Analysis

  • max time kernel
    149s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03/03/2021, 16:40

General

  • Target

    7b2944122a7d202bf76e409529d9e05d2caf327372715b2361fbc6ec7c2ac660.exe

  • Size

    154KB

  • MD5

    97f7bbf2f5861692617d661758bcf35b

  • SHA1

    d59a0e3d77e22523a2fb657f756adebc32452ee0

  • SHA256

    7b2944122a7d202bf76e409529d9e05d2caf327372715b2361fbc6ec7c2ac660

  • SHA512

    eb8a846c2c16c3f405bf554ae715e915df680af0fd2901f427679a1cc5910ce5d2cb8e72c66ad2a6720093fde5c6156833aaa02655e5fd25a3e1b002251c7767

Malware Config

Signatures

  • DiamondFox

    DiamondFox is a multipurpose botnet with many capabilities.

  • DiamondFox payload 2 IoCs

    Detects DiamondFox payload in file/memory.

  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b2944122a7d202bf76e409529d9e05d2caf327372715b2361fbc6ec7c2ac660.exe
    "C:\Users\Admin\AppData\Local\Temp\7b2944122a7d202bf76e409529d9e05d2caf327372715b2361fbc6ec7c2ac660.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\7b2944122a7d202bf76e409529d9e05d2caf327372715b2361fbc6ec7c2ac660.exe' -Destination 'C:\Users\Admin\AppData\Local\svlspoo\spoolsv.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\svlspoo\spoolsv.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Users\Admin\AppData\Local\svlspoo\spoolsv.exe
        "C:\Users\Admin\AppData\Local\svlspoo\spoolsv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell $shell = New-Object -ComObject WScript.Shell;$shortcut = $shell.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\spoolsv.lnk');$shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\svlspoo\spoolsv.exe';$shortcut.Save()
          4⤵
          • Drops startup file
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2576

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1336-13-0x0000000007270000-0x0000000007271000-memory.dmp

          Filesize

          4KB

        • memory/1336-24-0x000000000A580000-0x000000000A581000-memory.dmp

          Filesize

          4KB

        • memory/1336-11-0x0000000007010000-0x0000000007011000-memory.dmp

          Filesize

          4KB

        • memory/1336-12-0x0000000007012000-0x0000000007013000-memory.dmp

          Filesize

          4KB

        • memory/1336-14-0x0000000007410000-0x0000000007411000-memory.dmp

          Filesize

          4KB

        • memory/1336-15-0x0000000007480000-0x0000000007481000-memory.dmp

          Filesize

          4KB

        • memory/1336-16-0x0000000007D80000-0x0000000007D81000-memory.dmp

          Filesize

          4KB

        • memory/1336-17-0x0000000008110000-0x0000000008111000-memory.dmp

          Filesize

          4KB

        • memory/1336-18-0x0000000008510000-0x0000000008511000-memory.dmp

          Filesize

          4KB

        • memory/1336-19-0x0000000008460000-0x0000000008461000-memory.dmp

          Filesize

          4KB

        • memory/1336-20-0x0000000009450000-0x0000000009451000-memory.dmp

          Filesize

          4KB

        • memory/1336-21-0x00000000090D0000-0x00000000090D1000-memory.dmp

          Filesize

          4KB

        • memory/1336-22-0x0000000009150000-0x0000000009151000-memory.dmp

          Filesize

          4KB

        • memory/1336-23-0x0000000009A00000-0x0000000009A01000-memory.dmp

          Filesize

          4KB

        • memory/1336-10-0x0000000007650000-0x0000000007651000-memory.dmp

          Filesize

          4KB

        • memory/1336-28-0x0000000007013000-0x0000000007014000-memory.dmp

          Filesize

          4KB

        • memory/1336-9-0x00000000048F0000-0x00000000048F1000-memory.dmp

          Filesize

          4KB

        • memory/1336-8-0x00000000737B0000-0x0000000073E9E000-memory.dmp

          Filesize

          6.9MB

        • memory/2428-29-0x0000000004F80000-0x0000000004F81000-memory.dmp

          Filesize

          4KB

        • memory/2576-36-0x0000000073A20000-0x000000007410E000-memory.dmp

          Filesize

          6.9MB

        • memory/2576-42-0x00000000080A0000-0x00000000080A1000-memory.dmp

          Filesize

          4KB

        • memory/2576-43-0x0000000004C70000-0x0000000004C71000-memory.dmp

          Filesize

          4KB

        • memory/2576-44-0x0000000004C72000-0x0000000004C73000-memory.dmp

          Filesize

          4KB

        • memory/2576-47-0x00000000085B0000-0x00000000085B1000-memory.dmp

          Filesize

          4KB

        • memory/2576-52-0x0000000004C73000-0x0000000004C74000-memory.dmp

          Filesize

          4KB

        • memory/3108-2-0x0000000005180000-0x0000000005181000-memory.dmp

          Filesize

          4KB

        • memory/3108-6-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/3108-5-0x0000000004FB0000-0x0000000004FC8000-memory.dmp

          Filesize

          96KB