Analysis

  • max time kernel
    145s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    25-09-2021 07:12

General

  • Target

    Orde.exe

  • Size

    253KB

  • MD5

    3bb9e36eafb639d7e69659d549de50d2

  • SHA1

    980383664a8dafa46990f23180330f5c805a14ce

  • SHA256

    22a12f1f1043bd45a4579e40fded8f79fe405142c3306636480e13038ba59552

  • SHA512

    01e5e3c8f22b7a8a3268ac5a082ea0ccb199a19d9a823652b74f4b1fa49ff17163542ed9b524261d24d70e3d585a3cd5e111d103ac81c697d6a5de442bf2c519

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Orde.exe
    "C:\Users\Admin\AppData\Local\Temp\Orde.exe"
    1⤵
    • Loads dropped DLL
    PID:1528

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsbDEEA.tmp\qvkuo.dll
    MD5

    1e8f9c520d8141741f2f31574995ff38

    SHA1

    47731ec3c9cf825adeb6ce96dd6700c999d5d2eb

    SHA256

    60617bf81679eb269ae5c43827926af9b0f59bee9dfaae0cf3e675f68c49558b

    SHA512

    d22f85874cbca25f7e6bcf2a32ddcf67b5c01536a063c395011dcabf78e09d37a3cf5669fbf9325e1d2c52835b266746267ac65fa32f4a81d195363c34791655

  • memory/1528-54-0x0000000074B91000-0x0000000074B93000-memory.dmp
    Filesize

    8KB