Resubmissions
09-04-2024 12:50
240409-p3e4kaaf7v 1009-04-2024 12:50
240409-p3d69saf7s 1009-04-2024 12:50
240409-p3dkqsfd36 1009-04-2024 12:50
240409-p3cy7saf61 10Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-02-2021 12:07
Static task
static1
Behavioral task
behavioral1
Sample
osiris.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
osiris.exe
-
Size
434KB
-
MD5
64876d5de7061e925e29f6a0c87cea9b
-
SHA1
51d6ed277b85b07974d450a9b3441c780467613f
-
SHA256
01d5f1b32235b5d5ba5970d56639d82aa3d83b57ec08c79b3580fd0c88ef1c29
-
SHA512
2dfe245cd058d10ac35c441238c52dcb08db8c565786d5824baf9cbd2846f2a4803709d4e9850add7f4c8e6ea5f37c23c66423820a9d6af2b7da8ddf74b6cb1b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1268 GetX64BTIT.exe -
Loads dropped DLL 1 IoCs
pid Process 792 osiris.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe 792 osiris.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 792 osiris.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 792 wrote to memory of 1268 792 osiris.exe 29 PID 792 wrote to memory of 1268 792 osiris.exe 29 PID 792 wrote to memory of 1268 792 osiris.exe 29 PID 792 wrote to memory of 1268 792 osiris.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\osiris.exe"C:\Users\Admin\AppData\Local\Temp\osiris.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:1268
-