Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
24/04/2021, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
OrionRansomware.bin.exe
Resource
win7v20210410
General
-
Target
OrionRansomware.bin.exe
-
Size
2.4MB
-
MD5
b5f936358b6559ac3c71fd53c0f09f0e
-
SHA1
2e8f3aa5b5106bfcc1b4438feaf87423e5ea1daa
-
SHA256
4ed043fb22387fa9a6914744df7c28669e587fd2fcc5b3a4d7ceabdae88c82fd
-
SHA512
d9235fbc502c22ddd18436aedccf89c830e7cda975b1b581cfb9f5434ca16893388effc533009f20f6a9e71f0ba23cb8217d2f6c0d6fa75008c80fc2dbc321e9
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UnprotectConvert.png => C:\Users\Admin\Pictures\UnprotectConvert.png.XXXXX OrionRansomware.bin.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OrionRansomware.bin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OrionRansomware.bin.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Wine OrionRansomware.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_Classes\Local Settings rundll32.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 972 NOTEPAD.EXE 864 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 292 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1104 OrionRansomware.bin.exe Token: SeDebugPrivilege 1104 OrionRansomware.bin.exe Token: 33 1500 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1500 AUDIODG.EXE Token: 33 1500 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1500 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 292 wrote to memory of 972 292 rundll32.exe 35 PID 292 wrote to memory of 972 292 rundll32.exe 35 PID 292 wrote to memory of 972 292 rundll32.exe 35 PID 828 wrote to memory of 864 828 rundll32.exe 38 PID 828 wrote to memory of 864 828 rundll32.exe 38 PID 828 wrote to memory of 864 828 rundll32.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\OrionRansomware.bin.exe"C:\Users\Admin\AppData\Local\Temp\OrionRansomware.bin.exe"1⤵
- Modifies extensions of user files
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2e41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Documents\Are.docx.XXXXX1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\Are.docx.XXXXX2⤵
- Opens file in notepad (likely ransom note)
PID:972
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SwitchSplit.avi.XXXXX1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SwitchSplit.avi.XXXXX2⤵
- Opens file in notepad (likely ransom note)
PID:864
-