Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 01:20
Behavioral task
behavioral1
Sample
ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe
Resource
win7-20240221-en
General
-
Target
ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe
-
Size
907KB
-
MD5
e724bedeb1fa3ed735249d635f07c63f
-
SHA1
97da2042297fc775aacb9144ede209ff54e6c285
-
SHA256
ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05
-
SHA512
c80ea9df49feffc41520a20f960f0901c84ff4f01d4e57fe22b28efc0723024173caab775457ca334db6f4c28aa88f3fc880f79af3aab2a07c2c2ca4b5d74751
-
SSDEEP
24576:Feu4MROxnFDgHFrZlI0AilFEvxHiOoWE:FetMi4FrZlI0AilFEvxHi
Malware Config
Extracted
orcus
127.0.0.1:80
8d5cf256dea346ae86cdf4349684f822
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x0003000000022ab7-31.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/files/0x0003000000022ab7-31.dat orcus behavioral2/memory/4228-41-0x0000000000410000-0x00000000004F8000-memory.dmp orcus -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe -
Executes dropped EXE 1 IoCs
pid Process 4228 Orcus.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe File opened for modification C:\Windows\assembly\Desktop.ini ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Orcus\Orcus.exe ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe File opened for modification C:\Program Files\Orcus\Orcus.exe ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe File created C:\Program Files\Orcus\Orcus.exe.config ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe File created C:\Windows\assembly\Desktop.ini ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe File opened for modification C:\Windows\assembly\Desktop.ini ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2968 2172 ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe 86 PID 2172 wrote to memory of 2968 2172 ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe 86 PID 2968 wrote to memory of 3052 2968 csc.exe 88 PID 2968 wrote to memory of 3052 2968 csc.exe 88 PID 2172 wrote to memory of 4228 2172 ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe 89 PID 2172 wrote to memory of 4228 2172 ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe"C:\Users\Admin\AppData\Local\Temp\ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q8yfa0ee.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3E23.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3E22.tmp"3⤵PID:3052
-
-
-
C:\Program Files\Orcus\Orcus.exe"C:\Program Files\Orcus\Orcus.exe"2⤵
- Executes dropped EXE
PID:4228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5e724bedeb1fa3ed735249d635f07c63f
SHA197da2042297fc775aacb9144ede209ff54e6c285
SHA256ff8c369b9e17986f63b24d523b12b81d078b364dc1490634059c419ba4a0cc05
SHA512c80ea9df49feffc41520a20f960f0901c84ff4f01d4e57fe22b28efc0723024173caab775457ca334db6f4c28aa88f3fc880f79af3aab2a07c2c2ca4b5d74751
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
1KB
MD582bf0486229c774c27d66a51959034af
SHA10c99fff7823b154fff11fa4da8c4acc606d65773
SHA25692fe7b986eaabc9fd21e29a39b1ef3e6705baa7a23021bef3d51714607b1aef2
SHA512ae420f45a549c9f1737cbbb082121627a0334685a6d2ceaded3eac182ee17497ea46b35e97cc3e21b2acbaf96491a51f675b90d8ae1c0479c1823cbbdcead8ff
-
Filesize
76KB
MD5d301c32eb31c408905a953b960c6d456
SHA1dc49e949593c9a3eedb13e162f8d0e651974ea93
SHA25621686efa1eff70bccf8646acfe6a18c45f616a97b2221bd0bebe74bb90e01e2c
SHA51211292ce287a20a23b261c62c88bfef681e57f9cd43eddba15bc190b2de3614d9cefe93979ba4f040f809740571e962f49bd96cff1b521818d3e09191bdc67abb
-
Filesize
676B
MD5c062d892e8246631081a27dbecdd02e8
SHA1760a4ae57ef96a832c69ca72de9752a886e765df
SHA256d6a0453cbea4ab0aaf119af6279d85edb079d1dd5e375fb9c06aaedf146e7623
SHA5122f29ff23ede8a6fce00cd7cbeb537f0f41664028b8a92a1471e2ef273cd8d7f772e35145cbf56949062d019eb5673442d4c28e262f49b88e0d8babfc56e279d1
-
Filesize
208KB
MD5a35d7980d16faa5d80cc20bb931ae7fe
SHA1543511391b2c8a541a93d17aba039309b641ec2c
SHA2561166d7857031452a234764166f9b4601a23b9db50d149b82af984399e6121562
SHA51289871fcf218cecdf68b3f6de2b9106d6d681e828a443d3d3243283457b4df54261e01a2b34078f65336f96253d91b95e246b4151be31b18daa15b3a58807a89c
-
Filesize
349B
MD5cff74c509e4a47877ef23b179604d2bd
SHA1be94024fbbebe2cc97fea58b634e4fabbe6b5478
SHA2567f5f00431e34f36a73944b358bd72c34f85a3dbe08bebce61d5f3aefe471ab7c
SHA512a559a8888f2a670badd309d810a073fc1bdf0db8bf7f634fe74ba9bac0f18c607fd9bbb5baf10f08ac21e561793035459ae756b295f520458cc898c8544c9ff9