Resubmissions

10-06-2024 21:32

240610-1drlvasajl 10

23-04-2021 16:42

210423-hge38eda1j 8

Analysis

  • max time kernel
    149s
  • max time network
    69s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-06-2024 21:32

General

  • Target

    SecuriteInfo.com.W32.AIDetect.malware1.14311.exe

  • Size

    2.5MB

  • MD5

    ae8f9d9b8344d52f0872dfdc852e1dd4

  • SHA1

    7e9f4259cc193465317ee48b8428b36e74028390

  • SHA256

    95b5d0e36464afc8391a9d056926e5859506ead18937669554bde42f7a6d135b

  • SHA512

    27928930215dbb9217247d846c570a756b46866b17b0832c9de7c8a800e3d0457f64c28ddfb4a66372f3837695e8f1a5645804f222ac7344284facb68bc79b21

  • SSDEEP

    49152:qFUy7w/OQkyXuS18WPu8vE2uajZ3/qUlppUAr/n7oi/dyXUETzBJi3:qFnekR+08s2uaX9tdyZTzBJi3

Malware Config

Signatures

  • Babadeda

    Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

  • Babadeda Crypter 1 IoCs
  • DiamondFox

    DiamondFox is a multipurpose botnet with many capabilities.

  • DiamondFox payload 1 IoCs

    Detects DiamondFox payload in file/memory.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.14311.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.14311.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Roaming\CachemanControlPanel\CachemanControlPanel.exe
      C:\Users\Admin\AppData\Roaming\CachemanControlPanel\CachemanControlPanel.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:244
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:5056
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k SDRSVC
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\CachemanControlPanel\CachemanControlPanel.exe

    Filesize

    3.2MB

    MD5

    5d3bf7a18887582b8a2cea327f2e7ba6

    SHA1

    83843851b7b7beb2b1853b813e7f0b1666b1bd62

    SHA256

    014d644eccc232cd6906c5abf8afd3e53f94004057d4a1bb2771dfea00f0ae4b

    SHA512

    3d4ffc844b211fae199f3da8b557cec2f6e882b8be42f3d99882eaa3e9d73018f8c06971cb783d223f3423d0c55788b7520bd57fd33d8d2dfe6c4be9455e62d7

  • C:\Users\Admin\AppData\Roaming\CachemanControlPanel\libxml3.dll

    Filesize

    532KB

    MD5

    5ae30e4cdabb5b269b7eb358aae2d5e2

    SHA1

    58aae25bf64bd0b15be33ceb47ddb6ef3802433a

    SHA256

    0b2cabaf0b2aef51c3396b11e604c46b65eabc0cbde3e257bc9c9fd1c2446c6f

    SHA512

    2d4a2aad072bebbc707af9dca22c54f6d9607e6f7bc8826bcb61b0321f4e0464884f4577dc51dcfb7a40a9b143cf9e26225694ef4668f629f632870d11afa198

  • C:\Users\Admin\AppData\Roaming\CachemanControlPanel\settings.xml

    Filesize

    490KB

    MD5

    fa4b4f1f9869da4a0209bba251859efc

    SHA1

    fe7a4ee923d6eeb93e8a52778735120705d927a5

    SHA256

    05af99365637a46d18b5bc60d20e7cbd8943f250a15976c672b3d29ee1472d2f

    SHA512

    f82eb33679935cb69baaf3ad5eaa71df3d750771b21b964597543d901483aab89602f8603e474758ae6162157c06d37b36db669086dcf31cea7ce8d560094456

  • memory/244-18-0x0000000000400000-0x000000000073E000-memory.dmp

    Filesize

    3.2MB

  • memory/244-47-0x0000000000400000-0x000000000073E000-memory.dmp

    Filesize

    3.2MB

  • memory/5056-31-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB

  • memory/5056-20-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB

  • memory/5056-27-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB

  • memory/5056-21-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB

  • memory/5056-30-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB

  • memory/5056-29-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB

  • memory/5056-28-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB

  • memory/5056-25-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB

  • memory/5056-26-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB

  • memory/5056-38-0x0000017155470000-0x0000017155480000-memory.dmp

    Filesize

    64KB

  • memory/5056-33-0x0000017155420000-0x0000017155430000-memory.dmp

    Filesize

    64KB

  • memory/5056-19-0x0000017156EA0000-0x0000017156EA1000-memory.dmp

    Filesize

    4KB