Resubmissions

01/04/2023, 14:08

230401-rfvlvaae29 7

Analysis

  • max time kernel
    28s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/04/2023, 14:08

General

  • Target

    ORIONX-FUD-CRYPTER-main/main/sys/sys_stub.exe

  • Size

    55.0MB

  • MD5

    5fcea5af302afdd378c944c42d9638d9

  • SHA1

    0025c7b095c40e4ac18094dcfcd53db4ef395803

  • SHA256

    42bee116877b44ec74589b7fe56670e27c8b991de437d01445f4f41f6749e0b7

  • SHA512

    0abfcd9d002cd3a8213c56b8e7e7b01baa5cfb192ce5b78df4a14c73da4e28d76bae5d271f4c2cf6cc479a956bf31fbc0a83598b1cfd7a75f97e4dc8b5aa6c8b

  • SSDEEP

    786432:4e3xWMupvFOdnGpl7bzVw2cksqgDhkQ7GTcCLLsbQRXzehKIL3lYVsiAqoK67CkF:4e3x0v0wphpteaZRXzeAs347s7CkKlc

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\main\sys\sys_stub.exe
    "C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\main\sys\sys_stub.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\main\sys\sys_stub.exe
      "C:\Users\Admin\AppData\Local\Temp\ORIONX-FUD-CRYPTER-main\main\sys\sys_stub.exe"
      2⤵
      • Loads dropped DLL
      PID:1780

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\_MEI17202\python310.dll

          Filesize

          4.3MB

          MD5

          e4533934b37e688106beac6c5919281e

          SHA1

          ada39f10ef0bbdcf05822f4260e43d53367b0017

          SHA256

          2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

          SHA512

          fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9

        • \Users\Admin\AppData\Local\Temp\_MEI17202\python310.dll

          Filesize

          4.3MB

          MD5

          e4533934b37e688106beac6c5919281e

          SHA1

          ada39f10ef0bbdcf05822f4260e43d53367b0017

          SHA256

          2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

          SHA512

          fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9