Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 12:56
Behavioral task
behavioral1
Sample
lab_samples/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lab_samples/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lab_samples/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
lab_samples/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
Resource
win10v2004-20241007-en
General
-
Target
lab_samples/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
-
Size
312KB
-
MD5
3c1228d714eeda8f94ebbcdb1d75a284
-
SHA1
1728dfe3e2378b6c88e859e6af79c32b612aefc6
-
SHA256
a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215
-
SHA512
b3b6e81b9588fbbf42a96e4ce71e7428b52dd9b59a01ac934e63f1bce309609f507ae6f827c776a3eedc0afe45521466c4ddb76b851476fc774c8e3edcf713e4
-
SSDEEP
6144:eaXnROjLTs0Yb+AjEk+9x94SsWLkBPR3T7IrRAFoFc3WUk:1hOjXjY9tKxu3WwPRj0eoFc3WR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3064 ytlo.exe 2800 ytlo.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ycbuawuz = "C:\\Users\\Admin\\AppData\\Roaming\\Ordy\\ytlo.exe" ytlo.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2072 set thread context of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 3064 set thread context of 2800 3064 ytlo.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ytlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ytlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe 2800 ytlo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe Token: SeSecurityPrivilege 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 3064 ytlo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 2072 wrote to memory of 3024 2072 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 30 PID 3024 wrote to memory of 3064 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 31 PID 3024 wrote to memory of 3064 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 31 PID 3024 wrote to memory of 3064 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 31 PID 3024 wrote to memory of 3064 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 31 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3064 wrote to memory of 2800 3064 ytlo.exe 33 PID 3024 wrote to memory of 2252 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 34 PID 3024 wrote to memory of 2252 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 34 PID 3024 wrote to memory of 2252 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 34 PID 3024 wrote to memory of 2252 3024 a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe 34 PID 2800 wrote to memory of 1104 2800 ytlo.exe 19 PID 2800 wrote to memory of 1104 2800 ytlo.exe 19 PID 2800 wrote to memory of 1104 2800 ytlo.exe 19 PID 2800 wrote to memory of 1104 2800 ytlo.exe 19 PID 2800 wrote to memory of 1104 2800 ytlo.exe 19 PID 2800 wrote to memory of 1160 2800 ytlo.exe 20 PID 2800 wrote to memory of 1160 2800 ytlo.exe 20 PID 2800 wrote to memory of 1160 2800 ytlo.exe 20 PID 2800 wrote to memory of 1160 2800 ytlo.exe 20 PID 2800 wrote to memory of 1160 2800 ytlo.exe 20 PID 2800 wrote to memory of 1192 2800 ytlo.exe 21 PID 2800 wrote to memory of 1192 2800 ytlo.exe 21 PID 2800 wrote to memory of 1192 2800 ytlo.exe 21 PID 2800 wrote to memory of 1192 2800 ytlo.exe 21 PID 2800 wrote to memory of 1192 2800 ytlo.exe 21 PID 2800 wrote to memory of 1388 2800 ytlo.exe 23 PID 2800 wrote to memory of 1388 2800 ytlo.exe 23 PID 2800 wrote to memory of 1388 2800 ytlo.exe 23 PID 2800 wrote to memory of 1388 2800 ytlo.exe 23 PID 2800 wrote to memory of 1388 2800 ytlo.exe 23 PID 2800 wrote to memory of 2252 2800 ytlo.exe 34 PID 2800 wrote to memory of 2252 2800 ytlo.exe 34 PID 2800 wrote to memory of 2252 2800 ytlo.exe 34 PID 2800 wrote to memory of 2252 2800 ytlo.exe 34 PID 2800 wrote to memory of 2252 2800 ytlo.exe 34 PID 2800 wrote to memory of 632 2800 ytlo.exe 36 PID 2800 wrote to memory of 632 2800 ytlo.exe 36 PID 2800 wrote to memory of 632 2800 ytlo.exe 36 PID 2800 wrote to memory of 632 2800 ytlo.exe 36 PID 2800 wrote to memory of 632 2800 ytlo.exe 36 PID 2800 wrote to memory of 1680 2800 ytlo.exe 37 PID 2800 wrote to memory of 1680 2800 ytlo.exe 37 PID 2800 wrote to memory of 1680 2800 ytlo.exe 37 PID 2800 wrote to memory of 1680 2800 ytlo.exe 37 PID 2800 wrote to memory of 1680 2800 ytlo.exe 37 PID 2800 wrote to memory of 2900 2800 ytlo.exe 38
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\lab_samples\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"C:\Users\Admin\AppData\Local\Temp\lab_samples\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\lab_samples\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"C:\Users\Admin\AppData\Local\Temp\lab_samples\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\Ordy\ytlo.exe"C:\Users\Admin\AppData\Roaming\Ordy\ytlo.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\Ordy\ytlo.exe"C:\Users\Admin\AppData\Roaming\Ordy\ytlo.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp075b1167.bat"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1388
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:632
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1680
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2900
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2480
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2576
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:612
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:832
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1828
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331B
MD5860864d9de1245136d2a167a69088029
SHA144c9532f63c748fb21f68b4ede2192b11b965781
SHA256132ef11b37b96ed51d59933bb1294054a791666e12932c898a7110fd7a16d8ff
SHA51295165dfb439f6ed27ad35aab3abddf82ad0eb616585ad963575f93a33a4a536bbabcef67044ba6b8411b8c203a40db4e86b3d19ab2b220b928d21a4bcbf09e8b
-
Filesize
312KB
MD5a45f07d13dbbaa56c63cae8399d7dfa6
SHA1081e69d07c2bf5a8e74a987ce198acf66e3e3e08
SHA2564df6f98287993c308dc72f95ec7723500b9b56bc95512b599cdbac6b5f104415
SHA5124265186571095b482d6c57212d65b85dff5719298f88511dea9a6e48415a4f0b4b81a0f4f19de6e23aa62de70a6e95b26c1bfb7aedeed5c2d96e5e60e6892b65