Analysis
-
max time kernel
109s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22/01/2021, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe
Resource
win10v20201028
General
-
Target
f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe
-
Size
90KB
-
MD5
4dddf0bfbb7fff60a92926426a0754e4
-
SHA1
423f4f6b9c0805222b9577b52862af684030c002
-
SHA256
f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788
-
SHA512
713fec6b0a8067dd39579ad9280442bf215efb95b628e9b2f3cdb61fb4bc796bfb2857810fe393757a25006ba7203878ce9c4763ed15db6d8a5785badbc21744
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 2 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral2/files/0x000600000001ab6e-24.dat diamondfox behavioral2/files/0x000600000001ab6e-23.dat diamondfox -
Executes dropped EXE 1 IoCs
pid Process 3912 atiedxx.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiedxx.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 564 powershell.exe 564 powershell.exe 564 powershell.exe 3232 powershell.exe 3232 powershell.exe 3232 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 564 powershell.exe Token: SeDebugPrivilege 3232 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1056 f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe 3912 atiedxx.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1056 wrote to memory of 564 1056 f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe 75 PID 1056 wrote to memory of 564 1056 f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe 75 PID 1056 wrote to memory of 564 1056 f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe 75 PID 564 wrote to memory of 3912 564 powershell.exe 80 PID 564 wrote to memory of 3912 564 powershell.exe 80 PID 564 wrote to memory of 3912 564 powershell.exe 80 PID 3912 wrote to memory of 3232 3912 atiedxx.exe 81 PID 3912 wrote to memory of 3232 3912 atiedxx.exe 81 PID 3912 wrote to memory of 3232 3912 atiedxx.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe"C:\Users\Admin\AppData\Local\Temp\f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788.exe' -Destination 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe"C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell $shell = New-Object -ComObject WScript.Shell;$shortcut = $shell.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiedxx.lnk');$shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe';$shortcut.Save()4⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
-