Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17/11/2020, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v20201028
General
-
Target
setup.exe
-
Size
90KB
-
MD5
1d5b46ff3cd12fd31362557299d6f488
-
SHA1
42f5d828b03f5e4c03e9f935683b5d82e6e7dc26
-
SHA256
2f134d1467c3765898a1befc311b86414f8df96d307a6f05b23eebbb8866a69c
-
SHA512
4dd2071b369bd150da53446313fff30b08054b8724a02444c400db2f0b14062c51a5aff2390b1845cc87b629ffc77ecc5e72877f77f824553b6f68a7b39a9d23
Malware Config
Extracted
diamondfox
https://www.datanalysis.club/ms/gate.php
https://www.datanalysis.site/ms/gate.php
https://www.datanalysis.space/ms/gate.php
cBFxpht5aCf0jy4gnUs3JgtqCB2O2tWJ
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 7 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral2/files/0x000400000001a4f4-19.dat diamondfox behavioral2/files/0x000400000001a4f4-20.dat diamondfox behavioral2/files/0x000400000001a4f4-68.dat diamondfox behavioral2/files/0x000400000001a4f4-73.dat diamondfox behavioral2/files/0x000400000001a4f4-78.dat diamondfox behavioral2/files/0x000400000001a4f4-82.dat diamondfox behavioral2/files/0x000400000001a4f4-86.dat diamondfox -
Executes dropped EXE 6 IoCs
pid Process 1708 atiedxx.exe 2076 atiedxx.exe 3296 atiedxx.exe 3948 atiedxx.exe 1008 atiedxx.exe 4056 atiedxx.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiedxx.lnk powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1708 set thread context of 2076 1708 atiedxx.exe 88 PID 1708 set thread context of 3296 1708 atiedxx.exe 90 PID 1708 set thread context of 3948 1708 atiedxx.exe 94 PID 1708 set thread context of 1008 1708 atiedxx.exe 95 PID 1708 set thread context of 4056 1708 atiedxx.exe 96 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 520 PING.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 188 powershell.exe 188 powershell.exe 188 powershell.exe 3696 powershell.exe 3696 powershell.exe 3696 powershell.exe 428 Powershell.exe 428 Powershell.exe 428 Powershell.exe 2076 atiedxx.exe 2076 atiedxx.exe 2076 atiedxx.exe 2076 atiedxx.exe 3296 atiedxx.exe 3296 atiedxx.exe 3296 atiedxx.exe 3296 atiedxx.exe 3948 atiedxx.exe 3948 atiedxx.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 188 powershell.exe Token: SeDebugPrivilege 3696 powershell.exe Token: SeDebugPrivilege 428 Powershell.exe Token: SeDebugPrivilege 2076 atiedxx.exe Token: SeDebugPrivilege 3948 atiedxx.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1080 setup.exe 1708 atiedxx.exe 4056 atiedxx.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 1080 wrote to memory of 188 1080 setup.exe 78 PID 1080 wrote to memory of 188 1080 setup.exe 78 PID 1080 wrote to memory of 188 1080 setup.exe 78 PID 188 wrote to memory of 1708 188 powershell.exe 81 PID 188 wrote to memory of 1708 188 powershell.exe 81 PID 188 wrote to memory of 1708 188 powershell.exe 81 PID 1708 wrote to memory of 3696 1708 atiedxx.exe 82 PID 1708 wrote to memory of 3696 1708 atiedxx.exe 82 PID 1708 wrote to memory of 3696 1708 atiedxx.exe 82 PID 1708 wrote to memory of 428 1708 atiedxx.exe 85 PID 1708 wrote to memory of 428 1708 atiedxx.exe 85 PID 1708 wrote to memory of 428 1708 atiedxx.exe 85 PID 1708 wrote to memory of 2076 1708 atiedxx.exe 88 PID 1708 wrote to memory of 2076 1708 atiedxx.exe 88 PID 1708 wrote to memory of 2076 1708 atiedxx.exe 88 PID 1708 wrote to memory of 2076 1708 atiedxx.exe 88 PID 1708 wrote to memory of 2076 1708 atiedxx.exe 88 PID 1708 wrote to memory of 2076 1708 atiedxx.exe 88 PID 1708 wrote to memory of 2076 1708 atiedxx.exe 88 PID 1708 wrote to memory of 2076 1708 atiedxx.exe 88 PID 1708 wrote to memory of 3296 1708 atiedxx.exe 90 PID 1708 wrote to memory of 3296 1708 atiedxx.exe 90 PID 1708 wrote to memory of 3296 1708 atiedxx.exe 90 PID 1708 wrote to memory of 3296 1708 atiedxx.exe 90 PID 2076 wrote to memory of 968 2076 atiedxx.exe 91 PID 2076 wrote to memory of 968 2076 atiedxx.exe 91 PID 2076 wrote to memory of 968 2076 atiedxx.exe 91 PID 968 wrote to memory of 520 968 cmd.exe 93 PID 968 wrote to memory of 520 968 cmd.exe 93 PID 968 wrote to memory of 520 968 cmd.exe 93 PID 1708 wrote to memory of 3296 1708 atiedxx.exe 90 PID 1708 wrote to memory of 3296 1708 atiedxx.exe 90 PID 1708 wrote to memory of 3296 1708 atiedxx.exe 90 PID 1708 wrote to memory of 3296 1708 atiedxx.exe 90 PID 1708 wrote to memory of 3296 1708 atiedxx.exe 90 PID 1708 wrote to memory of 3948 1708 atiedxx.exe 94 PID 1708 wrote to memory of 3948 1708 atiedxx.exe 94 PID 1708 wrote to memory of 3948 1708 atiedxx.exe 94 PID 1708 wrote to memory of 3948 1708 atiedxx.exe 94 PID 1708 wrote to memory of 3948 1708 atiedxx.exe 94 PID 1708 wrote to memory of 3948 1708 atiedxx.exe 94 PID 1708 wrote to memory of 3948 1708 atiedxx.exe 94 PID 1708 wrote to memory of 3948 1708 atiedxx.exe 94 PID 1708 wrote to memory of 3948 1708 atiedxx.exe 94 PID 1708 wrote to memory of 1008 1708 atiedxx.exe 95 PID 1708 wrote to memory of 1008 1708 atiedxx.exe 95 PID 1708 wrote to memory of 1008 1708 atiedxx.exe 95 PID 1708 wrote to memory of 1008 1708 atiedxx.exe 95 PID 1708 wrote to memory of 1008 1708 atiedxx.exe 95 PID 1708 wrote to memory of 1008 1708 atiedxx.exe 95 PID 1708 wrote to memory of 1008 1708 atiedxx.exe 95 PID 1708 wrote to memory of 1008 1708 atiedxx.exe 95 PID 1708 wrote to memory of 1008 1708 atiedxx.exe 95 PID 1708 wrote to memory of 4056 1708 atiedxx.exe 96 PID 1708 wrote to memory of 4056 1708 atiedxx.exe 96 PID 1708 wrote to memory of 4056 1708 atiedxx.exe 96 PID 1708 wrote to memory of 4056 1708 atiedxx.exe 96 PID 1708 wrote to memory of 4056 1708 atiedxx.exe 96 PID 1708 wrote to memory of 4056 1708 atiedxx.exe 96 PID 1708 wrote to memory of 4056 1708 atiedxx.exe 96 PID 1708 wrote to memory of 4056 1708 atiedxx.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\setup.exe' -Destination 'C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe"C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell $shell = New-Object -ComObject WScript.Shell;$shortcut = $shell.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiedxx.lnk');$shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe';$shortcut.Save()4⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell Set-MpPreference -DisableRealtimeMonitoring 14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:520
-
-
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe/scomma C:\Users\Admin\AppData\Local\tiedaxx\1.log4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe/scomma C:\Users\Admin\AppData\Local\tiedaxx\2.log4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe/scomma C:\Users\Admin\AppData\Local\tiedaxx\3.log4⤵
- Executes dropped EXE
PID:1008
-
-
C:\Users\Admin\AppData\Local\tiedaxx\atiedxx.exe/scomma C:\Users\Admin\AppData\Local\tiedaxx\4.log4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4056
-
-
-