Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2023 23:40

General

  • Target

    atiedxx.exe

  • Size

    90KB

  • MD5

    4dddf0bfbb7fff60a92926426a0754e4

  • SHA1

    423f4f6b9c0805222b9577b52862af684030c002

  • SHA256

    f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788

  • SHA512

    713fec6b0a8067dd39579ad9280442bf215efb95b628e9b2f3cdb61fb4bc796bfb2857810fe393757a25006ba7203878ce9c4763ed15db6d8a5785badbc21744

  • SSDEEP

    1536:Y4VCaYZdr/Wl2pB6mOL1fNzsqGzLkGkRQZbK:YyPYylOBU5VzMkRQK

Malware Config

Signatures

  • DiamondFox

    DiamondFox is a multipurpose botnet with many capabilities.

  • DiamondFox payload 6 IoCs

    Detects DiamondFox payload in file/memory.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\atiedxx.exe
    "C:\Users\Admin\AppData\Local\Temp\atiedxx.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\atiedxx.exe' -Destination 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe'
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe
        "C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell $shell = New-Object -ComObject WScript.Shell;$shortcut = $shell.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\atiedxx.lnk');$shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe';$shortcut.Save()
          4⤵
          • Drops startup file
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b42a148eca76cbc3e642c7f2113d3ad

    SHA1

    82ae6c0d33531bff29fc70fc5d3d7cb6e7b30374

    SHA256

    57b78b7155920a107d833bf30cfd28c8e6e15119a8f91df7841f911a35921755

    SHA512

    6ccde0cb85bfefbfc96f384a270250de219c8aad77eb9d80b59cb07a7d764738929347d62316bc8ae0e3ffd5445676d919880bb14902140feec5666deb0f61da

  • C:\Users\Admin\AppData\Local\Temp\CabA343.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarA394.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe

    Filesize

    90KB

    MD5

    4dddf0bfbb7fff60a92926426a0754e4

    SHA1

    423f4f6b9c0805222b9577b52862af684030c002

    SHA256

    f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788

    SHA512

    713fec6b0a8067dd39579ad9280442bf215efb95b628e9b2f3cdb61fb4bc796bfb2857810fe393757a25006ba7203878ce9c4763ed15db6d8a5785badbc21744

  • C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe

    Filesize

    90KB

    MD5

    4dddf0bfbb7fff60a92926426a0754e4

    SHA1

    423f4f6b9c0805222b9577b52862af684030c002

    SHA256

    f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788

    SHA512

    713fec6b0a8067dd39579ad9280442bf215efb95b628e9b2f3cdb61fb4bc796bfb2857810fe393757a25006ba7203878ce9c4763ed15db6d8a5785badbc21744

  • C:\Users\Admin\AppData\Local\xdaeitx\atiedxx.exe

    Filesize

    90KB

    MD5

    4dddf0bfbb7fff60a92926426a0754e4

    SHA1

    423f4f6b9c0805222b9577b52862af684030c002

    SHA256

    f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788

    SHA512

    713fec6b0a8067dd39579ad9280442bf215efb95b628e9b2f3cdb61fb4bc796bfb2857810fe393757a25006ba7203878ce9c4763ed15db6d8a5785badbc21744

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MKX7AFKV5KC2ORI3453I.temp

    Filesize

    7KB

    MD5

    0018ae24399165202cfcebd1f77fad33

    SHA1

    e67753f46280b7ad9567acf0811c2177877ee94e

    SHA256

    b7596def3e935762c767a0d54921b54a9480028761ce861de548aa66e8ec192b

    SHA512

    52dbd2a17df117ed785ed7048eb3cd453fdca003cca003b605bdb55b82e1f5f1870ee8db4419db161fdce364689d0d318ca92923647eacfe6e4fc3303cbe53c6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    2d57049b66bcd3c59283cf97df21233c

    SHA1

    a33304ca9705b60f14788d03fe34c29e95333bd6

    SHA256

    9e73a89e28ac3e802f4058f000eee0961d2cc1f7a8f358322e5dca254546c2d1

    SHA512

    0f818647dc28be0cfd1141b83744332b3d4e8c65fa6a5b966385c4da0d135d32bac0b979cc8031fb9373ed912eba1c851ffbd188d4e59f6e6ba1e27392d81cf6

  • \Users\Admin\AppData\Local\xdaeitx\atiedxx.exe

    Filesize

    90KB

    MD5

    4dddf0bfbb7fff60a92926426a0754e4

    SHA1

    423f4f6b9c0805222b9577b52862af684030c002

    SHA256

    f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788

    SHA512

    713fec6b0a8067dd39579ad9280442bf215efb95b628e9b2f3cdb61fb4bc796bfb2857810fe393757a25006ba7203878ce9c4763ed15db6d8a5785badbc21744

  • \Users\Admin\AppData\Local\xdaeitx\atiedxx.exe

    Filesize

    90KB

    MD5

    4dddf0bfbb7fff60a92926426a0754e4

    SHA1

    423f4f6b9c0805222b9577b52862af684030c002

    SHA256

    f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788

    SHA512

    713fec6b0a8067dd39579ad9280442bf215efb95b628e9b2f3cdb61fb4bc796bfb2857810fe393757a25006ba7203878ce9c4763ed15db6d8a5785badbc21744

  • \Users\Admin\AppData\Local\xdaeitx\atiedxx.exe

    Filesize

    90KB

    MD5

    4dddf0bfbb7fff60a92926426a0754e4

    SHA1

    423f4f6b9c0805222b9577b52862af684030c002

    SHA256

    f24b905fb50dd08805caa0d357b3c43149a5174c745797af98d0c4f111f85788

    SHA512

    713fec6b0a8067dd39579ad9280442bf215efb95b628e9b2f3cdb61fb4bc796bfb2857810fe393757a25006ba7203878ce9c4763ed15db6d8a5785badbc21744

  • memory/588-91-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB

  • memory/588-92-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB

  • memory/588-93-0x00000000024F0000-0x0000000002530000-memory.dmp

    Filesize

    256KB

  • memory/588-94-0x00000000024F0000-0x0000000002530000-memory.dmp

    Filesize

    256KB

  • memory/588-98-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-11-0x00000000026B0000-0x00000000026F0000-memory.dmp

    Filesize

    256KB

  • memory/2824-24-0x0000000073F20000-0x00000000744CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-12-0x00000000026B0000-0x00000000026F0000-memory.dmp

    Filesize

    256KB

  • memory/2824-4-0x0000000073F20000-0x00000000744CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-10-0x0000000073F20000-0x00000000744CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2824-8-0x00000000026B0000-0x00000000026F0000-memory.dmp

    Filesize

    256KB

  • memory/2824-7-0x00000000026B0000-0x00000000026F0000-memory.dmp

    Filesize

    256KB

  • memory/2824-6-0x00000000026B0000-0x00000000026F0000-memory.dmp

    Filesize

    256KB

  • memory/2824-5-0x0000000073F20000-0x00000000744CB000-memory.dmp

    Filesize

    5.7MB