Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 11:15

General

  • Target

    BlitzedGrabberV12/BlitzedGrabberV12.exe

  • Size

    926.0MB

  • MD5

    930b3bbbaa989db448d8ec5c696a5a16

  • SHA1

    a27e7c76990a31f1414d429e828c81e14f48a00a

  • SHA256

    eacf04d721fe4880dc73790ccbd58acf310dc0c90b13b7424200a9aa2b94640a

  • SHA512

    cb9dc7db9f4a4c0dc5407d0a9bbd5c1301d5c4d03fed7d6b972c61a816c8860aff072f1515189d21b3336448a7c19d99f636cc3b060e4628c2ef7dbd1e75291a

  • SSDEEP

    49152:KUAHP06/eyShf+okdWtRAOk3HQ7JTDCgV4L6uzxGiWaUKU:WmBf2dWtnGcDnMjFWxK

Malware Config

Extracted

Family

orcus

C2

209.25.141.181:40489

Mutex

248d60d8a7114264bce951ca45664b1d

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programdata%\Chrome\chromedriver.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    winlogon.exe

  • watchdog_path

    AppData\svchost.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 33 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12\BlitzedGrabberV12.exe
    "C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12\BlitzedGrabberV12.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\mxfix.EXE
      "C:\Users\Admin\AppData\Local\Temp\mxfix.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3456
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -ExecutionPolicy Bypass -File mxfixer.ps1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1164
    • C:\Users\Admin\AppData\Local\Temp\UnityCrashHandlerV2.exe
      "C:\Users\Admin\AppData\Local\Temp\UnityCrashHandlerV2.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3240
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yqgqfe42.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5004
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7168.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7167.tmp"
          4⤵
            PID:4676
        • C:\Windows\SysWOW64\WindowsInput.exe
          "C:\Windows\SysWOW64\WindowsInput.exe" --install
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          PID:4360
        • C:\ProgramData\Chrome\chromedriver.exe
          "C:\ProgramData\Chrome\chromedriver.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Users\Admin\AppData\Roaming\svchost.exe
            "C:\Users\Admin\AppData\Roaming\svchost.exe" /launchSelfAndExit "C:\ProgramData\Chrome\chromedriver.exe" 1944 /protectFile
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1620
            • C:\Users\Admin\AppData\Roaming\svchost.exe
              "C:\Users\Admin\AppData\Roaming\svchost.exe" /watchProcess "C:\ProgramData\Chrome\chromedriver.exe" 1944 "/protectFile"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3172
      • C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe
        "C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:868
    • C:\Windows\SysWOW64\WindowsInput.exe
      "C:\Windows\SysWOW64\WindowsInput.exe"
      1⤵
      • Executes dropped EXE
      PID:3536
    • C:\ProgramData\Chrome\chromedriver.exe
      C:\ProgramData\Chrome\chromedriver.exe
      1⤵
      • Executes dropped EXE
      PID:3164

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log

      Filesize

      425B

      MD5

      4eaca4566b22b01cd3bc115b9b0b2196

      SHA1

      e743e0792c19f71740416e7b3c061d9f1336bf94

      SHA256

      34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

      SHA512

      bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

    • C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe

      Filesize

      1.6MB

      MD5

      228a69dc15032fd0fb7100ff8561185e

      SHA1

      f8dbc89fed8078da7f306cb78b92ce04a0bdeb00

      SHA256

      920bec9d500f6446b84399ab4c84858d0f0d7d1abb2e0377399ebbc4bafad709

      SHA512

      373621c4743fa72571b3c8375aa6f7852303a821558b016b002d2af07154787d978f66696db89eeed8fe41f4aed5d66b690d4f87469939f9b1dea2ac2b9101f1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mxfixer.ps1

      Filesize

      35B

      MD5

      5d792fc7c4e2fd3eb595fce4883dcb2d

      SHA1

      ee2a88f769ad746f119e144bd06832cb55ef1e0f

      SHA256

      41eccaa8649345b33e57f5d494429276e9f2eb23ca981f018da33a34aabfd8eb

      SHA512

      4b85fe8205c705914867227c97aa1333421970d8e6f11b2ac6be8e95fef1a0f31f985547eafe52e382f13c2a16afa05462bd614b75bee250464c50734d59a92e

    • C:\Users\Admin\AppData\Local\Temp\RES7168.tmp

      Filesize

      1KB

      MD5

      364393a360c5768656b80d4d527d8063

      SHA1

      b8d904657e54665e800d4ff16cceb62b7940d734

      SHA256

      f78ab4cb1324971b1cb7e4efbd484d2a81580bf2377b0299269499c768fcfdaf

      SHA512

      792234a46683f3249a035f5d73cb59d3c2f6fbc389a73b4122ab0b54bf028854d8bb49f1201ef376ef3ab0a6b0dcefc99587b39bc6b352f4f2667a528378dd64

    • C:\Users\Admin\AppData\Local\Temp\UnityCrashHandlerV2.exe

      Filesize

      6.0MB

      MD5

      3926c7b8fdfb0ab3b92303760b14d402

      SHA1

      b33e12ef4bdcd418139db59d048609c45fe8f9eb

      SHA256

      c101904ec19b45612213c2b398892a4523f63862bb3e24c245509db2417585e7

      SHA512

      4a022be27f58b1735f3a0ac9abdedbd769adb4e3ca1dacdcdc98700b17e138b647f9059585c8ef37fdd7072ad6283e95f10def171584097eb8c70e7d1212ce0e

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1osfh2dt.tjq.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\dcfb00f9-5ae7-4197-ba59-e48107e40d35\GunaDotNetRT.dll

      Filesize

      136KB

      MD5

      9af5eb006bb0bab7f226272d82c896c7

      SHA1

      c2a5bb42a5f08f4dc821be374b700652262308f0

      SHA256

      77dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db

      SHA512

      7badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a

    • C:\Users\Admin\AppData\Local\Temp\mxfix.EXE

      Filesize

      155KB

      MD5

      b4ec612c441786aa614ce5f32edae475

      SHA1

      3a264f8daeec9b156ddb5ed576d490dd8fbd8e7d

      SHA256

      e18ba6573b9aa2d139ed5c30f18ac2ece3ce8287d1651db4bc632dbc816f53bd

      SHA512

      c6800371cdc2b571061e6e755a2c95f49dcb233c3999976f180cb7cf95fa2c62d03b52a3c497a2cd7ae46ec72eaf823db25bd291ca676724194c05966f2bce16

    • C:\Users\Admin\AppData\Local\Temp\yqgqfe42.dll

      Filesize

      76KB

      MD5

      2cde6548fc65a8e0e437931cfe177e50

      SHA1

      539054c3530843828cafd0707f2c55476e41701f

      SHA256

      140c995ba8483e6946c96a6916f7fb650ce744de08758f2fba0a6d38e5018666

      SHA512

      06ac6ebe5c9a61d486ded8dadc4e3a68cfdc93bad9b0bceb75797417b9715c1900d728c19df23a4719888c48dd97bc0ed7b9fac9b72655b6a5900ada43f397de

    • C:\Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      9KB

      MD5

      913967b216326e36a08010fb70f9dba3

      SHA1

      7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

      SHA256

      8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

      SHA512

      c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

    • C:\Windows\SysWOW64\WindowsInput.exe

      Filesize

      21KB

      MD5

      e6fcf516d8ed8d0d4427f86e08d0d435

      SHA1

      c7691731583ab7890086635cb7f3e4c22ca5e409

      SHA256

      8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

      SHA512

      c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

    • C:\Windows\SysWOW64\WindowsInput.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC7167.tmp

      Filesize

      676B

      MD5

      24efbd1df54368d308d14bf886ddd31d

      SHA1

      56abccd1b1b97ac0880e034a35b78b41f9cc26e6

      SHA256

      f6295c01e8eb4f3d9d78e5fe2db9273ccfb5ebe8b9ea3666bdcaf694e6476fa0

      SHA512

      f1805e029e286dc7e6e9f6d5d31efe4c1913f84e113944af3334a650f30c9f3c366d17010c8e0063d906436aa372fba2d2a55dbe488343bb83e869b9eb9f9fd0

    • \??\c:\Users\Admin\AppData\Local\Temp\yqgqfe42.0.cs

      Filesize

      208KB

      MD5

      bc702d62e0eb715ddc107229c4d096a5

      SHA1

      7446541b60820b0be282eb5ff830124e95f46d39

      SHA256

      44779b579004c19132736a6073da6c2b0f9fd292a7ae19b639fcb41195f9e997

      SHA512

      1e878ce9525e67f4da4c2236f43f46f092a48687fbe7a32aea332b58a1bdc014ee7139c14e643fe9968fc20f53f62ffd140b78dd8940fbfc1357dcb405d297dd

    • \??\c:\Users\Admin\AppData\Local\Temp\yqgqfe42.cmdline

      Filesize

      349B

      MD5

      f8e5d66fed03042d56859392f699de11

      SHA1

      9b9cf675118f1e642211f9cbd7ab614d1f39a042

      SHA256

      bd72a63005ecef627f1532e387ca4114d9d8aca32fef6bdc17dac715b21b0247

      SHA512

      0409e4f8ee31abe2dcfa07fd6538f03c2d36bee0b08f1103759c3bdaab9d0e82fc4facb0527c76c0aa7f38938d68eaf76a9a6aaf00d954b932bf51445888eec0

    • memory/868-61-0x0000000005820000-0x0000000005A12000-memory.dmp

      Filesize

      1.9MB

    • memory/868-77-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-11811-0x0000000070C30000-0x0000000070C67000-memory.dmp

      Filesize

      220KB

    • memory/868-60-0x00000000054A0000-0x00000000054AA000-memory.dmp

      Filesize

      40KB

    • memory/868-11805-0x0000000006760000-0x00000000067FC000-memory.dmp

      Filesize

      624KB

    • memory/868-75-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-95-0x0000000070C30000-0x0000000070C67000-memory.dmp

      Filesize

      220KB

    • memory/868-128-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-126-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-134-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-132-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-130-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-124-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-122-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-120-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-81-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-71-0x0000000072F40000-0x0000000072FC9000-memory.dmp

      Filesize

      548KB

    • memory/868-57-0x0000000005550000-0x00000000055E2000-memory.dmp

      Filesize

      584KB

    • memory/868-72-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-73-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-79-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-51-0x0000000005B00000-0x00000000060A4000-memory.dmp

      Filesize

      5.6MB

    • memory/868-83-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-85-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-87-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-89-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-50-0x0000000000A60000-0x0000000000C0C000-memory.dmp

      Filesize

      1.7MB

    • memory/868-91-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-93-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-96-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-116-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-114-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-112-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-108-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-106-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-104-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-118-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-110-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-102-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-100-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/868-98-0x0000000005820000-0x0000000005A0E000-memory.dmp

      Filesize

      1.9MB

    • memory/1164-49-0x00000206DBBD0000-0x00000206DBBF2000-memory.dmp

      Filesize

      136KB

    • memory/1620-3287-0x0000000000BB0000-0x0000000000BB8000-memory.dmp

      Filesize

      32KB

    • memory/1780-48-0x00007FFD29780000-0x00007FFD2A241000-memory.dmp

      Filesize

      10.8MB

    • memory/1780-0-0x0000000000AC0000-0x0000000000D04000-memory.dmp

      Filesize

      2.3MB

    • memory/1780-1-0x00007FFD29780000-0x00007FFD2A241000-memory.dmp

      Filesize

      10.8MB

    • memory/1780-2-0x000000001B890000-0x000000001B8A0000-memory.dmp

      Filesize

      64KB

    • memory/1944-1221-0x0000000000690000-0x000000000078C000-memory.dmp

      Filesize

      1008KB

    • memory/1944-2624-0x000000001BA10000-0x000000001BA20000-memory.dmp

      Filesize

      64KB

    • memory/1944-2471-0x000000001BC00000-0x000000001BDC2000-memory.dmp

      Filesize

      1.8MB

    • memory/1944-2181-0x000000001B8F0000-0x000000001B908000-memory.dmp

      Filesize

      96KB

    • memory/1944-1739-0x0000000000F80000-0x0000000000F92000-memory.dmp

      Filesize

      72KB

    • memory/1944-1740-0x000000001B750000-0x000000001B79E000-memory.dmp

      Filesize

      312KB

    • memory/3240-254-0x000000001CD90000-0x000000001CDB0000-memory.dmp

      Filesize

      128KB

    • memory/3240-56-0x000000001BC30000-0x000000001BC3E000-memory.dmp

      Filesize

      56KB

    • memory/3240-250-0x000000001CD50000-0x000000001CD66000-memory.dmp

      Filesize

      88KB

    • memory/3240-58-0x000000001C130000-0x000000001C5FE000-memory.dmp

      Filesize

      4.8MB

    • memory/3240-38-0x00000000013D0000-0x00000000013E0000-memory.dmp

      Filesize

      64KB

    • memory/3240-253-0x0000000001340000-0x0000000001348000-memory.dmp

      Filesize

      32KB

    • memory/3240-252-0x00000000013C0000-0x00000000013D2000-memory.dmp

      Filesize

      72KB

    • memory/3240-53-0x000000001BA40000-0x000000001BA9C000-memory.dmp

      Filesize

      368KB

    • memory/3240-59-0x000000001C6A0000-0x000000001C73C000-memory.dmp

      Filesize

      624KB

    • memory/3536-275-0x000000001AB70000-0x000000001AC7A000-memory.dmp

      Filesize

      1.0MB

    • memory/4360-268-0x0000000000910000-0x000000000091C000-memory.dmp

      Filesize

      48KB

    • memory/4360-270-0x0000000002B20000-0x0000000002B5C000-memory.dmp

      Filesize

      240KB

    • memory/4360-269-0x0000000002AC0000-0x0000000002AD2000-memory.dmp

      Filesize

      72KB