Analysis
-
max time kernel
142s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
10-03-2022 16:56
Static task
static1
Behavioral task
behavioral1
Sample
573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe
Resource
win7-20220223-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe
-
Size
485KB
-
MD5
1a01c1271297700846837182a5a2ec8b
-
SHA1
4fac1ede27ad29375398c3a46c5f33e7d5293637
-
SHA256
573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03
-
SHA512
3ad93395d5aae9f7696a11099b04306f0eef8d5a2d5abad8be4e537fe708094baf51cddaf57bb19251beb51f223c05d551d054effd21ff72315a54e5858195ff
Score
10/10
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
resource yara_rule behavioral2/memory/2836-136-0x0000000000400000-0x0000000000436000-memory.dmp diamondfox behavioral2/memory/2836-138-0x0000000000400000-0x0000000000436000-memory.dmp diamondfox behavioral2/memory/2444-162-0x0000000000400000-0x0000000000436000-memory.dmp diamondfox behavioral2/memory/2444-164-0x0000000000400000-0x0000000000436000-memory.dmp diamondfox -
Executes dropped EXE 3 IoCs
pid Process 1088 MicrosoftEdgeCPS.exe 2444 MicrosoftEdgeCPS.exe 4332 MicrosoftEdgeCPS.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3592 set thread context of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 1088 set thread context of 2444 1088 MicrosoftEdgeCPS.exe 93 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 2448 powershell.exe 2448 powershell.exe 1088 MicrosoftEdgeCPS.exe 1088 MicrosoftEdgeCPS.exe 4432 powershell.exe 4432 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 1088 MicrosoftEdgeCPS.exe Token: SeDebugPrivilege 4432 powershell.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 3592 wrote to memory of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 3592 wrote to memory of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 3592 wrote to memory of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 3592 wrote to memory of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 3592 wrote to memory of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 3592 wrote to memory of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 3592 wrote to memory of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 3592 wrote to memory of 2836 3592 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 89 PID 2836 wrote to memory of 1088 2836 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 90 PID 2836 wrote to memory of 1088 2836 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 90 PID 2836 wrote to memory of 1088 2836 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 90 PID 2836 wrote to memory of 2448 2836 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 91 PID 2836 wrote to memory of 2448 2836 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 91 PID 2836 wrote to memory of 2448 2836 573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe 91 PID 1088 wrote to memory of 2444 1088 MicrosoftEdgeCPS.exe 93 PID 1088 wrote to memory of 2444 1088 MicrosoftEdgeCPS.exe 93 PID 1088 wrote to memory of 2444 1088 MicrosoftEdgeCPS.exe 93 PID 1088 wrote to memory of 2444 1088 MicrosoftEdgeCPS.exe 93 PID 1088 wrote to memory of 2444 1088 MicrosoftEdgeCPS.exe 93 PID 1088 wrote to memory of 2444 1088 MicrosoftEdgeCPS.exe 93 PID 1088 wrote to memory of 2444 1088 MicrosoftEdgeCPS.exe 93 PID 1088 wrote to memory of 2444 1088 MicrosoftEdgeCPS.exe 93 PID 1088 wrote to memory of 2444 1088 MicrosoftEdgeCPS.exe 93 PID 2444 wrote to memory of 4332 2444 MicrosoftEdgeCPS.exe 94 PID 2444 wrote to memory of 4332 2444 MicrosoftEdgeCPS.exe 94 PID 2444 wrote to memory of 4332 2444 MicrosoftEdgeCPS.exe 94 PID 2444 wrote to memory of 4432 2444 MicrosoftEdgeCPS.exe 96 PID 2444 wrote to memory of 4432 2444 MicrosoftEdgeCPS.exe 96 PID 2444 wrote to memory of 4432 2444 MicrosoftEdgeCPS.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe"C:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exeC:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeCPS.exeC:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeCPS.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"5⤵
- Executes dropped EXE
PID:4332
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -s 10; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeCPS.exe' -Force -Recurse5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -s 10; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\573efb195325f7f39b014f9a6062b0e464f7578b6fe2ae192749c26e460bbf03.exe' -Force -Recurse3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-