Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
Dynpvoy.exe
Resource
win7-20241010-en
General
-
Target
Dynpvoy.exe
-
Size
1.1MB
-
MD5
c5ad2e085a9ff5c605572215c40029e1
-
SHA1
252fe2d36d552bcf8752be2bdd62eb7711d3b2ab
-
SHA256
47c8723d2034a43fb63f89e2bcd731c99c1c316b238957720c761a0301202e05
-
SHA512
8878a0f2678908136158f3a6d88393e6831dfe1e64aa82adbb17c26b223381d5ac166dc241bedd554c8dd4e687e9bee624a91fbe3d2976ddfea1d811bf26f6d4
-
SSDEEP
24576:ointVUQ6nNORVNIW6/HPGs6h3RPey7PlLUPe3Oj3IyuFtx:oinvU5nNO3NIW1fNAyrlLyeO30tx
Malware Config
Extracted
amadey
5.04
b44aeb
-
install_dir
7725ce688f
-
install_file
Gxtuum.exe
-
strings_key
8bf9b3f72bb53c678e0173edf42df1ae
-
url_paths
/3ofn3jf3e2ljk/index.php
Signatures
-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 4748 created 3504 4748 Dynpvoy.exe 56 PID 3884 created 3504 3884 Gxtuum.exe 56 PID 3332 created 3504 3332 Gxtuum.exe 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Dynpvoy.exe -
Executes dropped EXE 5 IoCs
pid Process 3884 Gxtuum.exe 4728 Gxtuum.exe 3332 Gxtuum.exe 3676 Gxtuum.exe 3996 Gxtuum.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4748 set thread context of 1424 4748 Dynpvoy.exe 97 PID 3884 set thread context of 4728 3884 Gxtuum.exe 102 PID 3332 set thread context of 3676 3332 Gxtuum.exe 106 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job Dynpvoy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dynpvoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dynpvoy.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4748 Dynpvoy.exe 3884 Gxtuum.exe 3332 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4748 Dynpvoy.exe Token: SeDebugPrivilege 4748 Dynpvoy.exe Token: SeDebugPrivilege 3884 Gxtuum.exe Token: SeDebugPrivilege 3884 Gxtuum.exe Token: SeDebugPrivilege 3332 Gxtuum.exe Token: SeDebugPrivilege 3332 Gxtuum.exe Token: SeDebugPrivilege 3996 Gxtuum.exe Token: SeDebugPrivilege 3996 Gxtuum.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 Dynpvoy.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 4748 wrote to memory of 1424 4748 Dynpvoy.exe 97 PID 1424 wrote to memory of 3884 1424 Dynpvoy.exe 98 PID 1424 wrote to memory of 3884 1424 Dynpvoy.exe 98 PID 1424 wrote to memory of 3884 1424 Dynpvoy.exe 98 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3884 wrote to memory of 4728 3884 Gxtuum.exe 102 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106 PID 3332 wrote to memory of 3676 3332 Gxtuum.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3884
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c5ad2e085a9ff5c605572215c40029e1
SHA1252fe2d36d552bcf8752be2bdd62eb7711d3b2ab
SHA25647c8723d2034a43fb63f89e2bcd731c99c1c316b238957720c761a0301202e05
SHA5128878a0f2678908136158f3a6d88393e6831dfe1e64aa82adbb17c26b223381d5ac166dc241bedd554c8dd4e687e9bee624a91fbe3d2976ddfea1d811bf26f6d4