Analysis
-
max time kernel
4294192s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
10-03-2022 16:56
Static task
static1
Behavioral task
behavioral1
Sample
573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe
Resource
win7-20220223-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe
-
Size
485KB
-
MD5
1a01c1271297700846837182a5a2ec8b
-
SHA1
4fac1ede27ad29375398c3a46c5f33e7d5293637
-
SHA256
573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03
-
SHA512
3ad93395d5aae9f7696a11099b04306f0eef8d5a2d5abad8be4e537fe708094baf51cddaf57bb19251beb51f223c05d551d054effd21ff72315a54e5858195ff
Score
10/10
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
resource yara_rule behavioral1/memory/844-69-0x0000000000400000-0x0000000000436000-memory.dmp diamondfox behavioral1/memory/844-72-0x0000000000400000-0x0000000000436000-memory.dmp diamondfox behavioral1/memory/592-101-0x0000000000400000-0x0000000000436000-memory.dmp diamondfox -
Executes dropped EXE 3 IoCs
pid Process 1108 MicrosoftEdgeCPS.exe 592 MicrosoftEdgeCPS.exe 1532 MicrosoftEdgeCPS.exe -
Deletes itself 1 IoCs
pid Process 1920 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 844 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 1108 MicrosoftEdgeCPS.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1052 set thread context of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1108 set thread context of 592 1108 MicrosoftEdgeCPS.exe 33 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 1920 powershell.exe 1108 MicrosoftEdgeCPS.exe 1756 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 1108 MicrosoftEdgeCPS.exe Token: SeDebugPrivilege 1756 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 1052 wrote to memory of 844 1052 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 29 PID 844 wrote to memory of 1108 844 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 30 PID 844 wrote to memory of 1108 844 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 30 PID 844 wrote to memory of 1108 844 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 30 PID 844 wrote to memory of 1108 844 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 30 PID 844 wrote to memory of 1920 844 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 32 PID 844 wrote to memory of 1920 844 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 32 PID 844 wrote to memory of 1920 844 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 32 PID 844 wrote to memory of 1920 844 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 32 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 1108 wrote to memory of 592 1108 MicrosoftEdgeCPS.exe 33 PID 592 wrote to memory of 1532 592 MicrosoftEdgeCPS.exe 34 PID 592 wrote to memory of 1532 592 MicrosoftEdgeCPS.exe 34 PID 592 wrote to memory of 1532 592 MicrosoftEdgeCPS.exe 34 PID 592 wrote to memory of 1532 592 MicrosoftEdgeCPS.exe 34 PID 592 wrote to memory of 1756 592 MicrosoftEdgeCPS.exe 35 PID 592 wrote to memory of 1756 592 MicrosoftEdgeCPS.exe 35 PID 592 wrote to memory of 1756 592 MicrosoftEdgeCPS.exe 35 PID 592 wrote to memory of 1756 592 MicrosoftEdgeCPS.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe"C:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exeC:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeCPS.exeC:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeCPS.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"5⤵
- Executes dropped EXE
PID:1532
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -s 10; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeCPS.exe' -Force -Recurse5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -s 10; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe' -Force -Recurse3⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-