Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 02:01
Behavioral task
behavioral1
Sample
9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe
Resource
win7-20240215-en
General
-
Target
9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe
-
Size
3.0MB
-
MD5
c636ea3b6f9877ba652b6eff45951533
-
SHA1
f0cb217fe930c1f55bdd64633b111785df4816c6
-
SHA256
9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c
-
SHA512
b40941fb08547aa8492ce1fb98cd9ad0b51d7d527e69101fc92e7c17fa56ddb1a7503bb39eae4b0e79762edafaee1ae14db2ecbe4c5b7e3b38eace8c6674251b
-
SSDEEP
49152:ZGX87p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpKu/nRFfjI7L0qb:ZLHTPJg8z1mKnypSbRxo9JCm
Malware Config
Extracted
orcus
Новый тег
31.44.184.52:64770
sudo_acbjyh476x3aev1tpdb5g04kwe8v7vcj
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
C:\Program Files (x86)\Tlauncher.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012252-14.dat family_orcus -
Orcurs Rat Executable 9 IoCs
resource yara_rule behavioral1/memory/1600-0-0x0000000000840000-0x0000000000B3E000-memory.dmp orcus behavioral1/memory/2608-18-0x0000000000CB0000-0x0000000000FAE000-memory.dmp orcus behavioral1/files/0x000a000000012252-14.dat orcus behavioral1/memory/2704-26-0x0000000000400000-0x00000000006FE000-memory.dmp orcus behavioral1/memory/2704-32-0x0000000000400000-0x00000000006FE000-memory.dmp orcus behavioral1/memory/2704-35-0x0000000000400000-0x00000000006FE000-memory.dmp orcus behavioral1/memory/2704-30-0x0000000000400000-0x00000000006FE000-memory.dmp orcus behavioral1/memory/2704-25-0x0000000000400000-0x00000000006FE000-memory.dmp orcus behavioral1/memory/1236-43-0x00000000010F0000-0x00000000013EE000-memory.dmp orcus -
Executes dropped EXE 4 IoCs
pid Process 2608 Tlauncher.exe 2424 Tlauncher.exe 1236 Tlauncher.exe 2248 Tlauncher.exe -
Loads dropped DLL 1 IoCs
pid Process 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2608 set thread context of 2704 2608 Tlauncher.exe 30 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Tlauncher.exe 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe File opened for modification C:\Program Files (x86)\Tlauncher.exe 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe File created C:\Program Files (x86)\Tlauncher.exe.config 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe 2608 Tlauncher.exe 2608 Tlauncher.exe 2704 regasm.exe 2704 regasm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe Token: SeDebugPrivilege 2608 Tlauncher.exe Token: SeDebugPrivilege 2704 regasm.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2608 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe 28 PID 1600 wrote to memory of 2608 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe 28 PID 1600 wrote to memory of 2608 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe 28 PID 1600 wrote to memory of 2608 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe 28 PID 1600 wrote to memory of 2608 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe 28 PID 1600 wrote to memory of 2608 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe 28 PID 1600 wrote to memory of 2608 1600 9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe 28 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2608 wrote to memory of 2704 2608 Tlauncher.exe 30 PID 2644 wrote to memory of 2424 2644 taskeng.exe 31 PID 2644 wrote to memory of 2424 2644 taskeng.exe 31 PID 2644 wrote to memory of 2424 2644 taskeng.exe 31 PID 2644 wrote to memory of 2424 2644 taskeng.exe 31 PID 2644 wrote to memory of 2424 2644 taskeng.exe 31 PID 2644 wrote to memory of 2424 2644 taskeng.exe 31 PID 2644 wrote to memory of 2424 2644 taskeng.exe 31 PID 2644 wrote to memory of 1236 2644 taskeng.exe 34 PID 2644 wrote to memory of 1236 2644 taskeng.exe 34 PID 2644 wrote to memory of 1236 2644 taskeng.exe 34 PID 2644 wrote to memory of 1236 2644 taskeng.exe 34 PID 2644 wrote to memory of 1236 2644 taskeng.exe 34 PID 2644 wrote to memory of 1236 2644 taskeng.exe 34 PID 2644 wrote to memory of 1236 2644 taskeng.exe 34 PID 2644 wrote to memory of 2248 2644 taskeng.exe 35 PID 2644 wrote to memory of 2248 2644 taskeng.exe 35 PID 2644 wrote to memory of 2248 2644 taskeng.exe 35 PID 2644 wrote to memory of 2248 2644 taskeng.exe 35 PID 2644 wrote to memory of 2248 2644 taskeng.exe 35 PID 2644 wrote to memory of 2248 2644 taskeng.exe 35 PID 2644 wrote to memory of 2248 2644 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe"C:\Users\Admin\AppData\Local\Temp\9fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Tlauncher.exe"C:\Program Files (x86)\Tlauncher.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {52046009-2EA6-470B-A351-A9F93CB39E5A} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Tlauncher.exe"C:\Program Files (x86)\Tlauncher.exe"2⤵
- Executes dropped EXE
PID:2424
-
-
C:\Program Files (x86)\Tlauncher.exe"C:\Program Files (x86)\Tlauncher.exe"2⤵
- Executes dropped EXE
PID:1236
-
-
C:\Program Files (x86)\Tlauncher.exe"C:\Program Files (x86)\Tlauncher.exe"2⤵
- Executes dropped EXE
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5c636ea3b6f9877ba652b6eff45951533
SHA1f0cb217fe930c1f55bdd64633b111785df4816c6
SHA2569fedb52bebc89b548caf1c2d8438b88e3abe3004106f5c85595fa9ef3b952c2c
SHA512b40941fb08547aa8492ce1fb98cd9ad0b51d7d527e69101fc92e7c17fa56ddb1a7503bb39eae4b0e79762edafaee1ae14db2ecbe4c5b7e3b38eace8c6674251b
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad