Overview
overview
7Static
static
3Orbit_04.1...Lh.rar
windows7-x64
7Orbit_04.1...Lh.rar
windows10-2004-x64
7Free Cheats.url
windows7-x64
1Free Cheats.url
windows10-2004-x64
1Free Hacks.url
windows7-x64
1Free Hacks.url
windows10-2004-x64
1Orbit.exe
windows7-x64
1Orbit.exe
windows10-2004-x64
1Orbit/Disa...ty.reg
windows7-x64
1Orbit/Disa...ty.reg
windows10-2004-x64
1Orbit/Disa...st.reg
windows7-x64
1Orbit/Disa...st.reg
windows10-2004-x64
1Orbit/Driv...er.exe
windows7-x64
1Orbit/Driv...er.exe
windows10-2004-x64
1Orbit/Sams...ar.ttf
windows7-x64
3Orbit/Sams...ar.ttf
windows10-2004-x64
7Orbit/Smal...ar.ttf
windows7-x64
3Orbit/Smal...ar.ttf
windows10-2004-x64
7Orbit/Weap...ar.ttf
windows7-x64
3Orbit/Weap...ar.ttf
windows10-2004-x64
7Orbit/Win10_22H2.dll
windows7-x64
1Orbit/Win10_22H2.dll
windows10-2004-x64
1Orbit/Win11_22H2.dll
windows7-x64
1Orbit/Win11_22H2.dll
windows10-2004-x64
1Orbit/Zapp...ar.ttf
windows7-x64
3Orbit/Zapp...ar.ttf
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
Orbit_04.19.24_mEU75yLj9OCJxLh.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Orbit_04.19.24_mEU75yLj9OCJxLh.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Free Cheats.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Free Cheats.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Free Hacks.url
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Free Hacks.url
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
Orbit.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Orbit.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Orbit/DisableHypervisorEnforcedCodeIntegrity.reg
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Orbit/DisableHypervisorEnforcedCodeIntegrity.reg
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
Orbit/DisableVulnerableDriverList.reg
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Orbit/DisableVulnerableDriverList.reg
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
Orbit/DriverMapper.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Orbit/DriverMapper.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
Orbit/SamsungSans-Regular.ttf
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
Orbit/SamsungSans-Regular.ttf
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Orbit/SmallestPixel7-Regular.ttf
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Orbit/SmallestPixel7-Regular.ttf
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
Orbit/Weaponicons-Regular.ttf
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
Orbit/Weaponicons-Regular.ttf
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
Orbit/Win10_22H2.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Orbit/Win10_22H2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
Orbit/Win11_22H2.dll
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
Orbit/Win11_22H2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
Orbit/Zappericons-Regular.ttf
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Orbit/Zappericons-Regular.ttf
Resource
win10v2004-20240412-en
General
-
Target
Orbit/Zappericons-Regular.ttf
-
Size
3KB
-
MD5
6171764d98cd619bc54dff71fbdb646b
-
SHA1
578f0ae0a40c66950a87a76cc020ab22d5008288
-
SHA256
3c5f8071d0897b8c0dd694704b1cc4c051609c98a154e88a088e8e9ccf2fa56a
-
SHA512
52a35bde5e17f5d79fcf449b8c71243e7d51e6c984a54ae4058d460ce8bd6c4b55f474ee486e5a7fa3ddd2a9a5ced47ccd58dbd2011010d98fd69cf183f63b48
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4328 wrote to memory of 2988 4328 cmd.exe 86 PID 4328 wrote to memory of 2988 4328 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Orbit\Zappericons-Regular.ttf1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\Orbit\Zappericons-Regular.ttf2⤵PID:2988
-