Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe
Resource
win7-20240221-en
General
-
Target
1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe
-
Size
2.6MB
-
MD5
a8f31863b2267620ae61e37c4d5fb26e
-
SHA1
2c8c86b736da9a861eef2921a6d20a3ae2070f9e
-
SHA256
1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda
-
SHA512
d92d90ce97bdaf0f6868b95236ac4a9050f498e53afed168d69ba0bb057c0f662ad9e783f9bf523f4d6cc4bfb0c308fec82e80e5ebac3b7c7a2c105aaf32cb5d
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxr:Hh+ZkldoPKiYdqd6z
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 6 IoCs
resource yara_rule behavioral1/memory/2828-4-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2828-10-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2828-11-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2104-44-0x0000000000090000-0x000000000017A000-memory.dmp orcus behavioral1/memory/2104-50-0x0000000000090000-0x000000000017A000-memory.dmp orcus behavioral1/memory/2104-51-0x0000000000090000-0x000000000017A000-memory.dmp orcus -
Executes dropped EXE 2 IoCs
pid Process 2800 setspn.exe 1264 setspn.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2200-0-0x00000000000F0000-0x000000000039A000-memory.dmp autoit_exe behavioral1/files/0x000b000000015ca5-24.dat autoit_exe behavioral1/memory/2800-26-0x00000000002D0000-0x000000000057A000-memory.dmp autoit_exe behavioral1/memory/1264-41-0x0000000000870000-0x0000000000B1A000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2200 set thread context of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2800 set thread context of 2184 2800 setspn.exe 35 PID 1264 set thread context of 2104 1264 setspn.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3040 schtasks.exe 2012 schtasks.exe 804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 2800 setspn.exe 2800 setspn.exe 1264 setspn.exe 1264 setspn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2828 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2828 RegSvcs.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2200 wrote to memory of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2200 wrote to memory of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2200 wrote to memory of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2200 wrote to memory of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2200 wrote to memory of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2200 wrote to memory of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2200 wrote to memory of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2200 wrote to memory of 2828 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 28 PID 2200 wrote to memory of 3040 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 29 PID 2200 wrote to memory of 3040 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 29 PID 2200 wrote to memory of 3040 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 29 PID 2200 wrote to memory of 3040 2200 1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe 29 PID 2704 wrote to memory of 2800 2704 taskeng.exe 34 PID 2704 wrote to memory of 2800 2704 taskeng.exe 34 PID 2704 wrote to memory of 2800 2704 taskeng.exe 34 PID 2704 wrote to memory of 2800 2704 taskeng.exe 34 PID 2800 wrote to memory of 2184 2800 setspn.exe 35 PID 2800 wrote to memory of 2184 2800 setspn.exe 35 PID 2800 wrote to memory of 2184 2800 setspn.exe 35 PID 2800 wrote to memory of 2184 2800 setspn.exe 35 PID 2800 wrote to memory of 2184 2800 setspn.exe 35 PID 2800 wrote to memory of 2184 2800 setspn.exe 35 PID 2800 wrote to memory of 2184 2800 setspn.exe 35 PID 2800 wrote to memory of 2184 2800 setspn.exe 35 PID 2800 wrote to memory of 2184 2800 setspn.exe 35 PID 2800 wrote to memory of 2012 2800 setspn.exe 36 PID 2800 wrote to memory of 2012 2800 setspn.exe 36 PID 2800 wrote to memory of 2012 2800 setspn.exe 36 PID 2800 wrote to memory of 2012 2800 setspn.exe 36 PID 2704 wrote to memory of 1264 2704 taskeng.exe 38 PID 2704 wrote to memory of 1264 2704 taskeng.exe 38 PID 2704 wrote to memory of 1264 2704 taskeng.exe 38 PID 2704 wrote to memory of 1264 2704 taskeng.exe 38 PID 1264 wrote to memory of 2104 1264 setspn.exe 39 PID 1264 wrote to memory of 2104 1264 setspn.exe 39 PID 1264 wrote to memory of 2104 1264 setspn.exe 39 PID 1264 wrote to memory of 2104 1264 setspn.exe 39 PID 1264 wrote to memory of 2104 1264 setspn.exe 39 PID 1264 wrote to memory of 2104 1264 setspn.exe 39 PID 1264 wrote to memory of 2104 1264 setspn.exe 39 PID 1264 wrote to memory of 2104 1264 setspn.exe 39 PID 1264 wrote to memory of 2104 1264 setspn.exe 39 PID 1264 wrote to memory of 804 1264 setspn.exe 40 PID 1264 wrote to memory of 804 1264 setspn.exe 40 PID 1264 wrote to memory of 804 1264 setspn.exe 40 PID 1264 wrote to memory of 804 1264 setspn.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe"C:\Users\Admin\AppData\Local\Temp\1e7dae75da903634a81fe6a18391b39329475fd298e726dec58e6de8216debda.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3040
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {ECF5F05E-2467-48AA-9ADC-78409BB077E0} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2184
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2012
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2104
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD53af51c3a98554a0bdc6fd5681e45f7ab
SHA10e3e546fee07876629f951e643e08e63d34a5e90
SHA256759000e6c8694d89636be52cd1a6e1c0e8704e6429219a663fe7e3054365436a
SHA5121cdfd7c1693895151ba74da942d0cb27369c6124e00a57a300a2930a0dfbf4bc8a813f9ce5d339fb59d2a2e658bd997f76a5993722daebb0179e8360901833ce