Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
dctooux.exe
Resource
win7-20241010-en
General
-
Target
dctooux.exe
-
Size
1.3MB
-
MD5
db04aa6e158c5d52c20fc855f5285905
-
SHA1
822416dfa3f094aa6776ed0cad77fb9083db29a3
-
SHA256
ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f
-
SHA512
cdc0ff46ac48178da0a68d4e2601a46a960c3aa998edd66a7bb6a39d1caa7dbbe53f1aa463307a9932996d2993386addc7c54cee73811897b075dd75fbc904ff
-
SSDEEP
24576:wbsh2BfGSklE31Sa1jnzi+k24VR5SLRUyvQAqBYcTHykVbFv4pOdfEPkXsvHo/s/:wbsQf6lEFti+kZRSUJAqB/VRsO/oo/sJ
Malware Config
Extracted
amadey
4.18
1cc3fe
http://vitantgroup.com
-
install_dir
431a343abc
-
install_file
Dctooux.exe
-
strings_key
5a2387e2bfef84adb686c856b4155237
-
url_paths
/xmlrpc.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation dctooux.exe -
Executes dropped EXE 4 IoCs
pid Process 116 Dctooux.exe 4696 Dctooux.exe 3320 Dctooux.exe 4360 Dctooux.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
pid Process 1968 dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 4696 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 3320 Dctooux.exe 3320 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe 4360 Dctooux.exe 116 Dctooux.exe 116 Dctooux.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job dctooux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dctooux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dctooux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dctooux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dctooux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 dctooux.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1968 dctooux.exe 116 Dctooux.exe 4696 Dctooux.exe 3320 Dctooux.exe 4360 Dctooux.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 116 1968 dctooux.exe 83 PID 1968 wrote to memory of 116 1968 dctooux.exe 83 PID 1968 wrote to memory of 116 1968 dctooux.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\dctooux.exe"C:\Users\Admin\AppData\Local\Temp\dctooux.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4696
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3320
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD54e5d8a7f269e304ab94c41d2627d84a5
SHA1017aa04531385c625954b6948563a50ed64150bd
SHA2563d8fa623a10a096204764e9eca94ebf7bd2a8078ef315f2b4c74899e0fceab42
SHA5124c61b3bd722e48744b3d6986fb1c494c0212df3b61841f032fb4fd0ffba30dfa63425d10ece19f62b9a5ddcd4cfafeb64c7025bd44e4e907ead6a77cd4ad1cdd
-
Filesize
1.3MB
MD5db04aa6e158c5d52c20fc855f5285905
SHA1822416dfa3f094aa6776ed0cad77fb9083db29a3
SHA256ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f
SHA512cdc0ff46ac48178da0a68d4e2601a46a960c3aa998edd66a7bb6a39d1caa7dbbe53f1aa463307a9932996d2993386addc7c54cee73811897b075dd75fbc904ff
-
Filesize
4KB
MD5fb5373484f3030595d61cc96556add4a
SHA1b2a91fef73798da9978b4ca2b3df668b87d1edb2
SHA256454ce2fbb45e69e84662a2aeadf4256058dc4a7773cca331e795a5d5c630d1b2
SHA512f548477804c8be58f0df5da9fc2f72c773a15e67bc32d8515f976e68de1a7ad3cb7403c1c9e5feb07fe6de9ac56f089f6e4d3d7e08bd14a4a2df8d878a60ac3c