Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 12:56

General

  • Target

    lab_samples/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe

  • Size

    312KB

  • MD5

    3c1228d714eeda8f94ebbcdb1d75a284

  • SHA1

    1728dfe3e2378b6c88e859e6af79c32b612aefc6

  • SHA256

    a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215

  • SHA512

    b3b6e81b9588fbbf42a96e4ce71e7428b52dd9b59a01ac934e63f1bce309609f507ae6f827c776a3eedc0afe45521466c4ddb76b851476fc774c8e3edcf713e4

  • SSDEEP

    6144:eaXnROjLTs0Yb+AjEk+9x94SsWLkBPR3T7IrRAFoFc3WUk:1hOjXjY9tKxu3WwPRj0eoFc3WR

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1104
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1160
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1192
          • C:\Users\Admin\AppData\Local\Temp\lab_samples\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
            "C:\Users\Admin\AppData\Local\Temp\lab_samples\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2072
            • C:\Users\Admin\AppData\Local\Temp\lab_samples\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
              "C:\Users\Admin\AppData\Local\Temp\lab_samples\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"
              3⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3024
              • C:\Users\Admin\AppData\Roaming\Ordy\ytlo.exe
                "C:\Users\Admin\AppData\Roaming\Ordy\ytlo.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3064
                • C:\Users\Admin\AppData\Roaming\Ordy\ytlo.exe
                  "C:\Users\Admin\AppData\Roaming\Ordy\ytlo.exe"
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2800
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp075b1167.bat"
                4⤵
                • Deletes itself
                • System Location Discovery: System Language Discovery
                PID:2252
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1388
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:632
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1680
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:2900
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:2480
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:2576
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                      1⤵
                        PID:612
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                        1⤵
                          PID:832
                        • C:\Windows\system32\DllHost.exe
                          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                          1⤵
                            PID:1828
                          • C:\Windows\system32\DllHost.exe
                            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                            1⤵
                              PID:3060

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\tmp075b1167.bat

                              Filesize

                              331B

                              MD5

                              860864d9de1245136d2a167a69088029

                              SHA1

                              44c9532f63c748fb21f68b4ede2192b11b965781

                              SHA256

                              132ef11b37b96ed51d59933bb1294054a791666e12932c898a7110fd7a16d8ff

                              SHA512

                              95165dfb439f6ed27ad35aab3abddf82ad0eb616585ad963575f93a33a4a536bbabcef67044ba6b8411b8c203a40db4e86b3d19ab2b220b928d21a4bcbf09e8b

                            • \Users\Admin\AppData\Roaming\Ordy\ytlo.exe

                              Filesize

                              312KB

                              MD5

                              a45f07d13dbbaa56c63cae8399d7dfa6

                              SHA1

                              081e69d07c2bf5a8e74a987ce198acf66e3e3e08

                              SHA256

                              4df6f98287993c308dc72f95ec7723500b9b56bc95512b599cdbac6b5f104415

                              SHA512

                              4265186571095b482d6c57212d65b85dff5719298f88511dea9a6e48415a4f0b4b81a0f4f19de6e23aa62de70a6e95b26c1bfb7aedeed5c2d96e5e60e6892b65

                            • memory/1104-49-0x0000000002170000-0x00000000021AB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1104-50-0x0000000002170000-0x00000000021AB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1104-51-0x0000000002170000-0x00000000021AB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1104-52-0x0000000002170000-0x00000000021AB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1104-53-0x0000000002170000-0x00000000021AB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1160-58-0x0000000001DA0000-0x0000000001DDB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1160-62-0x0000000001DA0000-0x0000000001DDB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1160-60-0x0000000001DA0000-0x0000000001DDB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1160-56-0x0000000001DA0000-0x0000000001DDB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1192-66-0x0000000003D90000-0x0000000003DCB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1192-68-0x0000000003D90000-0x0000000003DCB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1192-70-0x0000000003D90000-0x0000000003DCB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1192-72-0x0000000003D90000-0x0000000003DCB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1388-80-0x0000000001F30000-0x0000000001F6B000-memory.dmp

                              Filesize

                              236KB

                            • memory/1388-82-0x0000000001F30000-0x0000000001F6B000-memory.dmp

                              Filesize

                              236KB

                            • memory/1388-78-0x0000000001F30000-0x0000000001F6B000-memory.dmp

                              Filesize

                              236KB

                            • memory/1388-76-0x0000000001F30000-0x0000000001F6B000-memory.dmp

                              Filesize

                              236KB

                            • memory/2072-2-0x0000000000890000-0x00000000008B0000-memory.dmp

                              Filesize

                              128KB

                            • memory/2252-86-0x00000000000D0000-0x000000000010B000-memory.dmp

                              Filesize

                              236KB

                            • memory/2800-119-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/2800-45-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/2800-36-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/2800-41-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-3-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-16-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-11-0x0000000000370000-0x0000000000371000-memory.dmp

                              Filesize

                              4KB

                            • memory/3024-13-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-6-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-5-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-15-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-48-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-9-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-7-0x0000000000370000-0x0000000000371000-memory.dmp

                              Filesize

                              4KB

                            • memory/3024-35-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3024-17-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3064-29-0x0000000000400000-0x000000000044F000-memory.dmp

                              Filesize

                              316KB