Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe
Resource
win7-20240221-en
General
-
Target
d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe
-
Size
2.6MB
-
MD5
8b1f5d1ae0a540c81c70105a41c8626c
-
SHA1
168664b8419fdd5a654e41bcbe0cbfe196be7c41
-
SHA256
d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61
-
SHA512
d88f2620b0b50af97a57711b59df6a7a343cbc5b3af04552641ec8b942bf8c770bc9b07baeac07d9461fe863d4e62497b627f93a17212e1c188d4e32374ce119
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxI:Hh+ZkldoPKiYdqd6A
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 3 IoCs
resource yara_rule behavioral1/memory/2900-3-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2900-9-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2900-10-0x0000000000400000-0x00000000004EA000-memory.dmp orcus -
Executes dropped EXE 2 IoCs
pid Process 2700 setspn.exe 540 setspn.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2904-0-0x0000000000FD0000-0x000000000127A000-memory.dmp autoit_exe behavioral1/files/0x000d000000014698-23.dat autoit_exe behavioral1/memory/2700-25-0x00000000008D0000-0x0000000000B7A000-memory.dmp autoit_exe behavioral1/memory/540-39-0x00000000008D0000-0x0000000000B7A000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2904 set thread context of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2700 set thread context of 2760 2700 setspn.exe 35 PID 540 set thread context of 3004 540 setspn.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1932 schtasks.exe 1724 schtasks.exe 2468 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 2700 setspn.exe 2700 setspn.exe 540 setspn.exe 540 setspn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2900 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 RegSvcs.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2904 wrote to memory of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2904 wrote to memory of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2904 wrote to memory of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2904 wrote to memory of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2904 wrote to memory of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2904 wrote to memory of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2904 wrote to memory of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2904 wrote to memory of 2900 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 28 PID 2904 wrote to memory of 2468 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 29 PID 2904 wrote to memory of 2468 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 29 PID 2904 wrote to memory of 2468 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 29 PID 2904 wrote to memory of 2468 2904 d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe 29 PID 1476 wrote to memory of 2700 1476 taskeng.exe 34 PID 1476 wrote to memory of 2700 1476 taskeng.exe 34 PID 1476 wrote to memory of 2700 1476 taskeng.exe 34 PID 1476 wrote to memory of 2700 1476 taskeng.exe 34 PID 2700 wrote to memory of 2760 2700 setspn.exe 35 PID 2700 wrote to memory of 2760 2700 setspn.exe 35 PID 2700 wrote to memory of 2760 2700 setspn.exe 35 PID 2700 wrote to memory of 2760 2700 setspn.exe 35 PID 2700 wrote to memory of 2760 2700 setspn.exe 35 PID 2700 wrote to memory of 2760 2700 setspn.exe 35 PID 2700 wrote to memory of 2760 2700 setspn.exe 35 PID 2700 wrote to memory of 2760 2700 setspn.exe 35 PID 2700 wrote to memory of 2760 2700 setspn.exe 35 PID 2700 wrote to memory of 1932 2700 setspn.exe 36 PID 2700 wrote to memory of 1932 2700 setspn.exe 36 PID 2700 wrote to memory of 1932 2700 setspn.exe 36 PID 2700 wrote to memory of 1932 2700 setspn.exe 36 PID 1476 wrote to memory of 540 1476 taskeng.exe 38 PID 1476 wrote to memory of 540 1476 taskeng.exe 38 PID 1476 wrote to memory of 540 1476 taskeng.exe 38 PID 1476 wrote to memory of 540 1476 taskeng.exe 38 PID 540 wrote to memory of 3004 540 setspn.exe 39 PID 540 wrote to memory of 3004 540 setspn.exe 39 PID 540 wrote to memory of 3004 540 setspn.exe 39 PID 540 wrote to memory of 3004 540 setspn.exe 39 PID 540 wrote to memory of 3004 540 setspn.exe 39 PID 540 wrote to memory of 3004 540 setspn.exe 39 PID 540 wrote to memory of 3004 540 setspn.exe 39 PID 540 wrote to memory of 3004 540 setspn.exe 39 PID 540 wrote to memory of 3004 540 setspn.exe 39 PID 540 wrote to memory of 1724 540 setspn.exe 40 PID 540 wrote to memory of 1724 540 setspn.exe 40 PID 540 wrote to memory of 1724 540 setspn.exe 40 PID 540 wrote to memory of 1724 540 setspn.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe"C:\Users\Admin\AppData\Local\Temp\d5c7ca634e831f4c0471cee5f2730a899b43d5486263f0de4b3883eaca2c3a61.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2468
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6C91C2D4-A948-4F1C-83FE-783429D44530} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1932
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3004
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD584f961b1964c5c5ba90002fb563c5ec3
SHA1838e1c72f6875856303b828e99d2d713b212eb24
SHA256764b1635606b270a0d2ad36dcf7c3a1f4511d6fdd5a7343fa5374934b7e38854
SHA51269636e1be0d38807dfda06d63daf61da07714cdea1ba7109b4451034dcaf1e1468eb5128b34582c6fb5950ac891c3c78a287c5608685cec3ced7dc1c57650858