Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
d7e528b55b2eeb6786509664a70f641f14d0c13ceec539737eef26857355536e.ps1
Resource
win7-20240903-en
General
-
Target
d7e528b55b2eeb6786509664a70f641f14d0c13ceec539737eef26857355536e.ps1
-
Size
583KB
-
MD5
123cdee8a31e52577191351fae7b53ef
-
SHA1
e8e645d8844b9a19012238be6ab2c4149d62f1cf
-
SHA256
d7e528b55b2eeb6786509664a70f641f14d0c13ceec539737eef26857355536e
-
SHA512
3ff792ced5090f68b7d6004213a9e6c653b42bcf5f10416b3b0cccf1a31516d5e737705d9826d21c8c84f240fc34726c76c60ec5fc8994f30a8e81839bee913a
-
SSDEEP
12288:kl6RA0zJb58097MFZ0sjlTONreknQV8Xie/0+4NW:kYRASw90sjtONrQV984NW
Malware Config
Extracted
amadey
4.18
1cc3fe
http://vitantgroup.com
-
install_dir
431a343abc
-
install_file
Dctooux.exe
-
strings_key
5a2387e2bfef84adb686c856b4155237
-
url_paths
/xmlrpc.php
Signatures
-
Amadey family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation av.exe -
Executes dropped EXE 4 IoCs
pid Process 3876 av.exe 1016 Dctooux.exe 1192 Dctooux.exe 4588 Dctooux.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Dctooux.job av.exe -
pid Process 2144 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language av.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dctooux.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2144 powershell.exe 2144 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2144 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3876 av.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3876 2144 powershell.exe 84 PID 2144 wrote to memory of 3876 2144 powershell.exe 84 PID 2144 wrote to memory of 3876 2144 powershell.exe 84 PID 3876 wrote to memory of 1016 3876 av.exe 85 PID 3876 wrote to memory of 1016 3876 av.exe 85 PID 3876 wrote to memory of 1016 3876 av.exe 85
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\d7e528b55b2eeb6786509664a70f641f14d0c13ceec539737eef26857355536e.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\av.exe"C:\Users\Admin\AppData\Local\Temp\av.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016
-
-
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
PID:1192
-
C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe1⤵
- Executes dropped EXE
PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5242ebaac4fad6176c44cb2d412687de7
SHA14b30f5336224009111e38f5a38d791a9024c9ea3
SHA2563051006ceeccd36393d79a1dd30265e29d5c8696667a61ee0b440d75c6a2fb0c
SHA5123d5646288dbee10463755ca6e526be0206363355117b5d01bbda90bc41329fd0da651f47688c057483ab26114b8b15fba5a232d4af16b0cd08aff02301f64995
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
437KB
MD5d317ee086ebeccf5e01e002ca6b0ead9
SHA148e8c5846d9c67649b3c2fb8d76aa951828dd84e
SHA256dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c
SHA5125fc335758f587e9f9f35309b101c16a4e2faa840013f8024f45eb33b9aa402a2877cbc07f76f389d25e2cf20607486997218de52c46364e2c89a5fa28a785032
-
Filesize
4KB
MD55742b916e48e86c0a8512c6281094608
SHA1f37b62b147c1c04766c42e510f529abc18d8d745
SHA2560ab4c406497ac26c8f4a9170594a72ccd540115389fb84accc75462d33c9d2b2
SHA512fb97e5ec01a630b9e7bccfc7ec6a52f1bed6e7f7580e00e0344233763711d0c8ac6517d86725c0fb3dbee7d4bbe03b10eec0cf9f5a0f0afc32b92bada07069ba