Resubmissions
01/04/2023, 14:08
230401-rfvlvaae29 7Analysis
-
max time kernel
28s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/04/2023, 14:08
Behavioral task
behavioral1
Sample
ORIONX-FUD-CRYPTER-main/ORIONX FUD CRYPTER.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORIONX-FUD-CRYPTER-main/ORIONX FUD CRYPTER.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
ORIONX-FUD-CRYPTER-main/main/sys/sys_stub.exe
Resource
win7-20230220-en
General
-
Target
ORIONX-FUD-CRYPTER-main/main/sys/sys_stub.exe
-
Size
55.0MB
-
MD5
5fcea5af302afdd378c944c42d9638d9
-
SHA1
0025c7b095c40e4ac18094dcfcd53db4ef395803
-
SHA256
42bee116877b44ec74589b7fe56670e27c8b991de437d01445f4f41f6749e0b7
-
SHA512
0abfcd9d002cd3a8213c56b8e7e7b01baa5cfb192ce5b78df4a14c73da4e28d76bae5d271f4c2cf6cc479a956bf31fbc0a83598b1cfd7a75f97e4dc8b5aa6c8b
-
SSDEEP
786432:4e3xWMupvFOdnGpl7bzVw2cksqgDhkQ7GTcCLLsbQRXzehKIL3lYVsiAqoK67CkF:4e3x0v0wphpteaZRXzeAs347s7CkKlc
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1780 sys_stub.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1780 1720 sys_stub.exe 28 PID 1720 wrote to memory of 1780 1720 sys_stub.exe 28 PID 1720 wrote to memory of 1780 1720 sys_stub.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\main\sys\sys_stub.exe"C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\main\sys\sys_stub.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\main\sys\sys_stub.exe"C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\main\sys\sys_stub.exe"2⤵
- Loads dropped DLL
PID:1780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9