Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    17/06/2024, 06:41 UTC

General

  • Target

    b73c62ae01e5afb4e6f9295663d6e4d7_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    b73c62ae01e5afb4e6f9295663d6e4d7

  • SHA1

    4bc872c0d89e5790de2f8d531d1c940714a6749c

  • SHA256

    83e6a80db984b2ca27ad53fa4b5dbda611ac315eda9ddbcbe96067d3e15816fa

  • SHA512

    89dc11c7f3d5aaf998adbb5e79e7cf1ef74bc9eb89809cfe3b485a4ef6c20982c8add263db64c5df3d38541cb51d58e6b37530da079cb425870349bc0836f24a

  • SSDEEP

    24576:1IQwzFQMJFFSzlCqGv5pUDH+RMRQtPO5Xj9snGmUqf/yj2RCSGux9pYYwqF:uQ96IGBxRs22VSnGmUqCqnxrYm

Malware Config

Extracted

Family

orcus

C2

88.150.189.98:9989

Mutex

888d0d2baff647a0a0872845c71c5fc6

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %appdata%\AudioDriver\AudoDriver.exe

  • reconnect_delay

    10000

  • registry_keyname

    AudioDriver

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b73c62ae01e5afb4e6f9295663d6e4d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b73c62ae01e5afb4e6f9295663d6e4d7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\b73c62ae01e5afb4e6f9295663d6e4d7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b73c62ae01e5afb4e6f9295663d6e4d7_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:812
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\07jkb4ur.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8D72.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8D61.tmp"
          4⤵
            PID:2624
        • C:\Users\Admin\AppData\Roaming\AudioDriver\AudoDriver.exe
          "C:\Users\Admin\AppData\Roaming\AudioDriver\AudoDriver.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2468
          • C:\Users\Admin\AppData\Roaming\AudioDriver\AudoDriver.exe
            "C:\Users\Admin\AppData\Roaming\AudioDriver\AudoDriver.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2040

    Network

      No results found
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    • 88.150.189.98:9989
      AudoDriver.exe
      152 B
      120 B
      3
      3
    No results found

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\07jkb4ur.dll

      Filesize

      76KB

      MD5

      b49ee13803a059dc106819fb0e17dc4e

      SHA1

      d7377e9584d8ff63c38971fdb95cbf0219ae5158

      SHA256

      343b38e6c7e190fc9e55d108ae11f4907e0b4d9d22aee734ce9b2b9b74ab9131

      SHA512

      1b964be4300962495236c1f2f904b38bcf3c4b231e6ffe80030d51cef2c0185ebaa801d34e4821cf3a605ad9dcbc4115393ea0aeba556979758b079656aafb5f

    • C:\Users\Admin\AppData\Local\Temp\RES8D72.tmp

      Filesize

      1KB

      MD5

      40863728097409d39742d59663dfd2d0

      SHA1

      fcb1745390edef6ef58210d4f721bd5a4c4a092a

      SHA256

      58cf5e2d576295d50f173e4b1cbcdd5c0e59745052bbeb1bd4f0ee2d160964f2

      SHA512

      a64ccdc1f7ebd1468e5eb86b494eaf14bbdb85d2cff451cbf5d07a0d41c0159dd7e204147fc1e7917e973f0881fafa29d72ba64f0c544025347ab217aa48672f

    • C:\Users\Admin\AppData\Roaming\AudioDriver\AudoDriver.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • \??\c:\Users\Admin\AppData\Local\Temp\07jkb4ur.0.cs

      Filesize

      208KB

      MD5

      b6f8b90c68fd472ceddbe5fd499a65ea

      SHA1

      1e7682d308d0823924e4e8adbc85905ecdd70155

      SHA256

      5ffa73389a4ae7ff4bd8db70994f732da44970540ad95d5a28a01b28ed11e3d4

      SHA512

      b3ca780b879514061b305d46efbbeff16c5d77954130233ff118de3fa73b1416596c799481c1ab5d89a6a31f1383c89e0104b9312284cecd7dd84c0e9ed0147c

    • \??\c:\Users\Admin\AppData\Local\Temp\07jkb4ur.cmdline

      Filesize

      347B

      MD5

      024089f6d3ce21520d2da573689f82ae

      SHA1

      8121ef239eb98bc3fd809ac914758657464a6763

      SHA256

      36ce14cfdda309befff54662b50946b81b4ce95eb8cc11a4f907c9177a47190d

      SHA512

      48f608ab75613624e315e63f2c6122910d4dde776b5198baa70d7c1c50177330b7203c02a2058906e9d614b1c6c6a584cc6797be85d4899c041255674c7e4c91

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC8D61.tmp

      Filesize

      676B

      MD5

      deefe610b557a902b203197815fb2f0b

      SHA1

      8c615c631e06b995d4db390e8b39fc43016756f6

      SHA256

      879708f4c476780b1324da46daa352e2f52569ced9b7f918decd1fbb6b1cc280

      SHA512

      789ef39f00dbc724368a5ced9c03992e20154ae97ef1242353782fe03ff692536ce793f1ac691224196bbaaf0c9c936d011bad17b43be4f855e6552b6ab4baab

    • \Users\Admin\AppData\Roaming\AudioDriver\AudoDriver.exe

      Filesize

      1.5MB

      MD5

      b73c62ae01e5afb4e6f9295663d6e4d7

      SHA1

      4bc872c0d89e5790de2f8d531d1c940714a6749c

      SHA256

      83e6a80db984b2ca27ad53fa4b5dbda611ac315eda9ddbcbe96067d3e15816fa

      SHA512

      89dc11c7f3d5aaf998adbb5e79e7cf1ef74bc9eb89809cfe3b485a4ef6c20982c8add263db64c5df3d38541cb51d58e6b37530da079cb425870349bc0836f24a

    • memory/812-19-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/812-17-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/812-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/812-15-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/812-21-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/812-20-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/812-13-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/812-10-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/812-9-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/812-7-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/812-5-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/812-45-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/1720-18-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/1720-2-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/1720-1-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/1720-0-0x0000000074621000-0x0000000074622000-memory.dmp

      Filesize

      4KB

    • memory/1720-4-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/1720-3-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2040-64-0x0000000000230000-0x000000000023E000-memory.dmp

      Filesize

      56KB

    • memory/2040-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2040-65-0x0000000000350000-0x00000000003AC000-memory.dmp

      Filesize

      368KB

    • memory/2040-66-0x0000000000670000-0x0000000000682000-memory.dmp

      Filesize

      72KB

    • memory/2040-68-0x0000000000690000-0x00000000006A8000-memory.dmp

      Filesize

      96KB

    • memory/2040-67-0x0000000001290000-0x00000000012DE000-memory.dmp

      Filesize

      312KB

    • memory/2040-69-0x0000000000B90000-0x0000000000BA0000-memory.dmp

      Filesize

      64KB

    • memory/2468-47-0x0000000001300000-0x000000000147E000-memory.dmp

      Filesize

      1.5MB

    • memory/2468-48-0x0000000006430000-0x0000000006580000-memory.dmp

      Filesize

      1.3MB

    • memory/2468-49-0x00000000004A0000-0x00000000004A8000-memory.dmp

      Filesize

      32KB

    • memory/2668-34-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2668-27-0x0000000074620000-0x0000000074BCB000-memory.dmp

      Filesize

      5.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.