Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 16:02
Behavioral task
behavioral1
Sample
Byfron Ultimatum.exe
Resource
win7-20240508-en
General
-
Target
Byfron Ultimatum.exe
-
Size
911KB
-
MD5
4cbff1c9dfc88532ca3a71e9ee75e699
-
SHA1
c277d547a809531bc73b5b0f18d48c6ebc109709
-
SHA256
0eb38d225cb51a781634e4285262599b87c5829c63f6bce50062db64ef8cf39c
-
SHA512
b5baba36db1f3a88c0644adf4df723b61059ad0c68b3b657b753ab6e01db85948c6c22b3dab649c828da76cf6711303f9ac6853663b28575974ec6af63a5a3cd
-
SSDEEP
24576:gk84MROxnFj3wBukhrrcI0AilFEvxHPJooCp:giMi1ZqrrcI0AilFEvxHPK
Malware Config
Extracted
orcus
Niggers
should-nutritional.gl.at.ply.gg:22817
721eca8ad3474c2ab1c30e76379e1f7d
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\temp\conhost.exe
-
reconnect_delay
10000
-
registry_keyname
Microsoft
-
taskscheduler_taskname
winhost
-
watchdog_path
Temp\wininit.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x000e000000023358-16.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/memory/1636-1-0x0000000000E60000-0x0000000000F48000-memory.dmp orcus behavioral2/files/0x000e000000023358-16.dat orcus -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Byfron Ultimatum.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation conhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wininit.exe -
Executes dropped EXE 4 IoCs
pid Process 4952 conhost.exe 452 conhost.exe 3944 wininit.exe 436 wininit.exe -
Loads dropped DLL 22 IoCs
pid Process 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\temp\conhost.exe Byfron Ultimatum.exe File opened for modification C:\Program Files (x86)\temp\conhost.exe Byfron Ultimatum.exe File created C:\Program Files (x86)\temp\conhost.exe.config Byfron Ultimatum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 436 wininit.exe 436 wininit.exe 4952 conhost.exe 4952 conhost.exe 4952 conhost.exe 436 wininit.exe 436 wininit.exe 4952 conhost.exe 4952 conhost.exe 436 wininit.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 4952 conhost.exe 436 wininit.exe 436 wininit.exe 4952 conhost.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 4952 conhost.exe 436 wininit.exe 436 wininit.exe 4952 conhost.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 4952 conhost.exe 436 wininit.exe 4952 conhost.exe 436 wininit.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4952 conhost.exe Token: SeDebugPrivilege 3944 wininit.exe Token: SeDebugPrivilege 436 wininit.exe Token: SeBackupPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe Token: SeSecurityPrivilege 4952 conhost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4952 conhost.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4952 conhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4952 conhost.exe 4952 conhost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1636 wrote to memory of 4952 1636 Byfron Ultimatum.exe 94 PID 1636 wrote to memory of 4952 1636 Byfron Ultimatum.exe 94 PID 1636 wrote to memory of 4952 1636 Byfron Ultimatum.exe 94 PID 4952 wrote to memory of 3944 4952 conhost.exe 97 PID 4952 wrote to memory of 3944 4952 conhost.exe 97 PID 4952 wrote to memory of 3944 4952 conhost.exe 97 PID 3944 wrote to memory of 436 3944 wininit.exe 98 PID 3944 wrote to memory of 436 3944 wininit.exe 98 PID 3944 wrote to memory of 436 3944 wininit.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Byfron Ultimatum.exe"C:\Users\Admin\AppData\Local\Temp\Byfron Ultimatum.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\temp\conhost.exe"C:\Program Files (x86)\temp\conhost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\wininit.exe"C:\Users\Admin\AppData\Local\Temp\wininit.exe" /launchSelfAndExit "C:\Program Files (x86)\temp\conhost.exe" 4952 /protectFile3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\wininit.exe"C:\Users\Admin\AppData\Local\Temp\wininit.exe" /watchProcess "C:\Program Files (x86)\temp\conhost.exe" 4952 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
-
-
C:\Program Files (x86)\temp\conhost.exe"C:\Program Files (x86)\temp\conhost.exe"1⤵
- Executes dropped EXE
PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
911KB
MD54cbff1c9dfc88532ca3a71e9ee75e699
SHA1c277d547a809531bc73b5b0f18d48c6ebc109709
SHA2560eb38d225cb51a781634e4285262599b87c5829c63f6bce50062db64ef8cf39c
SHA512b5baba36db1f3a88c0644adf4df723b61059ad0c68b3b657b753ab6e01db85948c6c22b3dab649c828da76cf6711303f9ac6853663b28575974ec6af63a5a3cd
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
C:\Users\Admin\AppData\Roaming\Orcus\lib_721eca8ad3474c2ab1c30e76379e1f7d\AForge.Video.DirectShow.dll
Filesize60KB
MD517ed442e8485ac3f7dc5b3c089654a61
SHA1d3a17c1fdd6d54951141053f88bf8238dea0b937
SHA256666d44798d94eafa1ed21af79e9bc0293ffd96f863ab5d87f78bcee9ef9ffd6b
SHA5129118bf11760354e9971ae8b27f7f6a405e46145b39ca6e6b413cb2e729e51304b895965e9140f66c9e3ef7caa4f344762bf059688b23dd32e4c2df271394fea2
-
Filesize
20KB
MD50bd34aa29c7ea4181900797395a6da78
SHA1ddffdcef29daddc36ca7d8ae2c8e01c1c8bb23a8
SHA256bafa6ed04ca2782270074127a0498dde022c2a9f4096c6bb2b8e3c08bb3d404d
SHA512a3734660c0aba1c2b27ab55f9e578371b56c82754a3b7cfd01e68c88967c8dada8d202260220831f1d1039a5a35bd1a67624398e689702481ac056d1c1ddcdb0
-
Filesize
125KB
MD52b44c70c49b70d797fbb748158b5d9bb
SHA193e00e6527e461c45c7868d14cf05c007e478081
SHA2563762d43c83af69cd38c9341a927ca6bd00f6bae8217c874d693047d6df4705bf
SHA512faced62f6ecbfa2ee0d7a47e300302d23030d1f28758cbe9c442e9d8d4f8359c59088aa6237a28103e43d248c8efc7eeaf2c184028701b752df6cce92d6854d0
-
Filesize
271KB
MD598eb5ba5871acdeaebf3a3b0f64be449
SHA1c965284f60ef789b00b10b3df60ee682b4497de3
SHA256d7617d926648849cbfef450b8f48e458ee52e2793fb2251a30094b778aa8848c
SHA512a60025e304713d333e4b82b2d0be28087950688b049c98d2db5910c00b8d45b92e16d25ac8a58ff1318de019de3a9a00c7cbf8a6ad4b5bb1cb175dafa1b9bea2
-
Filesize
338KB
MD5934da0e49208d0881c44fe19d5033840
SHA1a19c5a822e82e41752a08d3bd9110db19a8a5016
SHA25602da4af8cd4a8de19d816000caaae885e676b9e52f136ff071a279c2b8ad34c7
SHA512de62f629c2299b50af62893244a28895d63b78138c8632449984306f45de16bd01076eadbb0d75a700215e970c1df731e202ea640236c0f0da6ed15146193b59
-
Filesize
247KB
MD5ffb4b61cc11bec6d48226027c2c26704
SHA1fa8b9e344accbdc4dffa9b5d821d23f0716da29e
SHA256061542ff3fb36039b7bbffdf3e07b66176b264c1dfd834a14b09c08620717303
SHA51248aa6130bf1f5bd6de19256bbdf754c0158b43dd122cec47bb801a7a7b56f2da268bfdec24d135621764a23278ead3dcc35911a057e2dfa55a348bae8ef7b8a9
-
Filesize
1.3MB
MD5ac6acc235ebef6374bed71b37e322874
SHA1a267baad59cd7352167636836bad4b971fcd6b6b
SHA256047b042cebf4c851f0d14f85f16ce952f03e48c20362d4ed9390875d4900fe96
SHA51272ac8b8c8f27264cc261297c325d14a0be2084d007c6132ab8402d87f912fe9189cb074db11625d9f86d29a6188f22a89e58ae45c9131fac4522473567017081