Analysis
-
max time kernel
286s -
max time network
288s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
17/01/2022, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
nine.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
nine.exe
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
nine.exe
-
Size
210KB
-
MD5
4440d9bb248b6ecb966eef7af0ec276c
-
SHA1
dba8eb889861da4252bc2aca9794062a87fb6056
-
SHA256
93e7ecd77057b7388f80a012e15977613f6fa01bda350e684facdce6fee8e1da
-
SHA512
95abb7d39550c8b4b775d98e859e10eca7aa22193becd8656632b87689388c094ce872bf2aa0f24732d965b03ffa65f99e48774941c58779802e501d9bb610d6
Score
10/10
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 3 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral1/memory/1660-57-0x0000000000020000-0x0000000000038000-memory.dmp diamondfox behavioral1/memory/1660-58-0x0000000000400000-0x0000000001A9E000-memory.dmp diamondfox behavioral1/memory/748-72-0x0000000000400000-0x0000000001A9E000-memory.dmp diamondfox -
Executes dropped EXE 1 IoCs
pid Process 748 SearchIndexer.exe -
Loads dropped DLL 2 IoCs
pid Process 524 powershell.exe 524 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 524 powershell.exe 524 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 524 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1660 nine.exe 748 SearchIndexer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1660 wrote to memory of 524 1660 nine.exe 27 PID 1660 wrote to memory of 524 1660 nine.exe 27 PID 1660 wrote to memory of 524 1660 nine.exe 27 PID 1660 wrote to memory of 524 1660 nine.exe 27 PID 524 wrote to memory of 748 524 powershell.exe 31 PID 524 wrote to memory of 748 524 powershell.exe 31 PID 524 wrote to memory of 748 524 powershell.exe 31 PID 524 wrote to memory of 748 524 powershell.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\nine.exe"C:\Users\Admin\AppData\Local\Temp\nine.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\nine.exe' -Destination 'C:\Users\Admin\AppData\Local\xerasr\SearchIndexer.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\xerasr\SearchIndexer.exe'2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\xerasr\SearchIndexer.exe"C:\Users\Admin\AppData\Local\xerasr\SearchIndexer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:748
-
-