Resubmissions
01-04-2023 14:08
230401-rfvlvaae29 7Analysis
-
max time kernel
27s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-04-2023 14:08
Behavioral task
behavioral1
Sample
ORIONX-FUD-CRYPTER-main/ORIONX FUD CRYPTER.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORIONX-FUD-CRYPTER-main/ORIONX FUD CRYPTER.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
ORIONX-FUD-CRYPTER-main/main/sys/sys_stub.exe
Resource
win7-20230220-en
General
-
Target
ORIONX-FUD-CRYPTER-main/ORIONX FUD CRYPTER.exe
-
Size
8.6MB
-
MD5
81ea598f0d65a44e4c3bbb2c071350b6
-
SHA1
bf6cca08f337875691871bb4daa86746b2014a2d
-
SHA256
6c63c28f9c7e4d824db6a1c2b076b30498f3d90c73ff27a29edab3819f39e454
-
SHA512
15cdaceb59593c172375fa670a6b808273ee26468deb239a810163b3b2268be9c45fadd8503b798dc59f900c38fca6415f2081e16a12a569dd09f8adeef1f37d
-
SSDEEP
196608:GIYUxbAQ5Itwq+ZkiKDIN/1q3+dgSux0vtk0W8/LaK1:5bx2aq+ZkFMq3+d9ux0lDW8
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 588 ORIONX FUD CRYPTER.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1204 wrote to memory of 588 1204 ORIONX FUD CRYPTER.exe 28 PID 1204 wrote to memory of 588 1204 ORIONX FUD CRYPTER.exe 28 PID 1204 wrote to memory of 588 1204 ORIONX FUD CRYPTER.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\ORIONX FUD CRYPTER.exe"C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\ORIONX FUD CRYPTER.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\ORIONX FUD CRYPTER.exe"C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\ORIONX FUD CRYPTER.exe"2⤵
- Loads dropped DLL
PID:588
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9