S0659 Diavol
Diavol is a ransomware variant first observed in June 2021 that is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by the attacker. Diavol has been deployed by Bazar and is thought to have potential ties to Wizard Spider.321
| Item | Value | 
|---|---|
| ID | S0659 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.0 | 
| Created | 12 November 2021 | 
| Last Modified | 15 April 2022 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1071 | Application Layer Protocol | - | 
| enterprise | T1071.001 | Web Protocols | Diavol has used HTTP GET and POST requests for C2.3 | 
| enterprise | T1485 | Data Destruction | Diavol can delete specified files from a targeted system.3 | 
| enterprise | T1486 | Data Encrypted for Impact | Diavol has encrypted files using an RSA key though the CryptEncryptAPI and has appended filenames with “.lock64”. 3 | 
| enterprise | T1491 | Defacement | - | 
| enterprise | T1491.001 | Internal Defacement | After encryption, Diavol will capture the desktop background window, set the background color to black, and change the desktop wallpaper to a newly created bitmap image with the text “All your files are encrypted! For more information see “README-FOR-DECRYPT.txt”.3 | 
| enterprise | T1083 | File and Directory Discovery | Diavol has a command to traverse the files and directories in a given path.3 | 
| enterprise | T1562 | Impair Defenses | - | 
| enterprise | T1562.001 | Disable or Modify Tools | Diavol can attempt to stop security software.3 | 
| enterprise | T1105 | Ingress Tool Transfer | Diavol can receive configuration updates and additional payloads including wscpy.exe from C2.3 | 
| enterprise | T1490 | Inhibit System Recovery | Diavol can delete shadow copies using the IVssBackupComponentsCOM object to call theDeleteSnapshotsmethod.3 | 
| enterprise | T1106 | Native API | Diavol has used several API calls like GetLogicalDriveStrings,SleepEx,SystemParametersInfoAPI,CryptEncrypt, and others to execute parts of its attack.3 | 
| enterprise | T1135 | Network Share Discovery | Diavol has a ENMDSKScommand to enumerates available network shares.3 | 
| enterprise | T1027 | Obfuscated Files or Information | Diavol has Base64 encoded the RSA public key used for encrypting files.3 | 
| enterprise | T1027.003 | Steganography | Diavol has obfuscated its main code routines within bitmap images as part of its anti-analysis techniques.3 | 
| enterprise | T1057 | Process Discovery | Diavol has used CreateToolhelp32Snapshot,Process32First, andProcess32NextAPI calls to enumerate the running processes in the system.3 | 
| enterprise | T1021 | Remote Services | - | 
| enterprise | T1021.002 | SMB/Windows Admin Shares | Diavol can spread throughout a network via SMB prior to encryption.3 | 
| enterprise | T1018 | Remote System Discovery | Diavol can use the ARP table to find remote hosts to scan.3 | 
| enterprise | T1489 | Service Stop | Diavol will terminate services using the Service Control Manager (SCM) API.3 | 
| enterprise | T1082 | System Information Discovery | Diavol can collect the computer name and OS version from the system.3 | 
| enterprise | T1016 | System Network Configuration Discovery | Diavol can enumerate victims’ local and external IPs when registering with C2.3 | 
| enterprise | T1033 | System Owner/User Discovery | Diavol can collect the username from a compromised host.3 | 
References
- 
DFIR Report. (2021, December 13). Diavol Ransomware. Retrieved March 9, 2022. ↩ 
- 
FBI. (2022, January 19). Indicators of Compromise Associated with Diavol. Retrieved March 9, 2022. ↩ 
- 
Neeamni, D., Rubinfeld, A.. (2021, July 1). Diavol - A New Ransomware Used By Wizard Spider?. Retrieved November 12, 2021. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩