Resubmissions
09-04-2024 12:50
240409-p3e4kaaf7v 1009-04-2024 12:50
240409-p3d69saf7s 1009-04-2024 12:50
240409-p3dkqsfd36 1009-04-2024 12:50
240409-p3cy7saf61 10Analysis
-
max time kernel
301s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
osiris.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
osiris.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
osiris.exe
Resource
win10v2004-20240226-en
General
-
Target
osiris.exe
-
Size
434KB
-
MD5
64876d5de7061e925e29f6a0c87cea9b
-
SHA1
51d6ed277b85b07974d450a9b3441c780467613f
-
SHA256
01d5f1b32235b5d5ba5970d56639d82aa3d83b57ec08c79b3580fd0c88ef1c29
-
SHA512
2dfe245cd058d10ac35c441238c52dcb08db8c565786d5824baf9cbd2846f2a4803709d4e9850add7f4c8e6ea5f37c23c66423820a9d6af2b7da8ddf74b6cb1b
-
SSDEEP
12288:rXPcLcbGfVylwG/ZDCK/ScBXo8TsyMkKMY8m7WOK9SATTsx/SA/WegYfdNbrqnuv:rXh6XcBXo8TsL8Y8m/ATTySA/DrfdNbV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 3660 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 api.ipify.org 8 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
osiris.exepid process 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe 536 osiris.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
osiris.exepid process 536 osiris.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
osiris.exemsedge.exedescription pid process target process PID 536 wrote to memory of 3660 536 osiris.exe GetX64BTIT.exe PID 536 wrote to memory of 3660 536 osiris.exe GetX64BTIT.exe PID 536 wrote to memory of 1488 536 osiris.exe msedge.exe PID 536 wrote to memory of 3468 536 osiris.exe msedge.exe PID 536 wrote to memory of 3484 536 osiris.exe msedge.exe PID 536 wrote to memory of 2496 536 osiris.exe msedge.exe PID 536 wrote to memory of 3872 536 osiris.exe msedge.exe PID 536 wrote to memory of 4172 536 osiris.exe msedge.exe PID 536 wrote to memory of 4340 536 osiris.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe PID 1488 wrote to memory of 3420 1488 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x240,0x244,0x248,0x23c,0x218,0x7ffd71342e98,0x7ffd71342ea4,0x7ffd71342eb02⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2260 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:22⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3216 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:32⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3336 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:82⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5260 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5440 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4756 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:82⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3216 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:32⤵PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\osiris.exe"C:\Users\Admin\AppData\Local\Temp\osiris.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:3660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
36KB
MD5a1b26375b322ade88c2a6552c1161d82
SHA19990d914bb1889d4e8f023eb2fdf53745dd6ce51
SHA2569d6594bd71851704100ad5a4c01328fa3e9338e3ec772bdca0261ed680401a35
SHA512eec3416f260e7878661b650126307807696cbc6c4c5cbddde8265902429e93d4544fe99fb03b02f372e47382a3e8b16fd5722f34c943cfcaab583d466d37765c
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5d7a86f98aebc1daf6cf7955a2fd3d54d
SHA157393a5f9af7f142b314a116f013d9e9ef072728
SHA2560e3541b69f7c53242bfe4d77e095c9f6e70d18fb3f813165de36358f245efcbd
SHA512284d26f539815b800b3896aabe3e8819bdeb01f47c6c72adcbc715dac8bd26f55d6334ff9d58e8652fc77eaf8d6560996d432b0e2a508bf5e26c7b9509ecbcf1