Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 23:02

General

  • Target

    4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe

  • Size

    921KB

  • MD5

    4d72427546c5c7cd35e256401e80a030

  • SHA1

    d71c9ef0a220b89d1724584054ba0ed303b149a3

  • SHA256

    c91a6632c59372e0af003bd914f91ca513a20861ac18a4a58e719e8307846935

  • SHA512

    61f3d0f4772d20685dc41ab809c2f8f84fec4a0e64dbb0589a3663495472045841f99005d863b90622c92352225d6ecd98a055594404979b87a8cdad19af3c78

  • SSDEEP

    24576:wRo4MROxnFl64vrZlI0AilFEvxHiAHGWM:wRLMiDrZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

C2

bambuvn.webhop.info:1352

Mutex

ae9225f4fc36499e85213e441bb22bf6

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\Internet Explorer\svchost.exe

  • reconnect_delay

    10000

  • registry_keyname

    Updater Chrome

  • taskscheduler_taskname

    Updater Chrome

  • watchdog_path

    AppData\Taskmanagers.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4d72427546c5c7cd35e256401e80a030_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hasmg9ro.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA8D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA8C.tmp"
        3⤵
          PID:1780
      • C:\Windows\SysWOW64\WindowsInput.exe
        "C:\Windows\SysWOW64\WindowsInput.exe" --install
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        PID:2752
      • C:\Program Files\Internet Explorer\svchost.exe
        "C:\Program Files\Internet Explorer\svchost.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2488
    • C:\Windows\SysWOW64\WindowsInput.exe
      "C:\Windows\SysWOW64\WindowsInput.exe"
      1⤵
      • Executes dropped EXE
      PID:2628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Internet Explorer\svchost.exe

      Filesize

      921KB

      MD5

      4d72427546c5c7cd35e256401e80a030

      SHA1

      d71c9ef0a220b89d1724584054ba0ed303b149a3

      SHA256

      c91a6632c59372e0af003bd914f91ca513a20861ac18a4a58e719e8307846935

      SHA512

      61f3d0f4772d20685dc41ab809c2f8f84fec4a0e64dbb0589a3663495472045841f99005d863b90622c92352225d6ecd98a055594404979b87a8cdad19af3c78

    • C:\Users\Admin\AppData\Local\Temp\RESA8D.tmp

      Filesize

      1KB

      MD5

      ee63ca9c35cc0f2577d4d790d4445779

      SHA1

      8d9db6c81815ea8fe1931a63d025ed717c876d17

      SHA256

      44f10ebcbad50a5ba6cafa15975d4b9fbf786b4bdcbcfc51249f0451620dc74a

      SHA512

      3a96e028df5182d3aaccc55223ce8f3f881cfb7e0464fc8323bf8bc5b1c0c4719eb2b7ef6fb985c3a5057e03eb7a63e43d2f705f89b22cfa8bf57a1b995a1db4

    • C:\Users\Admin\AppData\Local\Temp\hasmg9ro.dll

      Filesize

      76KB

      MD5

      f428d5c0e82571cc47f9e7364f812305

      SHA1

      8b92992ec9512731fc9deca232b8d35dd874d54d

      SHA256

      d7a09862aa011fc9429ddfaf642572757dd4ae274c5b3b2a04093a25a21fd6a1

      SHA512

      c26a59438f76e110d7a77510d08fcbffef38bcd9233339b5506e29500c0e5ee707f3b261d91557577a66c169cdd8231f995230f3047faa0c29b6696af311d8d7

    • C:\Windows\SysWOW64\WindowsInput.exe

      Filesize

      21KB

      MD5

      e6fcf516d8ed8d0d4427f86e08d0d435

      SHA1

      c7691731583ab7890086635cb7f3e4c22ca5e409

      SHA256

      8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

      SHA512

      c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

    • C:\Windows\SysWOW64\WindowsInput.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCA8C.tmp

      Filesize

      676B

      MD5

      56ab2a4fefaa9d2780be9815c4c523c2

      SHA1

      91f564b51e9caaf10f07a609370643861d9d8ade

      SHA256

      c54f81d8aa53cc3d567874a3c3082c40fc8a335c881a746451ac202a050cdce6

      SHA512

      4570a7fc3b345f1d4872f5bef23ae49620f6c579f0914674a15d404c199ccb7eddabd79da79ab9c226b37d587e14ceed28d5990d71d05e28be33bde04cf8ed4f

    • \??\c:\Users\Admin\AppData\Local\Temp\hasmg9ro.0.cs

      Filesize

      208KB

      MD5

      2b14ae8b54d216abf4d228493ceca44a

      SHA1

      d134351498e4273e9d6391153e35416bc743adef

      SHA256

      4e1cc3da1f7bf92773aae6cffa6d61bfc3e25aead3ad947f6215f93a053f346c

      SHA512

      5761b605add10ae3ef80f3b8706c8241b4e8abe4ac3ce36b7be8a97d08b08da5a72fedd5e976b3c9e1c463613a943ebb5d323e6a075ef6c7c3b1abdc0d53ac05

    • \??\c:\Users\Admin\AppData\Local\Temp\hasmg9ro.cmdline

      Filesize

      349B

      MD5

      86ee2b3488acbb3b20f4583a98ce06a9

      SHA1

      7eadd0513a57cdb5f703f07f930c74e6c5fe2520

      SHA256

      d9ae339fa122735eb976ab67f3c143db6ff5c79f6df5670558fa7726b6e87ff0

      SHA512

      b269dd7779263af1acd50c66fcdd3295fcc41341bff3fd7a410637c5cce3d06a4fbc8a4a145604a058cf2dc7083cc9acb809104771cc99c3b6959cb941b9547d

    • memory/1936-20-0x0000000000440000-0x0000000000452000-memory.dmp

      Filesize

      72KB

    • memory/1936-44-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp

      Filesize

      9.6MB

    • memory/1936-17-0x0000000002120000-0x0000000002136000-memory.dmp

      Filesize

      88KB

    • memory/1936-4-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp

      Filesize

      9.6MB

    • memory/1936-0-0x000007FEF53BE000-0x000007FEF53BF000-memory.dmp

      Filesize

      4KB

    • memory/1936-21-0x0000000000970000-0x0000000000978000-memory.dmp

      Filesize

      32KB

    • memory/1936-3-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp

      Filesize

      9.6MB

    • memory/1936-1-0x0000000002360000-0x00000000023BC000-memory.dmp

      Filesize

      368KB

    • memory/1936-2-0x0000000000290000-0x000000000029E000-memory.dmp

      Filesize

      56KB

    • memory/1956-48-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp

      Filesize

      9.6MB

    • memory/1956-19-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmp

      Filesize

      9.6MB

    • memory/2488-45-0x00000000006A0000-0x00000000006EE000-memory.dmp

      Filesize

      312KB

    • memory/2488-43-0x0000000001390000-0x000000000147C000-memory.dmp

      Filesize

      944KB

    • memory/2488-46-0x0000000000B60000-0x0000000000B78000-memory.dmp

      Filesize

      96KB

    • memory/2488-47-0x0000000000C90000-0x0000000000CA0000-memory.dmp

      Filesize

      64KB

    • memory/2628-33-0x0000000000950000-0x000000000095C000-memory.dmp

      Filesize

      48KB

    • memory/2752-29-0x0000000000230000-0x000000000023C000-memory.dmp

      Filesize

      48KB