Overview
overview
8Static
static
7OSIRIS.rar
windows7-x64
3OSIRIS.rar
windows10-2004-x64
3OSIRIS/AdbWinApi.dll
windows7-x64
3OSIRIS/AdbWinApi.dll
windows10-2004-x64
3OSIRIS/OSIRIS.exe
windows7-x64
7OSIRIS/OSIRIS.exe
windows10-2004-x64
7OSIRIS/OSIRIS.lic
windows7-x64
3OSIRIS/OSIRIS.lic
windows10-2004-x64
3OSIRIS/adb.exe
windows7-x64
3OSIRIS/adb.exe
windows10-2004-x64
8Analysis
-
max time kernel
1794s -
max time network
1799s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 11:42
Behavioral task
behavioral1
Sample
OSIRIS.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
OSIRIS.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
OSIRIS/AdbWinApi.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
OSIRIS/AdbWinApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
OSIRIS/OSIRIS.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
OSIRIS/OSIRIS.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
OSIRIS/OSIRIS.lic
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
OSIRIS/OSIRIS.lic
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
OSIRIS/adb.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
OSIRIS/adb.exe
Resource
win10v2004-20240802-en
General
-
Target
OSIRIS/AdbWinApi.dll
-
Size
104KB
-
MD5
99df7a009a6ad10c23180f823000938d
-
SHA1
a6c012414794260d724df39cafb3beeccc852cc5
-
SHA256
c81d6ebb3968b58b53beecf9c01e5c17ccf6fd4671fecf0293f5b07417b93844
-
SHA512
fcf498c3bf48b14265bd5da7d9c90048bcc92a3fe6ab31db0cdf5622002b040cc1cd6226e4394922f41b800c22e9d066558b12603bf0dfd6fb25865d9d19bebe
-
SSDEEP
1536:OpCxybY0FS6MqS6WvgD9xj03TabrFvY5J6sCGtL7kxi:Opo0k6ZWVTaif6sCGd3
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2484 3936 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3936 1608 rundll32.exe 91 PID 1608 wrote to memory of 3936 1608 rundll32.exe 91 PID 1608 wrote to memory of 3936 1608 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\OSIRIS\AdbWinApi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\OSIRIS\AdbWinApi.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 6163⤵
- Program crash
PID:2484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3936 -ip 39361⤵PID:2716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3924,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=2508 /prefetch:81⤵PID:1724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4928,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=3688 /prefetch:81⤵PID:4060