Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09/02/2021, 15:19

General

  • Target

    1B59.tmp.bin.exe

  • Size

    376KB

  • MD5

    160844e5811ca8258e61cf44bf8587e5

  • SHA1

    215bfc756f944e36c53e73e4be99c68b8d36df04

  • SHA256

    f0498105de4bca70065bac976d8da9cb153a174dedbf0e3d932abae2eb94f152

  • SHA512

    e92082ad2a68292622c2cff0ea7d77e034c1c4118947dcf6c3cf390aa21f03c0cd72602a41f896534af5cfec3087d6e0e7a1a9b6ce3f88a9d468ec910a0048a8

Malware Config

Signatures

  • DiamondFox

    DiamondFox is a multipurpose botnet with many capabilities.

  • DiamondFox payload 1 IoCs

    Detects DiamondFox payload in file/memory.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 9 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetThreadContext 5 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1B59.tmp.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\1B59.tmp.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe
      "C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        "wmic" /Node:localhost /Namespace:\\root\SecurityCenter2 path AntiVirusProduct get DisplayName /FORMAT:List
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:732
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        "wmic" os get caption /FORMAT:List
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:852
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        "wmic" path win32_VideoController get caption /FORMAT:List
        3⤵
          PID:1760
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          "wmic" path win32_NetworkAdapterConfiguration where IPEnabled=1 get IPAddress /FORMAT:List
          3⤵
            PID:2068
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            "wmic" LogicalDisk Where DriveType=4 get VolumeName /FORMAT:List
            3⤵
              PID:2504
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              "wmic" path win32_PingStatus where address='rusacenwaxalvi.xyz' get StatusCode /FORMAT:List
              3⤵
                PID:3048
              • C:\Windows\SysWOW64\Wbem\wmic.exe
                "wmic" path win32_PingStatus where address='rusacenwaxalvi.xyz' get ResponseTime /FORMAT:List
                3⤵
                  PID:4052
                • C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe
                  /scomma "C:\Users\Admin\AppData\Roaming\EdgeCP\1.log"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4496
                • C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe
                  /scomma "C:\Users\Admin\AppData\Roaming\EdgeCP\4.log"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:196
                • C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe
                  /scomma "C:\Users\Admin\AppData\Roaming\EdgeCP\2.log"
                  3⤵
                  • Executes dropped EXE
                  PID:2312
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 88
                    4⤵
                    • Program crash
                    PID:2820
                • C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe
                  /scomma "C:\Users\Admin\AppData\Roaming\EdgeCP\3.log"
                  3⤵
                  • Executes dropped EXE
                  PID:4400
                • C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe
                  /VisitTimeFilterType 2 /VisitTimeFilterValue 6 /scomma "C:\Users\Admin\AppData\Roaming\EdgeCP\6.log"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1500

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/196-21-0x0000000000400000-0x0000000000405000-memory.dmp

              Filesize

              20KB

            • memory/196-26-0x0000000000400000-0x0000000000405000-memory.dmp

              Filesize

              20KB

            • memory/1500-34-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB

            • memory/1500-37-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB

            • memory/2820-29-0x00000000045A0000-0x00000000045A1000-memory.dmp

              Filesize

              4KB

            • memory/4236-7-0x0000000004630000-0x0000000006B85000-memory.dmp

              Filesize

              37.3MB

            • memory/4400-30-0x0000000000400000-0x0000000000455000-memory.dmp

              Filesize

              340KB

            • memory/4400-33-0x0000000000400000-0x0000000000455000-memory.dmp

              Filesize

              340KB

            • memory/4496-19-0x0000000000400000-0x000000000047C000-memory.dmp

              Filesize

              496KB

            • memory/4496-16-0x0000000000400000-0x000000000047C000-memory.dmp

              Filesize

              496KB

            • memory/4696-2-0x0000000004890000-0x0000000006DE5000-memory.dmp

              Filesize

              37.3MB

            • memory/4696-3-0x0000000000400000-0x0000000002955000-memory.dmp

              Filesize

              37.3MB