Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15/02/2023, 20:21
Behavioral task
behavioral1
Sample
4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe
Resource
win7-20220901-en
General
-
Target
4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe
-
Size
3.0MB
-
MD5
fd560527411b6fc1dec327027f1b6a51
-
SHA1
056c4273219177194fa2d4c7cd308470391a4c53
-
SHA256
4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc66de1544868f1d7fb61
-
SHA512
ca9d08e114656441a4378c8232021e570e577a2aed27fbb53f286c76910ecb8aaa5e87cf83d0b529f0b9072ac919d83b94afa64ddfde0f7d3b29213dae70b988
-
SSDEEP
49152:Jsa3PHJZKMvup/RGA1Ub/6U3bFaAypQxbzkso9JnCmaukrrzI0AilFCvxHI:JjGUu1D1Uj6UnypSbzPo9JCm
Malware Config
Extracted
orcus
Sln
193.138.195.211:10134
eaf050d367294b239fe7db992d6ea4d7
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\svchost.exe
-
reconnect_delay
10000
-
registry_keyname
svchost
-
taskscheduler_taskname
svc host
-
watchdog_path
AppData\svchost.exe
Signatures
-
Orcus main payload 4 IoCs
resource yara_rule behavioral1/files/0x0009000000012330-68.dat family_orcus behavioral1/files/0x0009000000012330-70.dat family_orcus behavioral1/files/0x0009000000012330-72.dat family_orcus behavioral1/files/0x0009000000012330-79.dat family_orcus -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/1996-59-0x0000000000770000-0x000000000078E000-memory.dmp family_stormkitty -
Orcurs Rat Executable 6 IoCs
resource yara_rule behavioral1/memory/1996-54-0x0000000000970000-0x0000000000C78000-memory.dmp orcus behavioral1/files/0x0009000000012330-68.dat orcus behavioral1/files/0x0009000000012330-70.dat orcus behavioral1/files/0x0009000000012330-72.dat orcus behavioral1/memory/1568-73-0x0000000000C00000-0x0000000000F08000-memory.dmp orcus behavioral1/files/0x0009000000012330-79.dat orcus -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 764 WindowsInput.exe 1780 WindowsInput.exe 1568 svchost.exe 1928 svchost.exe 1628 svchost.exe 956 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe 1568 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Program Files (x86)\\svchost.exe\"" svchost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com 11 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\svchost.exe 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe File created C:\Program Files (x86)\svchost.exe.config 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe File created C:\Program Files (x86)\Ionic.Zip.dll svchost.exe File created C:\Program Files (x86)\svchost.exe 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1568 svchost.exe 956 svchost.exe 956 svchost.exe 1568 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe 1568 svchost.exe 956 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1568 svchost.exe Token: SeDebugPrivilege 1628 svchost.exe Token: SeDebugPrivilege 956 svchost.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1996 wrote to memory of 764 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 27 PID 1996 wrote to memory of 764 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 27 PID 1996 wrote to memory of 764 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 27 PID 1996 wrote to memory of 764 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 27 PID 1996 wrote to memory of 1568 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 29 PID 1996 wrote to memory of 1568 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 29 PID 1996 wrote to memory of 1568 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 29 PID 1996 wrote to memory of 1568 1996 4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe 29 PID 1084 wrote to memory of 1928 1084 taskeng.exe 31 PID 1084 wrote to memory of 1928 1084 taskeng.exe 31 PID 1084 wrote to memory of 1928 1084 taskeng.exe 31 PID 1084 wrote to memory of 1928 1084 taskeng.exe 31 PID 1568 wrote to memory of 1516 1568 svchost.exe 33 PID 1568 wrote to memory of 1516 1568 svchost.exe 33 PID 1568 wrote to memory of 1516 1568 svchost.exe 33 PID 1568 wrote to memory of 1516 1568 svchost.exe 33 PID 1516 wrote to memory of 320 1516 cmd.exe 35 PID 1516 wrote to memory of 320 1516 cmd.exe 35 PID 1516 wrote to memory of 320 1516 cmd.exe 35 PID 1516 wrote to memory of 320 1516 cmd.exe 35 PID 1516 wrote to memory of 700 1516 cmd.exe 36 PID 1516 wrote to memory of 700 1516 cmd.exe 36 PID 1516 wrote to memory of 700 1516 cmd.exe 36 PID 1516 wrote to memory of 700 1516 cmd.exe 36 PID 1516 wrote to memory of 1652 1516 cmd.exe 37 PID 1516 wrote to memory of 1652 1516 cmd.exe 37 PID 1516 wrote to memory of 1652 1516 cmd.exe 37 PID 1516 wrote to memory of 1652 1516 cmd.exe 37 PID 1568 wrote to memory of 1288 1568 svchost.exe 38 PID 1568 wrote to memory of 1288 1568 svchost.exe 38 PID 1568 wrote to memory of 1288 1568 svchost.exe 38 PID 1568 wrote to memory of 1288 1568 svchost.exe 38 PID 1288 wrote to memory of 1996 1288 cmd.exe 40 PID 1288 wrote to memory of 1996 1288 cmd.exe 40 PID 1288 wrote to memory of 1996 1288 cmd.exe 40 PID 1288 wrote to memory of 1996 1288 cmd.exe 40 PID 1288 wrote to memory of 1344 1288 cmd.exe 41 PID 1288 wrote to memory of 1344 1288 cmd.exe 41 PID 1288 wrote to memory of 1344 1288 cmd.exe 41 PID 1288 wrote to memory of 1344 1288 cmd.exe 41 PID 1568 wrote to memory of 1628 1568 svchost.exe 42 PID 1568 wrote to memory of 1628 1568 svchost.exe 42 PID 1568 wrote to memory of 1628 1568 svchost.exe 42 PID 1568 wrote to memory of 1628 1568 svchost.exe 42 PID 1628 wrote to memory of 956 1628 svchost.exe 43 PID 1628 wrote to memory of 956 1628 svchost.exe 43 PID 1628 wrote to memory of 956 1628 svchost.exe 43 PID 1628 wrote to memory of 956 1628 svchost.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe"C:\Users\Admin\AppData\Local\Temp\4b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:764
-
-
C:\Program Files (x86)\svchost.exe"C:\Program Files (x86)\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:320
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵PID:700
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1996
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵PID:1344
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe" /launchSelfAndExit "C:\Program Files (x86)\svchost.exe" 1568 /protectFile3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe" /watchProcess "C:\Program Files (x86)\svchost.exe" 1568 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:1780
-
C:\Windows\system32\taskeng.exetaskeng.exe {60F71A80-81BD-4BA8-8E59-5100FEB1EAF4} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\svchost.exe"C:\Program Files (x86)\svchost.exe"2⤵
- Executes dropped EXE
PID:1928
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5fd560527411b6fc1dec327027f1b6a51
SHA1056c4273219177194fa2d4c7cd308470391a4c53
SHA2564b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc66de1544868f1d7fb61
SHA512ca9d08e114656441a4378c8232021e570e577a2aed27fbb53f286c76910ecb8aaa5e87cf83d0b529f0b9072ac919d83b94afa64ddfde0f7d3b29213dae70b988
-
Filesize
3.0MB
MD5fd560527411b6fc1dec327027f1b6a51
SHA1056c4273219177194fa2d4c7cd308470391a4c53
SHA2564b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc66de1544868f1d7fb61
SHA512ca9d08e114656441a4378c8232021e570e577a2aed27fbb53f286c76910ecb8aaa5e87cf83d0b529f0b9072ac919d83b94afa64ddfde0f7d3b29213dae70b988
-
Filesize
3.0MB
MD5fd560527411b6fc1dec327027f1b6a51
SHA1056c4273219177194fa2d4c7cd308470391a4c53
SHA2564b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc66de1544868f1d7fb61
SHA512ca9d08e114656441a4378c8232021e570e577a2aed27fbb53f286c76910ecb8aaa5e87cf83d0b529f0b9072ac919d83b94afa64ddfde0f7d3b29213dae70b988
-
Filesize
349B
MD589817519e9e0b4e703f07e8c55247861
SHA14636de1f6c997a25c3190f73f46a3fd056238d78
SHA256f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13
SHA512b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3
-
Filesize
9KB
MD5c95012f934b8bb6e1fb1bcb11cd9f2eb
SHA1c6a565d220ff45730639cf5ec15a97a8ffa88dad
SHA256e0b4b9fb56af1bab31bb2150352fa7335fd80cde7e67a53e30d983769d4802ea
SHA512bbd86d779af8981a80a87fff9517e3546e9e62bad5a69f76bbf28e608354c91aca3659dfd7df9b9a8223b1f3700796a85de09015454ac894771e7f9e17b89c18
-
Filesize
9KB
MD5c95012f934b8bb6e1fb1bcb11cd9f2eb
SHA1c6a565d220ff45730639cf5ec15a97a8ffa88dad
SHA256e0b4b9fb56af1bab31bb2150352fa7335fd80cde7e67a53e30d983769d4802ea
SHA512bbd86d779af8981a80a87fff9517e3546e9e62bad5a69f76bbf28e608354c91aca3659dfd7df9b9a8223b1f3700796a85de09015454ac894771e7f9e17b89c18
-
Filesize
9KB
MD5c95012f934b8bb6e1fb1bcb11cd9f2eb
SHA1c6a565d220ff45730639cf5ec15a97a8ffa88dad
SHA256e0b4b9fb56af1bab31bb2150352fa7335fd80cde7e67a53e30d983769d4802ea
SHA512bbd86d779af8981a80a87fff9517e3546e9e62bad5a69f76bbf28e608354c91aca3659dfd7df9b9a8223b1f3700796a85de09015454ac894771e7f9e17b89c18
-
Filesize
418B
MD547fb1af739ade4e938c8e6d2e504f4a4
SHA1b5c2786f406614105e488ee500858fc09365170d
SHA256552fc8db5bd09828e3d73ad68b737efc7f91980d860effd0c68f7d329cf20a92
SHA51267eb6bade5cca517ef0ba29197548e1d3df45fbad8cf2e407dbb3927c09f3da5008783348716f77311d3e2528f473651c3c8f59bb6cbea31050e39ae5fd09297
-
Filesize
21KB
MD5e1e29e723b9e1e50d31e316adab71499
SHA15dbc31fb31aba92814f7c6d7d38cbeec8b17c0b2
SHA2564c4490b91bd263bce6232db74e4f86b1e5ea66b7954c4d28b694217aa871b5a3
SHA512de0f1c54b7b38e45e7194f35bf668a5387aed04b4d665affc4f0eeb18fa43f527c7f8b9eb57d175bd0418722e83caa188fa65fc6cebf2bec0a74435d1db3f7f3
-
Filesize
21KB
MD5e1e29e723b9e1e50d31e316adab71499
SHA15dbc31fb31aba92814f7c6d7d38cbeec8b17c0b2
SHA2564c4490b91bd263bce6232db74e4f86b1e5ea66b7954c4d28b694217aa871b5a3
SHA512de0f1c54b7b38e45e7194f35bf668a5387aed04b4d665affc4f0eeb18fa43f527c7f8b9eb57d175bd0418722e83caa188fa65fc6cebf2bec0a74435d1db3f7f3
-
Filesize
21KB
MD5e1e29e723b9e1e50d31e316adab71499
SHA15dbc31fb31aba92814f7c6d7d38cbeec8b17c0b2
SHA2564c4490b91bd263bce6232db74e4f86b1e5ea66b7954c4d28b694217aa871b5a3
SHA512de0f1c54b7b38e45e7194f35bf668a5387aed04b4d665affc4f0eeb18fa43f527c7f8b9eb57d175bd0418722e83caa188fa65fc6cebf2bec0a74435d1db3f7f3
-
Filesize
349B
MD589817519e9e0b4e703f07e8c55247861
SHA14636de1f6c997a25c3190f73f46a3fd056238d78
SHA256f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13
SHA512b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3
-
Filesize
451KB
MD56ded8fcbf5f1d9e422b327ca51625e24
SHA18a1140cebc39f6994eef7e8de4627fb7b72a2dd9
SHA2563b3e541682e48f3fd2872f85a06278da2f3e7877ee956da89b90d732a1eaa0bd
SHA512bda3a65133b7b1e2765c7d07c7da5103292b3c4c2f0673640428b3e7e8637b11539f06c330ab5d0ba6e2274bd2dcd2c50312be6579e75c4008ff5ae7dae34ce4
-
Filesize
451KB
MD56ded8fcbf5f1d9e422b327ca51625e24
SHA18a1140cebc39f6994eef7e8de4627fb7b72a2dd9
SHA2563b3e541682e48f3fd2872f85a06278da2f3e7877ee956da89b90d732a1eaa0bd
SHA512bda3a65133b7b1e2765c7d07c7da5103292b3c4c2f0673640428b3e7e8637b11539f06c330ab5d0ba6e2274bd2dcd2c50312be6579e75c4008ff5ae7dae34ce4
-
Filesize
451KB
MD56ded8fcbf5f1d9e422b327ca51625e24
SHA18a1140cebc39f6994eef7e8de4627fb7b72a2dd9
SHA2563b3e541682e48f3fd2872f85a06278da2f3e7877ee956da89b90d732a1eaa0bd
SHA512bda3a65133b7b1e2765c7d07c7da5103292b3c4c2f0673640428b3e7e8637b11539f06c330ab5d0ba6e2274bd2dcd2c50312be6579e75c4008ff5ae7dae34ce4
-
Filesize
451KB
MD56ded8fcbf5f1d9e422b327ca51625e24
SHA18a1140cebc39f6994eef7e8de4627fb7b72a2dd9
SHA2563b3e541682e48f3fd2872f85a06278da2f3e7877ee956da89b90d732a1eaa0bd
SHA512bda3a65133b7b1e2765c7d07c7da5103292b3c4c2f0673640428b3e7e8637b11539f06c330ab5d0ba6e2274bd2dcd2c50312be6579e75c4008ff5ae7dae34ce4
-
Filesize
3.0MB
MD5fd560527411b6fc1dec327027f1b6a51
SHA1056c4273219177194fa2d4c7cd308470391a4c53
SHA2564b632ccdd041def4ecbaf20f41033ebcd8317ad696ccc66de1544868f1d7fb61
SHA512ca9d08e114656441a4378c8232021e570e577a2aed27fbb53f286c76910ecb8aaa5e87cf83d0b529f0b9072ac919d83b94afa64ddfde0f7d3b29213dae70b988
-
Filesize
9KB
MD5c95012f934b8bb6e1fb1bcb11cd9f2eb
SHA1c6a565d220ff45730639cf5ec15a97a8ffa88dad
SHA256e0b4b9fb56af1bab31bb2150352fa7335fd80cde7e67a53e30d983769d4802ea
SHA512bbd86d779af8981a80a87fff9517e3546e9e62bad5a69f76bbf28e608354c91aca3659dfd7df9b9a8223b1f3700796a85de09015454ac894771e7f9e17b89c18
-
Filesize
21KB
MD5e1e29e723b9e1e50d31e316adab71499
SHA15dbc31fb31aba92814f7c6d7d38cbeec8b17c0b2
SHA2564c4490b91bd263bce6232db74e4f86b1e5ea66b7954c4d28b694217aa871b5a3
SHA512de0f1c54b7b38e45e7194f35bf668a5387aed04b4d665affc4f0eeb18fa43f527c7f8b9eb57d175bd0418722e83caa188fa65fc6cebf2bec0a74435d1db3f7f3