Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    22/01/2021, 17:28

General

  • Target

    1607460946_Loade.exe

  • Size

    140KB

  • MD5

    7bf6de1dc69718455fb90e9a30a9183d

  • SHA1

    3a7f90978908d56d2b689aede98572581442cb19

  • SHA256

    8ca67e40d0d3826efc58feb163760f994eae52731f74c2a3d0d45148a2996bb2

  • SHA512

    78d208eb831789a85d3a5920560fa7c7fe1385491830dbc1e6caac35bb7cba66692cdc1d6b9c06f12a80767e1fa78cb56f011ab9e982839976757fd6cc08ccd9

Malware Config

Signatures

  • DiamondFox

    DiamondFox is a multipurpose botnet with many capabilities.

  • DiamondFox payload 2 IoCs

    Detects DiamondFox payload in file/memory.

  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1607460946_Loade.exe
    "C:\Users\Admin\AppData\Local\Temp\1607460946_Loade.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\1607460946_Loade.exe' -Destination 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe'
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe
        "C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1592
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell $shell = New-Object -ComObject WScript.Shell;$shortcut = $shell.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiedxx.lnk');$shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe';$shortcut.Save()
          4⤵
          • Drops startup file
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1028
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/792-15-0x0000000005240000-0x0000000005241000-memory.dmp

    Filesize

    4KB

  • memory/792-14-0x0000000002590000-0x0000000002591000-memory.dmp

    Filesize

    4KB

  • memory/792-33-0x0000000006390000-0x0000000006391000-memory.dmp

    Filesize

    4KB

  • memory/792-31-0x0000000005820000-0x0000000005821000-memory.dmp

    Filesize

    4KB

  • memory/792-24-0x00000000061F0000-0x00000000061F1000-memory.dmp

    Filesize

    4KB

  • memory/792-23-0x00000000056B0000-0x00000000056B1000-memory.dmp

    Filesize

    4KB

  • memory/792-8-0x00000000760B1000-0x00000000760B3000-memory.dmp

    Filesize

    8KB

  • memory/792-32-0x000000007EF30000-0x000000007EF31000-memory.dmp

    Filesize

    4KB

  • memory/792-18-0x0000000005640000-0x0000000005641000-memory.dmp

    Filesize

    4KB

  • memory/792-9-0x0000000073E90000-0x000000007457E000-memory.dmp

    Filesize

    6.9MB

  • memory/792-10-0x0000000002010000-0x0000000002011000-memory.dmp

    Filesize

    4KB

  • memory/792-11-0x0000000004800000-0x0000000004801000-memory.dmp

    Filesize

    4KB

  • memory/792-12-0x0000000004802000-0x0000000004803000-memory.dmp

    Filesize

    4KB

  • memory/792-13-0x0000000004840000-0x0000000004841000-memory.dmp

    Filesize

    4KB

  • memory/1028-47-0x0000000000790000-0x0000000000791000-memory.dmp

    Filesize

    4KB

  • memory/1028-62-0x00000000057D0000-0x00000000057D1000-memory.dmp

    Filesize

    4KB

  • memory/1028-51-0x0000000000752000-0x0000000000753000-memory.dmp

    Filesize

    4KB

  • memory/1028-50-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/1028-49-0x0000000005120000-0x0000000005121000-memory.dmp

    Filesize

    4KB

  • memory/1028-48-0x0000000004870000-0x0000000004871000-memory.dmp

    Filesize

    4KB

  • memory/1028-52-0x0000000005300000-0x0000000005301000-memory.dmp

    Filesize

    4KB

  • memory/1028-46-0x0000000073EC0000-0x00000000745AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1448-65-0x000007FEFBA01000-0x000007FEFBA03000-memory.dmp

    Filesize

    8KB

  • memory/1592-38-0x0000000000650000-0x0000000000661000-memory.dmp

    Filesize

    68KB

  • memory/1864-2-0x0000000000710000-0x0000000000721000-memory.dmp

    Filesize

    68KB

  • memory/1864-6-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1864-5-0x0000000000020000-0x0000000000038000-memory.dmp

    Filesize

    96KB