Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
28-08-2023 09:54
Static task
static1
Behavioral task
behavioral1
Sample
53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe
Resource
win10v2004-20230703-en
General
-
Target
53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe
-
Size
220KB
-
MD5
b856ee00318bbdbafcc4895350424456
-
SHA1
e06f26b9f4fe365b85b3ae3b6f0fb4ca3425d98d
-
SHA256
53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce
-
SHA512
4a355ccd050e6842eb5baac108e3253ce259a8148b06e0b7e1ed21ae8da0ab396b9241072f4c17501545b33ccfdae7b7f0a881ee2ac4fce6c68fdf48047abec0
-
SSDEEP
3072:FFlJl9SroIZsF6RBvM+56h2NfF0kz2rx2OZ4tAHTaXZZAfr9QL2Kj8rzvn:rx9EZF1M+ch2hF8rNZOAH+ZAfrK2a83
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xingd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" xingd.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xingd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xingd = "C:\\Users\\Admin\\AppData\\Roaming\\com9.{1206F5F1-0569-412C-8FEC-3204630DFB70}\\xingd.exe" xingd.exe -
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xingd.exe xingd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xingd.exe xingd.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 xingd.exe -
Loads dropped DLL 2 IoCs
pid Process 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" xingd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Windows\CurrentVersion\Run\xingd = "C:\\Users\\Admin\\AppData\\Roaming\\com9.{1206F5F1-0569-412C-8FEC-3204630DFB70}\\xingd.exe" xingd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xingd = "C:\\Users\\Admin\\AppData\\Roaming\\com9.{1206F5F1-0569-412C-8FEC-3204630DFB70}\\xingd.exe" xingd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2648 schtasks.exe -
Kills process with taskkill 3 IoCs
pid Process 2816 taskkill.exe 2976 taskkill.exe 2704 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2816 taskkill.exe Token: SeDebugPrivilege 2704 taskkill.exe Token: SeDebugPrivilege 2976 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 2200 xingd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 2200 xingd.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2200 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 31 PID 2344 wrote to memory of 2200 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 31 PID 2344 wrote to memory of 2200 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 31 PID 2344 wrote to memory of 2200 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 31 PID 2344 wrote to memory of 2800 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 32 PID 2344 wrote to memory of 2800 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 32 PID 2344 wrote to memory of 2800 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 32 PID 2344 wrote to memory of 2800 2344 53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe 32 PID 2200 wrote to memory of 2816 2200 xingd.exe 34 PID 2200 wrote to memory of 2816 2200 xingd.exe 34 PID 2200 wrote to memory of 2816 2200 xingd.exe 34 PID 2200 wrote to memory of 2816 2200 xingd.exe 34 PID 2200 wrote to memory of 2976 2200 xingd.exe 36 PID 2200 wrote to memory of 2976 2200 xingd.exe 36 PID 2200 wrote to memory of 2976 2200 xingd.exe 36 PID 2200 wrote to memory of 2976 2200 xingd.exe 36 PID 2200 wrote to memory of 2704 2200 xingd.exe 37 PID 2200 wrote to memory of 2704 2200 xingd.exe 37 PID 2200 wrote to memory of 2704 2200 xingd.exe 37 PID 2200 wrote to memory of 2704 2200 xingd.exe 37 PID 2200 wrote to memory of 2648 2200 xingd.exe 40 PID 2200 wrote to memory of 2648 2200 xingd.exe 40 PID 2200 wrote to memory of 2648 2200 xingd.exe 40 PID 2200 wrote to memory of 2648 2200 xingd.exe 40 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xingd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xingd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe"C:\Users\Admin\AppData\Local\Temp\53b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Roaming\com9.{1206F5F1-0569-412C-8FEC-3204630DFB70}\xingd.exeC:\Users\Admin\AppData\Roaming\com9.{1206F5F1-0569-412C-8FEC-3204630DFB70}\xingd.exe2⤵
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2200 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM wscript.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM chrome.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM firefox.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc ONLOGON /tn xingd.exe /tr "C:\Users\Admin\AppData\Roaming\com9.{1206F5F1-0569-412C-8FEC-3204630DFB70}\xingd.exe"3⤵
- Creates scheduled task(s)
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\B7E0F5F2.cmd2⤵
- Deletes itself
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170B
MD54cff075234709e3b723684f94e362797
SHA18b8c27f14528f8eb79b8e6b4d683f90684840589
SHA2566f65b03504efb7974395bd1de09facbb4f5d15789040d8a3b36a50902f9135ce
SHA5126cc457dbe168a5c76fb462f97b7f2a4e81e0a5bdc0aaba564caf2a0db2be1fce5c68ceec9f1c1d5df4e498ddda7c74cd7583f725a85c931de83bd7d5069f09f7
-
Filesize
170B
MD54cff075234709e3b723684f94e362797
SHA18b8c27f14528f8eb79b8e6b4d683f90684840589
SHA2566f65b03504efb7974395bd1de09facbb4f5d15789040d8a3b36a50902f9135ce
SHA5126cc457dbe168a5c76fb462f97b7f2a4e81e0a5bdc0aaba564caf2a0db2be1fce5c68ceec9f1c1d5df4e498ddda7c74cd7583f725a85c931de83bd7d5069f09f7
-
Filesize
220KB
MD5b856ee00318bbdbafcc4895350424456
SHA1e06f26b9f4fe365b85b3ae3b6f0fb4ca3425d98d
SHA25653b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce
SHA5124a355ccd050e6842eb5baac108e3253ce259a8148b06e0b7e1ed21ae8da0ab396b9241072f4c17501545b33ccfdae7b7f0a881ee2ac4fce6c68fdf48047abec0
-
Filesize
220KB
MD5b856ee00318bbdbafcc4895350424456
SHA1e06f26b9f4fe365b85b3ae3b6f0fb4ca3425d98d
SHA25653b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce
SHA5124a355ccd050e6842eb5baac108e3253ce259a8148b06e0b7e1ed21ae8da0ab396b9241072f4c17501545b33ccfdae7b7f0a881ee2ac4fce6c68fdf48047abec0
-
Filesize
220KB
MD5b856ee00318bbdbafcc4895350424456
SHA1e06f26b9f4fe365b85b3ae3b6f0fb4ca3425d98d
SHA25653b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce
SHA5124a355ccd050e6842eb5baac108e3253ce259a8148b06e0b7e1ed21ae8da0ab396b9241072f4c17501545b33ccfdae7b7f0a881ee2ac4fce6c68fdf48047abec0
-
Filesize
220KB
MD5b856ee00318bbdbafcc4895350424456
SHA1e06f26b9f4fe365b85b3ae3b6f0fb4ca3425d98d
SHA25653b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce
SHA5124a355ccd050e6842eb5baac108e3253ce259a8148b06e0b7e1ed21ae8da0ab396b9241072f4c17501545b33ccfdae7b7f0a881ee2ac4fce6c68fdf48047abec0
-
Filesize
220KB
MD5b856ee00318bbdbafcc4895350424456
SHA1e06f26b9f4fe365b85b3ae3b6f0fb4ca3425d98d
SHA25653b5d0397777ff7b544a1f75739588fe449a2d6d2f4d4f4bb4d51228caa060ce
SHA5124a355ccd050e6842eb5baac108e3253ce259a8148b06e0b7e1ed21ae8da0ab396b9241072f4c17501545b33ccfdae7b7f0a881ee2ac4fce6c68fdf48047abec0