Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 20:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
orqur private.exe
Resource
win7-20240705-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
orqur private.exe
Resource
win11-20240802-en
3 signatures
150 seconds
General
-
Target
orqur private.exe
-
Size
4.2MB
-
MD5
f2cfbd2044be6ba74865a13a1ecaa1e5
-
SHA1
a10cf96b3b9e7f891c4fd23ae240d2b61ab2e240
-
SHA256
031f4e437f35f70a75de0150f32afd6b85ef2785dc61091b783f63124c661a8a
-
SHA512
31e133b4f60df334c580452cf4ba8023f8ead15c3c1c1798aed0cf97a2aa74c81d1c9bfde6099cffffe3d8282e28cfa406056468f9488ef9305e0c60299ef5ae
-
SSDEEP
98304:3ZzS52Eh6JTMfW8DJW2n9pm9b4Hb3yxN5:l8h6JS/9D7C75
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 672 orqur private.exe 672 orqur private.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 672 orqur private.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 672 wrote to memory of 2744 672 orqur private.exe 31 PID 672 wrote to memory of 2744 672 orqur private.exe 31 PID 672 wrote to memory of 2744 672 orqur private.exe 31 PID 2744 wrote to memory of 2852 2744 cmd.exe 32 PID 2744 wrote to memory of 2852 2744 cmd.exe 32 PID 2744 wrote to memory of 2852 2744 cmd.exe 32 PID 2744 wrote to memory of 1168 2744 cmd.exe 33 PID 2744 wrote to memory of 1168 2744 cmd.exe 33 PID 2744 wrote to memory of 1168 2744 cmd.exe 33 PID 2744 wrote to memory of 2680 2744 cmd.exe 34 PID 2744 wrote to memory of 2680 2744 cmd.exe 34 PID 2744 wrote to memory of 2680 2744 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\orqur private.exe"C:\Users\Admin\AppData\Local\Temp\orqur private.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\orqur private.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\orqur private.exe" MD53⤵PID:2852
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1168
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2680
-
-