Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
25/05/2021, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
foo.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
foo.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
foo.exe
-
Size
212KB
-
MD5
433d77782664455b950e1508c0787f1a
-
SHA1
181103f2b8dd9a8bf954f22670f08c7193cb8e8f
-
SHA256
e3be8bb6d3f2e7bd860e41df6a60e1a5698bec5670ea127b627ef8b16fb0d254
-
SHA512
5c8da80d17e2a023d2bb2621ec14d97412fd02a9c645044e1c4818c4e55c29e8fc5ad4cae30817d4e6e45d52e3fdd44b8581be0e411b74fff26e7ae44008d390
Score
10/10
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 3 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral1/files/0x00050000000130f9-61.dat diamondfox behavioral1/files/0x00050000000130f9-62.dat diamondfox behavioral1/files/0x00050000000130f9-64.dat diamondfox -
Executes dropped EXE 1 IoCs
pid Process 1308 MicrosoftEdgeCPS.exe -
Loads dropped DLL 2 IoCs
pid Process 1104 foo.exe 1104 foo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1624 powershell.exe 1624 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1624 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1308 1104 foo.exe 29 PID 1104 wrote to memory of 1308 1104 foo.exe 29 PID 1104 wrote to memory of 1308 1104 foo.exe 29 PID 1104 wrote to memory of 1308 1104 foo.exe 29 PID 1308 wrote to memory of 1624 1308 MicrosoftEdgeCPS.exe 30 PID 1308 wrote to memory of 1624 1308 MicrosoftEdgeCPS.exe 30 PID 1308 wrote to memory of 1624 1308 MicrosoftEdgeCPS.exe 30 PID 1308 wrote to memory of 1624 1308 MicrosoftEdgeCPS.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\foo.exe"C:\Users\Admin\AppData\Local\Temp\foo.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableRealtimeMonitoring 13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-