Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
29-08-2023 03:43
Static task
static1
Behavioral task
behavioral1
Sample
4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe
Resource
win10v2004-20230703-en
General
-
Target
4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe
-
Size
219KB
-
MD5
08bbb8edf7b5007130f68cbdd34a2fea
-
SHA1
1d4b99ce9623326a0b38e340262aa781f3f7772b
-
SHA256
4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6
-
SHA512
176b9ae412c494c773218f15a0b564b62466f85218503930349f52b0ab7fbcc39fb535afa0e263a4e0985a89e18d761f21c9c3647c3b3d7c0e424c20d7f12d05
-
SSDEEP
6144:7CiCmqvVOUoSeVrDKVpkN5RszhVPyJiNQvw9hQ+q9PzV+7vdrw2m56OIw:73CmPUoSeZDKV2bRs1VPsiSyhQ+qRsxs
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
resource yara_rule behavioral1/memory/2296-13-0x0000000000400000-0x000000000044E000-memory.dmp diamondfox behavioral1/memory/1216-16-0x0000000000400000-0x000000000044E000-memory.dmp diamondfox behavioral1/memory/1216-18-0x0000000000400000-0x000000000044E000-memory.dmp diamondfox -
Executes dropped EXE 1 IoCs
pid Process 1216 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 2296 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 2296 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2296 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 1216 lsass.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1216 2296 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 28 PID 2296 wrote to memory of 1216 2296 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 28 PID 2296 wrote to memory of 1216 2296 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 28 PID 2296 wrote to memory of 1216 2296 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe"C:\Users\Admin\AppData\Local\Temp\4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Roaming\lsassfold\lsass.exe"C:\Users\Admin\AppData\Roaming\lsassfold\lsass.exe" 02⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD508bbb8edf7b5007130f68cbdd34a2fea
SHA11d4b99ce9623326a0b38e340262aa781f3f7772b
SHA2564c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6
SHA512176b9ae412c494c773218f15a0b564b62466f85218503930349f52b0ab7fbcc39fb535afa0e263a4e0985a89e18d761f21c9c3647c3b3d7c0e424c20d7f12d05
-
Filesize
219KB
MD508bbb8edf7b5007130f68cbdd34a2fea
SHA11d4b99ce9623326a0b38e340262aa781f3f7772b
SHA2564c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6
SHA512176b9ae412c494c773218f15a0b564b62466f85218503930349f52b0ab7fbcc39fb535afa0e263a4e0985a89e18d761f21c9c3647c3b3d7c0e424c20d7f12d05
-
Filesize
219KB
MD508bbb8edf7b5007130f68cbdd34a2fea
SHA11d4b99ce9623326a0b38e340262aa781f3f7772b
SHA2564c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6
SHA512176b9ae412c494c773218f15a0b564b62466f85218503930349f52b0ab7fbcc39fb535afa0e263a4e0985a89e18d761f21c9c3647c3b3d7c0e424c20d7f12d05
-
Filesize
219KB
MD508bbb8edf7b5007130f68cbdd34a2fea
SHA11d4b99ce9623326a0b38e340262aa781f3f7772b
SHA2564c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6
SHA512176b9ae412c494c773218f15a0b564b62466f85218503930349f52b0ab7fbcc39fb535afa0e263a4e0985a89e18d761f21c9c3647c3b3d7c0e424c20d7f12d05