Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2023 03:43
Static task
static1
Behavioral task
behavioral1
Sample
4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe
Resource
win10v2004-20230703-en
General
-
Target
4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe
-
Size
219KB
-
MD5
08bbb8edf7b5007130f68cbdd34a2fea
-
SHA1
1d4b99ce9623326a0b38e340262aa781f3f7772b
-
SHA256
4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6
-
SHA512
176b9ae412c494c773218f15a0b564b62466f85218503930349f52b0ab7fbcc39fb535afa0e263a4e0985a89e18d761f21c9c3647c3b3d7c0e424c20d7f12d05
-
SSDEEP
6144:7CiCmqvVOUoSeVrDKVpkN5RszhVPyJiNQvw9hQ+q9PzV+7vdrw2m56OIw:73CmPUoSeZDKV2bRs1VPsiSyhQ+qRsxs
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
resource yara_rule behavioral2/memory/5112-12-0x0000000000400000-0x000000000044E000-memory.dmp diamondfox behavioral2/memory/3864-15-0x0000000000400000-0x000000000044E000-memory.dmp diamondfox -
Executes dropped EXE 1 IoCs
pid Process 3864 lsass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5112 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 3864 lsass.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3864 5112 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 84 PID 5112 wrote to memory of 3864 5112 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 84 PID 5112 wrote to memory of 3864 5112 4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe"C:\Users\Admin\AppData\Local\Temp\4c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Roaming\lsassfold\lsass.exe"C:\Users\Admin\AppData\Roaming\lsassfold\lsass.exe" 02⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD508bbb8edf7b5007130f68cbdd34a2fea
SHA11d4b99ce9623326a0b38e340262aa781f3f7772b
SHA2564c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6
SHA512176b9ae412c494c773218f15a0b564b62466f85218503930349f52b0ab7fbcc39fb535afa0e263a4e0985a89e18d761f21c9c3647c3b3d7c0e424c20d7f12d05
-
Filesize
219KB
MD508bbb8edf7b5007130f68cbdd34a2fea
SHA11d4b99ce9623326a0b38e340262aa781f3f7772b
SHA2564c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6
SHA512176b9ae412c494c773218f15a0b564b62466f85218503930349f52b0ab7fbcc39fb535afa0e263a4e0985a89e18d761f21c9c3647c3b3d7c0e424c20d7f12d05
-
Filesize
219KB
MD508bbb8edf7b5007130f68cbdd34a2fea
SHA11d4b99ce9623326a0b38e340262aa781f3f7772b
SHA2564c4da7ca3fc9b71ecd8f9e8f0b676a2fb2d4c9428abee2abfac827495f94c8c6
SHA512176b9ae412c494c773218f15a0b564b62466f85218503930349f52b0ab7fbcc39fb535afa0e263a4e0985a89e18d761f21c9c3647c3b3d7c0e424c20d7f12d05