Overview
overview
7Static
static
306956d4e14...18.exe
windows7-x64
706956d4e14...18.exe
windows10-2004-x64
7$APPDATA/o...er.exe
windows7-x64
1$APPDATA/o...er.exe
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMPfolde...l3.dll
windows7-x64
1$TEMPfolde...l3.dll
windows10-2004-x64
1$TEMPfolde...r4.dll
windows7-x64
1$TEMPfolde...r4.dll
windows10-2004-x64
3$TEMPfolde...c4.dll
windows7-x64
1$TEMPfolde...c4.dll
windows10-2004-x64
3$TEMPfolde...s4.dll
windows7-x64
3$TEMPfolde...s4.dll
windows10-2004-x64
3$TEMPfolde...s3.dll
windows7-x64
1$TEMPfolde...s3.dll
windows10-2004-x64
3$TEMPfolde...bi.dll
windows7-x64
3$TEMPfolde...bi.dll
windows10-2004-x64
3$TEMPfolde...m3.dll
windows7-x64
1$TEMPfolde...m3.dll
windows10-2004-x64
1$TEMPfolde...l3.dll
windows7-x64
3$TEMPfolde...l3.dll
windows10-2004-x64
3$TEMPfolde...on.exe
windows7-x64
7$TEMPfolde...on.exe
windows10-2004-x64
7$TEMPfolde...e3.dll
windows7-x64
1$TEMPfolde...e3.dll
windows10-2004-x64
3$TEMPfolde...n3.dll
windows7-x64
3$TEMPfolde...n3.dll
windows10-2004-x64
3$TEMPfolde...e3.dll
windows7-x64
3$TEMPfolde...e3.dll
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
06956d4e1404512c1b2fbfaaa6d208aa_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06956d4e1404512c1b2fbfaaa6d208aa_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$APPDATA/ortmp/uninstaller.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$APPDATA/ortmp/uninstaller.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$TEMPfolder/ortmp/freebl3.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$TEMPfolder/ortmp/freebl3.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
$TEMPfolder/ortmp/libnspr4.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$TEMPfolder/ortmp/libnspr4.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
$TEMPfolder/ortmp/libplc4.dll
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
$TEMPfolder/ortmp/libplc4.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
$TEMPfolder/ortmp/libplds4.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$TEMPfolder/ortmp/libplds4.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
$TEMPfolder/ortmp/nss3.dll
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$TEMPfolder/ortmp/nss3.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
$TEMPfolder/ortmp/nssckbi.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
$TEMPfolder/ortmp/nssckbi.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$TEMPfolder/ortmp/nssdbm3.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$TEMPfolder/ortmp/nssdbm3.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
$TEMPfolder/ortmp/nssutil3.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$TEMPfolder/ortmp/nssutil3.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
$TEMPfolder/ortmp/orion.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$TEMPfolder/ortmp/orion.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
$TEMPfolder/ortmp/smime3.dll
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
$TEMPfolder/ortmp/smime3.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
$TEMPfolder/ortmp/softokn3.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$TEMPfolder/ortmp/softokn3.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
$TEMPfolder/ortmp/sqlite3.dll
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
$TEMPfolder/ortmp/sqlite3.dll
Resource
win10v2004-20240419-en
General
-
Target
$TEMPfolder/ortmp/orion.exe
-
Size
1.1MB
-
MD5
be84f2d7a82cafeaa173428f0370a46b
-
SHA1
d1775cd2bf9da213b013d4b6eabd0e8764a35c0e
-
SHA256
51b3f447940a700e264e0eb0ac4a90e137421a958928bb1ce709534d59990699
-
SHA512
79ce4c7769d1d22fe36b65baad8dc9523e47511a808a5bdcb1620f8c66cacb05f9ecc3a83fdc6a6a859f3402b00705bb0ffae25b4fdd3de6c1abee2eda734575
-
SSDEEP
24576:FjiSynMq8nwn5QS1+KpPr6+dZ5l1YSQlm5loSGTc/p/tb:hiSK59jm/jA/p/tb
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion orion.exe -
Loads dropped DLL 2 IoCs
pid Process 3956 Process not Found 4596 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cmdrun = "cmd.exe /C ipconfig /flushdns" orion.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\nusk\lucn\doo.dat orion.exe File opened for modification C:\Windows\System32\dnsapi.dll orion.exe File opened for modification C:\Windows\SysWOW64\dnsapi.dll orion.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS orion.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName orion.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer orion.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D830B6B8939ACB4928401060203BB648456BB4F8\Blob = 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 orion.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A7BD54B233B5B2F70AF86F5BD1A0C0A772A59FC6 orion.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A7BD54B233B5B2F70AF86F5BD1A0C0A772A59FC6\Blob = 030000000100000014000000a7bd54b233b5b2f70af86f5bd1a0c0a772a59fc6200000000100000028040000308204243082030ca00302010202090099e03027519fbe3c300d06092a864886f70d01010b05003069311330110603550403130a4a7577204c616f6e63653121301f060355040a13184c757377656c77205861726d6f6d7a6f64746f69204e6967310b300906035504061302434e3111300f060355040813084265666c6f616674310f300d060355040713064d7563776569301e170d3135303830393130323733335a170d3235303830363130323733335a3069311330110603550403130a4a7577204c616f6e63653121301f060355040a13184c757377656c77205861726d6f6d7a6f64746f69204e6967310b300906035504061302434e3111300f060355040813084265666c6f616674310f300d060355040713064d756377656930820122300d06092a864886f70d01010105000382010f003082010a02820101009ce93dbe9d339562eb762248d1342083156f73335fa1d64c16df1c9bf1566e55ea28cafeada885f862a152cc2ea1c526bff9782c1f925cd1d160cf4699de03766a83f697e707f6bf4a5a348fa13cf83825ca29cfd01cccbf9c9732a68383e7c7aac08e5a443cbe84a9c6a944e6ed93c5557d21c9564099b83ba15d6767b60605286a83a8a49310f99ede9e3e36465bb4ab4655ab642a06a50a80bf40d4807931ae2657f86d374ab2c2aeca2033e2d8de23ed6d8b786c16bffcf3816d80e68ae8231f9141d417e33d478f35f304fedfa33044589a418b9e678eebdfffbbec5ebd744de53e38d37d0ffc91ec474b8d6976c7fd0ad66e02a1c9279793c4ed5dded50203010001a381ce3081cb301d0603551d0e041604148b28b362de18f6f48228f98c02bacdfdfd3d595330819b0603551d2304819330819080148b28b362de18f6f48228f98c02bacdfdfd3d5953a16da46b3069311330110603550403130a4a7577204c616f6e63653121301f060355040a13184c757377656c77205861726d6f6d7a6f64746f69204e6967310b300906035504061302434e3111300f060355040813084265666c6f616674310f300d060355040713064d756377656982090099e03027519fbe3c300c0603551d13040530030101ff300d06092a864886f70d01010b050003820101001ee038133cb95e578467c8dfc3175eca3b46d9f3793a8984a13739b40a3c01af874ab03740d45dbdd2cdcd5a941a99fbbdcb10e761c3a68f8dbf55d9838589b448a4b2b530c4b831a2a1cbbee760e57ac02bb5135cf3ed2e400b5eddd0039d6df153467a3a6a494249926bf96d9f46811e5e08629828c87735df91e0254423e49e857d277ca04b69bbbcd90e050060dfb82cae38c40d560ef7738860403c78009d10303171de8c88cec0959d60320fe65573b9c853b4215624e9711cd41a89f39f64be5f6262ef66dd7acb51b032e0afe337f6890817645b11c7ae43e438321ddc29b92890d16a74a5e4ca91ad6ef7faf62a26387e74d2e7b2067877fe674fa3 orion.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F53E693DDABF57A88A9B12B608B09B26C0608B74 orion.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F53E693DDABF57A88A9B12B608B09B26C0608B74\Blob = 030000000100000014000000f53e693ddabf57a88a9b12b608b09b26c0608b7420000000010000003d0400003082043930820321a003020102020900b522f9b72eb992f5300d06092a864886f70d01010b05003070311730150603550403130e516f736d61626a205a69746d7579311c301a060355040a13134a6f6b74616974204675637075696c71204b69310b3009060355040613025255311530130603550408130c5568796362616d6665696375311330110603550407130a5675777a69686365796e301e170d3135303732393134343934395a170d3235303732363134343934395a3070311730150603550403130e516f736d61626a205a69746d7579311c301a060355040a13134a6f6b74616974204675637075696c71204b69310b3009060355040613025255311530130603550408130c5568796362616d6665696375311330110603550407130a5675777a69686365796e30820122300d06092a864886f70d01010105000382010f003082010a0282010100ca4b086fec8b6077eb80342e9e89684c82c69e0b2fa0270b498ddf79792f807eb4a37b678ab76723220fe5d4d731cc4d844d864f209138476de844dc01fb6bd053db536b0ab7b0966dd11ffb9ef68e0c46f42a138d4e19c262d1c445853cad35d7fb344df3ba5b8ca4eb165eb86a4ca42f9f348f52c6c2644b52e65c510b8b604f9ae33fdbcee9b505aedce5db2feae46b8145bf850fa075b78eaf9f2997a06527d4cb9d5b3e08c44e5da3a862d06deae1c17787113fcbac928bef96cac1174db4b2ae627ed62251527c3915ff618c45d34903ec088c105bd357ade281328794091369bcc3ac6b73b27645c175a55ac04636d5da6e9d48c1cace8fbc4e43f8df0203010001a381d53081d2301d0603551d0e04160414f9f7f8a7e3702dc6f19e540571c8f142dffffefe3081a20603551d2304819a3081978014f9f7f8a7e3702dc6f19e540571c8f142dffffefea174a4723070311730150603550403130e516f736d61626a205a69746d7579311c301a060355040a13134a6f6b74616974204675637075696c71204b69310b3009060355040613025255311530130603550408130c5568796362616d6665696375311330110603550407130a5675777a69686365796e820900b522f9b72eb992f5300c0603551d13040530030101ff300d06092a864886f70d01010b05000382010100865c953854b2d42898f7b5024866d830a138c98ca04f95aa6650301346e1dcd5fc26a579c83e451227d28a2b6ad5edcea01cb56e4a8518fa433eee470c5d727282c04ea71731e210d47d76f6425307dfd665008cc1754ea6aa681fc82150ec8f2eb39d96dd2e592aaa1cf4aff59834b58f63632c5f5c2e5508945c2102de73befd3c5cd891547236dbc9700182298df31be15033a70c689800d10a24930932e4db2844f9914400626da05c6769f883a0de29f0b87d83b9494da0425911b090e5f879192d7f9ae91c46e0a7e0b6ce5092e1ac833681c1b1ac451b17e4d70a241aac3c34936f64e6a70163f9be4e484a79766dec4da6bd2c61b701c9b11f2e8445 orion.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D830B6B8939ACB4928401060203BB648456BB4F8 orion.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe 2556 orion.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2556 orion.exe Token: SeTakeOwnershipPrivilege 2556 orion.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMPfolder\ortmp\orion.exe"C:\Users\Admin\AppData\Local\Temp\$TEMPfolder\ortmp\orion.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD56d7c9581a86119d5e6b33f5f292f2757
SHA1c2c100bf56f9deaf5084fc1814429db34bab3e7d
SHA2563ff11efc6200f40ff6befb5c59b2d35b7658f226c57e0c6a8a7a1e40a45c440c
SHA512762d72281921e5d49e15a1afaae8a690f231e359e4df1a4554c183a00e391a44fb86c4c2b174822da4aee7dfdc973bb2b5c09cdb9ebd056718587b70851cfbfc