Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08/11/2020, 13:55

General

  • Target

    http://148.163.12.101/WMndFrdk?keyword=Other&cost=0.00100&ad_campaign_id=262704&source=145866

  • Sample

    201108-nh22zk7ppj

Malware Config

Extracted

Family

diamondfox

C2

https://www.datanalysis.club/ms/gate.php

https://www.datanalysis.site/ms/gate.php

https://www.datanalysis.space/ms/gate.php

Mutex

cBFxpht5aCf0jy4gnUs3JgtqCB2O2tWJ

xor.plain

Signatures

  • DiamondFox

    DiamondFox is a multipurpose botnet with many capabilities.

  • DiamondFox payload 2 IoCs

    Detects DiamondFox payload in file/memory.

  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://148.163.12.101/WMndFrdk?keyword=Other&cost=0.00100&ad_campaign_id=262704&source=145866
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3812 CREDAT:82945 /prefetch:2
      2⤵
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3556
      • C:\Windows\SysWOW64\dllhost.exe
        "C:\Windows\system32\dllhost.exe"
        3⤵
        • Checks BIOS information in registry
        • Writes to the Master Boot Record (MBR)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3496
        • C:\Users\Admin\AppData\Roaming\setup.exe
          "C:\Users\Admin\AppData\Roaming\setup.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:776
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell Copy-Item -Path 'C:\Users\Admin\AppData\Roaming\setup.exe' -Destination 'C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4028
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3ac
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4028-15-0x000000006BFC0000-0x000000006C6AE000-memory.dmp

    Filesize

    6.9MB

  • memory/4028-21-0x0000000007B30000-0x0000000007B31000-memory.dmp

    Filesize

    4KB

  • memory/4028-16-0x0000000004750000-0x0000000004751000-memory.dmp

    Filesize

    4KB

  • memory/4028-17-0x0000000007320000-0x0000000007321000-memory.dmp

    Filesize

    4KB

  • memory/4028-18-0x00000000070F0000-0x00000000070F1000-memory.dmp

    Filesize

    4KB

  • memory/4028-19-0x0000000007AC0000-0x0000000007AC1000-memory.dmp

    Filesize

    4KB

  • memory/4028-20-0x0000000007290000-0x0000000007291000-memory.dmp

    Filesize

    4KB

  • memory/4028-22-0x0000000007AA0000-0x0000000007AA1000-memory.dmp

    Filesize

    4KB

  • memory/4028-23-0x00000000083F0000-0x00000000083F1000-memory.dmp

    Filesize

    4KB

  • memory/4028-24-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/4028-25-0x0000000009030000-0x0000000009031000-memory.dmp

    Filesize

    4KB

  • memory/4028-26-0x0000000008F60000-0x0000000008F61000-memory.dmp

    Filesize

    4KB

  • memory/4028-27-0x0000000008FC0000-0x0000000008FC1000-memory.dmp

    Filesize

    4KB

  • memory/4028-28-0x0000000009870000-0x0000000009871000-memory.dmp

    Filesize

    4KB

  • memory/4028-29-0x000000000A3F0000-0x000000000A3F1000-memory.dmp

    Filesize

    4KB