\dctooux.exe"C:\Users\Admin\AppData\Local\Temp\dctooux.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
PID:3560
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
PID:4496
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD59b55c313abf16e72ffe4803f736e662a
SHA18a8f6a71edffaa07678751bfa58c343d4b52d099
SHA25690566c111864994aa7694128bc8219c8804cc9b67524c9c16645ea04226353a8
SHA5126bbd76babe7ae7ffe043474d598a93e83813917749d31e53cbc3840ebc400e59439ec43cefc862de3c8ae9102c8e5eef081c04b8411148009dbc1d4cb5c7f8d3
-
Filesize
437KB
MD5d317ee086ebeccf5e01e002ca6b0ead9
SHA148e8c5846d9c67649b3c2fb8d76aa951828dd84e
SHA256dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c
SHA5125fc335758f587e9f9f35309b101c16a4e2faa840013f8024f45eb33b9aa402a2877cbc07f76f389d25e2cf20607486997218de52c46364e2c89a5fa28a785032
-
Filesize
4KB
MD52cf5e1301e3747484b4a022f8a37851b
SHA14b5c2da315aad6f8cf6e098a104fb5e700ddc260
SHA256993d6a9f26a99d78671b4e1fd72bb68aa20fb123325a69558959206a6eb2ba10
SHA512723b8e868a07239a5ad31ccf6d520f06ede2dffdf6be7aef037788524b9df3b7b888b75b47242cade545a50570616693003d7b233f155189dedee3e3f8721c9f