Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08/03/2021, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe
Resource
win10v20201028
General
-
Target
9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe
-
Size
1.4MB
-
MD5
f3da87fb27befc3df1eec757587fe93b
-
SHA1
798f0f6dba708beb6aee86469e5084b08d2e2714
-
SHA256
9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf
-
SHA512
51d0a44359eeacb8344955099dce9fec20e46ddf509aea1036503eb0e278fbac363d797fb8745ea3b8ddd5e6f5c3c81f496e0354a10603e80c3028492bc7adaa
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 3 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral1/memory/1932-5-0x0000000000400000-0x0000000000435000-memory.dmp diamondfox behavioral1/memory/1932-4-0x00000000001B0000-0x00000000001E3000-memory.dmp diamondfox behavioral1/memory/1612-17-0x0000000000400000-0x0000000000435000-memory.dmp diamondfox -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1480-28-0x0000000000400000-0x000000000047C000-memory.dmp WebBrowserPassView behavioral1/memory/1480-29-0x00000000004466F4-mapping.dmp WebBrowserPassView behavioral1/memory/1480-34-0x0000000000400000-0x000000000047C000-memory.dmp WebBrowserPassView -
Nirsoft 3 IoCs
resource yara_rule behavioral1/memory/1480-28-0x0000000000400000-0x000000000047C000-memory.dmp Nirsoft behavioral1/memory/1480-29-0x00000000004466F4-mapping.dmp Nirsoft behavioral1/memory/1480-34-0x0000000000400000-0x000000000047C000-memory.dmp Nirsoft -
Executes dropped EXE 3 IoCs
pid Process 1612 MicrosoftEdgeCPS.exe 1320 MicrosoftEdgeCPS.exe 1480 MicrosoftEdgeCPS.exe -
Loads dropped DLL 3 IoCs
pid Process 1932 9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe 1932 9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe 1612 MicrosoftEdgeCPS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 1612 set thread context of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 set thread context of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1320 set thread context of 1100 1320 MicrosoftEdgeCPS.exe 48 PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe PID 1612 set thread context of 0 1612 MicrosoftEdgeCPS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1612 MicrosoftEdgeCPS.exe 1480 MicrosoftEdgeCPS.exe 1480 MicrosoftEdgeCPS.exe 1612 MicrosoftEdgeCPS.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1320 MicrosoftEdgeCPS.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 336 wmic.exe Token: SeSecurityPrivilege 336 wmic.exe Token: SeTakeOwnershipPrivilege 336 wmic.exe Token: SeLoadDriverPrivilege 336 wmic.exe Token: SeSystemProfilePrivilege 336 wmic.exe Token: SeSystemtimePrivilege 336 wmic.exe Token: SeProfSingleProcessPrivilege 336 wmic.exe Token: SeIncBasePriorityPrivilege 336 wmic.exe Token: SeCreatePagefilePrivilege 336 wmic.exe Token: SeBackupPrivilege 336 wmic.exe Token: SeRestorePrivilege 336 wmic.exe Token: SeShutdownPrivilege 336 wmic.exe Token: SeDebugPrivilege 336 wmic.exe Token: SeSystemEnvironmentPrivilege 336 wmic.exe Token: SeRemoteShutdownPrivilege 336 wmic.exe Token: SeUndockPrivilege 336 wmic.exe Token: SeManageVolumePrivilege 336 wmic.exe Token: 33 336 wmic.exe Token: 34 336 wmic.exe Token: 35 336 wmic.exe Token: SeIncreaseQuotaPrivilege 336 wmic.exe Token: SeSecurityPrivilege 336 wmic.exe Token: SeTakeOwnershipPrivilege 336 wmic.exe Token: SeLoadDriverPrivilege 336 wmic.exe Token: SeSystemProfilePrivilege 336 wmic.exe Token: SeSystemtimePrivilege 336 wmic.exe Token: SeProfSingleProcessPrivilege 336 wmic.exe Token: SeIncBasePriorityPrivilege 336 wmic.exe Token: SeCreatePagefilePrivilege 336 wmic.exe Token: SeBackupPrivilege 336 wmic.exe Token: SeRestorePrivilege 336 wmic.exe Token: SeShutdownPrivilege 336 wmic.exe Token: SeDebugPrivilege 336 wmic.exe Token: SeSystemEnvironmentPrivilege 336 wmic.exe Token: SeRemoteShutdownPrivilege 336 wmic.exe Token: SeUndockPrivilege 336 wmic.exe Token: SeManageVolumePrivilege 336 wmic.exe Token: 33 336 wmic.exe Token: 34 336 wmic.exe Token: 35 336 wmic.exe Token: SeIncreaseQuotaPrivilege 820 wmic.exe Token: SeSecurityPrivilege 820 wmic.exe Token: SeTakeOwnershipPrivilege 820 wmic.exe Token: SeLoadDriverPrivilege 820 wmic.exe Token: SeSystemProfilePrivilege 820 wmic.exe Token: SeSystemtimePrivilege 820 wmic.exe Token: SeProfSingleProcessPrivilege 820 wmic.exe Token: SeIncBasePriorityPrivilege 820 wmic.exe Token: SeCreatePagefilePrivilege 820 wmic.exe Token: SeBackupPrivilege 820 wmic.exe Token: SeRestorePrivilege 820 wmic.exe Token: SeShutdownPrivilege 820 wmic.exe Token: SeDebugPrivilege 820 wmic.exe Token: SeSystemEnvironmentPrivilege 820 wmic.exe Token: SeRemoteShutdownPrivilege 820 wmic.exe Token: SeUndockPrivilege 820 wmic.exe Token: SeManageVolumePrivilege 820 wmic.exe Token: 33 820 wmic.exe Token: 34 820 wmic.exe Token: 35 820 wmic.exe Token: SeIncreaseQuotaPrivilege 820 wmic.exe Token: SeSecurityPrivilege 820 wmic.exe Token: SeTakeOwnershipPrivilege 820 wmic.exe Token: SeLoadDriverPrivilege 820 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1612 1932 9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe 29 PID 1932 wrote to memory of 1612 1932 9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe 29 PID 1932 wrote to memory of 1612 1932 9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe 29 PID 1932 wrote to memory of 1612 1932 9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe 29 PID 1612 wrote to memory of 336 1612 MicrosoftEdgeCPS.exe 31 PID 1612 wrote to memory of 336 1612 MicrosoftEdgeCPS.exe 31 PID 1612 wrote to memory of 336 1612 MicrosoftEdgeCPS.exe 31 PID 1612 wrote to memory of 336 1612 MicrosoftEdgeCPS.exe 31 PID 1612 wrote to memory of 820 1612 MicrosoftEdgeCPS.exe 33 PID 1612 wrote to memory of 820 1612 MicrosoftEdgeCPS.exe 33 PID 1612 wrote to memory of 820 1612 MicrosoftEdgeCPS.exe 33 PID 1612 wrote to memory of 820 1612 MicrosoftEdgeCPS.exe 33 PID 1612 wrote to memory of 1508 1612 MicrosoftEdgeCPS.exe 36 PID 1612 wrote to memory of 1508 1612 MicrosoftEdgeCPS.exe 36 PID 1612 wrote to memory of 1508 1612 MicrosoftEdgeCPS.exe 36 PID 1612 wrote to memory of 1508 1612 MicrosoftEdgeCPS.exe 36 PID 1612 wrote to memory of 372 1612 MicrosoftEdgeCPS.exe 38 PID 1612 wrote to memory of 372 1612 MicrosoftEdgeCPS.exe 38 PID 1612 wrote to memory of 372 1612 MicrosoftEdgeCPS.exe 38 PID 1612 wrote to memory of 372 1612 MicrosoftEdgeCPS.exe 38 PID 1612 wrote to memory of 1600 1612 MicrosoftEdgeCPS.exe 40 PID 1612 wrote to memory of 1600 1612 MicrosoftEdgeCPS.exe 40 PID 1612 wrote to memory of 1600 1612 MicrosoftEdgeCPS.exe 40 PID 1612 wrote to memory of 1600 1612 MicrosoftEdgeCPS.exe 40 PID 1612 wrote to memory of 1964 1612 MicrosoftEdgeCPS.exe 42 PID 1612 wrote to memory of 1964 1612 MicrosoftEdgeCPS.exe 42 PID 1612 wrote to memory of 1964 1612 MicrosoftEdgeCPS.exe 42 PID 1612 wrote to memory of 1964 1612 MicrosoftEdgeCPS.exe 42 PID 1612 wrote to memory of 804 1612 MicrosoftEdgeCPS.exe 44 PID 1612 wrote to memory of 804 1612 MicrosoftEdgeCPS.exe 44 PID 1612 wrote to memory of 804 1612 MicrosoftEdgeCPS.exe 44 PID 1612 wrote to memory of 804 1612 MicrosoftEdgeCPS.exe 44 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1320 1612 MicrosoftEdgeCPS.exe 46 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1612 wrote to memory of 1480 1612 MicrosoftEdgeCPS.exe 47 PID 1320 wrote to memory of 1100 1320 MicrosoftEdgeCPS.exe 48 PID 1320 wrote to memory of 1100 1320 MicrosoftEdgeCPS.exe 48 PID 1320 wrote to memory of 1100 1320 MicrosoftEdgeCPS.exe 48 PID 1320 wrote to memory of 1100 1320 MicrosoftEdgeCPS.exe 48 PID 1320 wrote to memory of 1100 1320 MicrosoftEdgeCPS.exe 48 PID 1320 wrote to memory of 1100 1320 MicrosoftEdgeCPS.exe 48 PID 1320 wrote to memory of 1100 1320 MicrosoftEdgeCPS.exe 48 PID 1612 wrote to memory of 1108 1612 MicrosoftEdgeCPS.exe 49 PID 1612 wrote to memory of 1108 1612 MicrosoftEdgeCPS.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe"C:\Users\Admin\AppData\Local\Temp\9526e9792bed9efe4ed6101deff93b649701cf0f77b024567b5c0540b4b3c7bf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" /Node:localhost /Namespace:\\root\SecurityCenter2 path AntiVirusProduct get DisplayName /FORMAT:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" os get caption /FORMAT:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get caption /FORMAT:List3⤵PID:1508
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_NetworkAdapterConfiguration where IPEnabled=1 get IPAddress /FORMAT:List3⤵PID:372
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" LogicalDisk Where DriveType=4 get VolumeName /FORMAT:List3⤵PID:1600
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='185.193.88.150' get StatusCode /FORMAT:List3⤵PID:1964
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='185.193.88.150' get ResponseTime /FORMAT:List3⤵PID:804
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe4⤵PID:1100
-
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Roaming\EdgeCP\1.log"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='185.193.88.150' get StatusCode /FORMAT:List3⤵PID:1108
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='185.193.88.150' get ResponseTime /FORMAT:List3⤵PID:1704
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='185.193.88.150' get StatusCode /FORMAT:List3⤵PID:876
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='185.193.88.150' get ResponseTime /FORMAT:List3⤵PID:1912
-
-