Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe
Resource
win7-20240221-en
General
-
Target
e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe
-
Size
2.6MB
-
MD5
2e3e50a164ed12f84839412c8b8c0120
-
SHA1
33a4f58fd7bf804c5f27e2fd521ceb2bc956a7f6
-
SHA256
e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402
-
SHA512
0e0c9dd805c1854fc1d1d9e1824a4510814cb49998c9f2466da267338a7da256875287e6afb211f94dabb4fb2bb12731417e1efa36483f500d1c3b57bf06898a
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxR:Hh+ZkldoPKiYdqd6p
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 3 IoCs
resource yara_rule behavioral1/memory/2384-4-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2384-10-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2384-11-0x0000000000400000-0x00000000004EA000-memory.dmp orcus -
Executes dropped EXE 3 IoCs
pid Process 2668 setspn.exe 2740 setspn.exe 448 setspn.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1700-0-0x0000000000270000-0x000000000051A000-memory.dmp autoit_exe behavioral1/files/0x000c000000013187-22.dat autoit_exe behavioral1/memory/2668-24-0x00000000013D0000-0x000000000167A000-memory.dmp autoit_exe behavioral1/memory/2740-40-0x00000000013D0000-0x000000000167A000-memory.dmp autoit_exe behavioral1/memory/448-54-0x0000000000020000-0x00000000002CA000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1700 set thread context of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 2668 set thread context of 2572 2668 setspn.exe 33 PID 2740 set thread context of 2416 2740 setspn.exe 39 PID 448 set thread context of 1032 448 setspn.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2512 schtasks.exe 1732 schtasks.exe 2008 schtasks.exe 3032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 2668 setspn.exe 2668 setspn.exe 2740 setspn.exe 2740 setspn.exe 448 setspn.exe 448 setspn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2384 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 RegSvcs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 1700 wrote to memory of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 1700 wrote to memory of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 1700 wrote to memory of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 1700 wrote to memory of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 1700 wrote to memory of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 1700 wrote to memory of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 1700 wrote to memory of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 1700 wrote to memory of 2384 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 28 PID 1700 wrote to memory of 3032 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 29 PID 1700 wrote to memory of 3032 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 29 PID 1700 wrote to memory of 3032 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 29 PID 1700 wrote to memory of 3032 1700 e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe 29 PID 2772 wrote to memory of 2668 2772 taskeng.exe 32 PID 2772 wrote to memory of 2668 2772 taskeng.exe 32 PID 2772 wrote to memory of 2668 2772 taskeng.exe 32 PID 2772 wrote to memory of 2668 2772 taskeng.exe 32 PID 2668 wrote to memory of 2572 2668 setspn.exe 33 PID 2668 wrote to memory of 2572 2668 setspn.exe 33 PID 2668 wrote to memory of 2572 2668 setspn.exe 33 PID 2668 wrote to memory of 2572 2668 setspn.exe 33 PID 2668 wrote to memory of 2572 2668 setspn.exe 33 PID 2668 wrote to memory of 2572 2668 setspn.exe 33 PID 2668 wrote to memory of 2572 2668 setspn.exe 33 PID 2668 wrote to memory of 2572 2668 setspn.exe 33 PID 2668 wrote to memory of 2572 2668 setspn.exe 33 PID 2668 wrote to memory of 2512 2668 setspn.exe 34 PID 2668 wrote to memory of 2512 2668 setspn.exe 34 PID 2668 wrote to memory of 2512 2668 setspn.exe 34 PID 2668 wrote to memory of 2512 2668 setspn.exe 34 PID 2772 wrote to memory of 2740 2772 taskeng.exe 38 PID 2772 wrote to memory of 2740 2772 taskeng.exe 38 PID 2772 wrote to memory of 2740 2772 taskeng.exe 38 PID 2772 wrote to memory of 2740 2772 taskeng.exe 38 PID 2740 wrote to memory of 2416 2740 setspn.exe 39 PID 2740 wrote to memory of 2416 2740 setspn.exe 39 PID 2740 wrote to memory of 2416 2740 setspn.exe 39 PID 2740 wrote to memory of 2416 2740 setspn.exe 39 PID 2740 wrote to memory of 2416 2740 setspn.exe 39 PID 2740 wrote to memory of 2416 2740 setspn.exe 39 PID 2740 wrote to memory of 2416 2740 setspn.exe 39 PID 2740 wrote to memory of 2416 2740 setspn.exe 39 PID 2740 wrote to memory of 2416 2740 setspn.exe 39 PID 2740 wrote to memory of 1732 2740 setspn.exe 40 PID 2740 wrote to memory of 1732 2740 setspn.exe 40 PID 2740 wrote to memory of 1732 2740 setspn.exe 40 PID 2740 wrote to memory of 1732 2740 setspn.exe 40 PID 2772 wrote to memory of 448 2772 taskeng.exe 42 PID 2772 wrote to memory of 448 2772 taskeng.exe 42 PID 2772 wrote to memory of 448 2772 taskeng.exe 42 PID 2772 wrote to memory of 448 2772 taskeng.exe 42 PID 448 wrote to memory of 1032 448 setspn.exe 43 PID 448 wrote to memory of 1032 448 setspn.exe 43 PID 448 wrote to memory of 1032 448 setspn.exe 43 PID 448 wrote to memory of 1032 448 setspn.exe 43 PID 448 wrote to memory of 1032 448 setspn.exe 43 PID 448 wrote to memory of 1032 448 setspn.exe 43 PID 448 wrote to memory of 1032 448 setspn.exe 43 PID 448 wrote to memory of 1032 448 setspn.exe 43 PID 448 wrote to memory of 1032 448 setspn.exe 43 PID 448 wrote to memory of 2008 448 setspn.exe 44 PID 448 wrote to memory of 2008 448 setspn.exe 44 PID 448 wrote to memory of 2008 448 setspn.exe 44 PID 448 wrote to memory of 2008 448 setspn.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe"C:\Users\Admin\AppData\Local\Temp\e5a3892f9d8adb5ca1ffe1d13fabc58ff2ca04368e16e9ee96ba58627a230402.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2384
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3032
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {11F3CF9F-9AEF-4CC5-BD28-C9CFDBBB60FA} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2572
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2512
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2416
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1732
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1032
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5eb37f9af2fb49f2ddc523d6fc6581d07
SHA117ce69c7b96959548128ec6ebd772628f1ad5fdd
SHA25687f70c858a7ce9973ec2b83944b78cd1133db803bb998c61a79c83f1d4c36255
SHA5127cd371666363a5d8984c332f20968c85f067c7d563bf43bd6f45940129cfc04a6324c0bda993f0c8de823dde5addd54de26318c42bb092f458d2d5f671313725