Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
Dynpvoy.exe
Resource
win7-20241010-en
General
-
Target
Dynpvoy.exe
-
Size
1.1MB
-
MD5
c5ad2e085a9ff5c605572215c40029e1
-
SHA1
252fe2d36d552bcf8752be2bdd62eb7711d3b2ab
-
SHA256
47c8723d2034a43fb63f89e2bcd731c99c1c316b238957720c761a0301202e05
-
SHA512
8878a0f2678908136158f3a6d88393e6831dfe1e64aa82adbb17c26b223381d5ac166dc241bedd554c8dd4e687e9bee624a91fbe3d2976ddfea1d811bf26f6d4
-
SSDEEP
24576:ointVUQ6nNORVNIW6/HPGs6h3RPey7PlLUPe3Oj3IyuFtx:oinvU5nNO3NIW1fNAyrlLyeO30tx
Malware Config
Extracted
amadey
5.04
b44aeb
-
install_dir
7725ce688f
-
install_file
Gxtuum.exe
-
strings_key
8bf9b3f72bb53c678e0173edf42df1ae
-
url_paths
/3ofn3jf3e2ljk/index.php
Signatures
-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 3428 created 3532 3428 Dynpvoy.exe 56 PID 4760 created 3532 4760 Gxtuum.exe 56 PID 1452 created 3532 1452 Gxtuum.exe 56 PID 4336 created 3532 4336 Gxtuum.exe 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Dynpvoy.exe -
Executes dropped EXE 6 IoCs
pid Process 4760 Gxtuum.exe 1392 Gxtuum.exe 1452 Gxtuum.exe 2044 Gxtuum.exe 4336 Gxtuum.exe 4564 Gxtuum.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3428 set thread context of 4548 3428 Dynpvoy.exe 89 PID 4760 set thread context of 1392 4760 Gxtuum.exe 93 PID 1452 set thread context of 2044 1452 Gxtuum.exe 95 PID 4336 set thread context of 4564 4336 Gxtuum.exe 97 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job Dynpvoy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dynpvoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dynpvoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3428 Dynpvoy.exe 4760 Gxtuum.exe 1452 Gxtuum.exe 4336 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3428 Dynpvoy.exe Token: SeDebugPrivilege 3428 Dynpvoy.exe Token: SeDebugPrivilege 4760 Gxtuum.exe Token: SeDebugPrivilege 4760 Gxtuum.exe Token: SeDebugPrivilege 1452 Gxtuum.exe Token: SeDebugPrivilege 1452 Gxtuum.exe Token: SeDebugPrivilege 4336 Gxtuum.exe Token: SeDebugPrivilege 4336 Gxtuum.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4548 Dynpvoy.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 3428 wrote to memory of 4548 3428 Dynpvoy.exe 89 PID 4548 wrote to memory of 4760 4548 Dynpvoy.exe 90 PID 4548 wrote to memory of 4760 4548 Dynpvoy.exe 90 PID 4548 wrote to memory of 4760 4548 Dynpvoy.exe 90 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 4760 wrote to memory of 1392 4760 Gxtuum.exe 93 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 1452 wrote to memory of 2044 1452 Gxtuum.exe 95 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97 PID 4336 wrote to memory of 4564 4336 Gxtuum.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1452
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c5ad2e085a9ff5c605572215c40029e1
SHA1252fe2d36d552bcf8752be2bdd62eb7711d3b2ab
SHA25647c8723d2034a43fb63f89e2bcd731c99c1c316b238957720c761a0301202e05
SHA5128878a0f2678908136158f3a6d88393e6831dfe1e64aa82adbb17c26b223381d5ac166dc241bedd554c8dd4e687e9bee624a91fbe3d2976ddfea1d811bf26f6d4