Resubmissions
09-04-2024 12:50
240409-p3e4kaaf7v 1009-04-2024 12:50
240409-p3d69saf7s 1009-04-2024 12:50
240409-p3dkqsfd36 1009-04-2024 12:50
240409-p3cy7saf61 10Analysis
-
max time kernel
303s -
max time network
242s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
osiris.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
osiris.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
osiris.exe
Resource
win10v2004-20240226-en
General
-
Target
osiris.exe
-
Size
434KB
-
MD5
64876d5de7061e925e29f6a0c87cea9b
-
SHA1
51d6ed277b85b07974d450a9b3441c780467613f
-
SHA256
01d5f1b32235b5d5ba5970d56639d82aa3d83b57ec08c79b3580fd0c88ef1c29
-
SHA512
2dfe245cd058d10ac35c441238c52dcb08db8c565786d5824baf9cbd2846f2a4803709d4e9850add7f4c8e6ea5f37c23c66423820a9d6af2b7da8ddf74b6cb1b
-
SSDEEP
12288:rXPcLcbGfVylwG/ZDCK/ScBXo8TsyMkKMY8m7WOK9SATTsx/SA/WegYfdNbrqnuv:rXh6XcBXo8TsL8Y8m/ATTySA/DrfdNbV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4124 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 api.ipify.org 18 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe 2296 osiris.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2296 osiris.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 4124 2296 osiris.exe 90 PID 2296 wrote to memory of 4124 2296 osiris.exe 90 PID 2296 wrote to memory of 4192 2296 osiris.exe 77 PID 2296 wrote to memory of 2572 2296 osiris.exe 78 PID 2296 wrote to memory of 2412 2296 osiris.exe 79 PID 2296 wrote to memory of 2436 2296 osiris.exe 80 PID 2296 wrote to memory of 1828 2296 osiris.exe 81 PID 2296 wrote to memory of 940 2296 osiris.exe 83 PID 2296 wrote to memory of 2684 2296 osiris.exe 84 PID 2296 wrote to memory of 3792 2296 osiris.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99 PID 4192 wrote to memory of 3792 4192 msedge.exe 99
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x23c,0x240,0x244,0x238,0x250,0x7ffc1a842e98,0x7ffc1a842ea4,0x7ffc1a842eb02⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2240 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:22⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2296 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:32⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2560 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:82⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5264 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5580 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4828 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:82⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2296 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:32⤵PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\osiris.exe"C:\Users\Admin\AppData\Local\Temp\osiris.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:4124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
36KB
MD5e375935c6b093959d68bf1e1039ea270
SHA1d10024157d83ef9e60934a97d64c6d19f87f2326
SHA256b2f9ea02c5231c45041ef4f99a8aa55dd305b6138bb4200c1715be7f57b89e84
SHA512586ead1ce464a2acc77341880eb5f5343da4a42dc8969f51203603ebc758ef47a3d5b8ef5f00dc6d136f6af956c594c2c440d52f448f85af99c017396587639d
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5cb2b7e0875934695dccf91da833a0cbf
SHA1c4d6abb8a5c0a245cadcf016ea5556a2e767fd99
SHA2561336278f657e7c101e6fcdbb7839dc04c16ea93e132a0112e72c8349b4b0ea5d
SHA512de7fba69276674ef8ce3e770b1aad024f7e702a0b66c35fba9aab0fb05d052155dae6c18e3a4b964472c71105fb55ec511ad38260de7e68715ff8d80b05d47be