Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 01:01
Behavioral task
behavioral1
Sample
a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe
Resource
win7-20240508-en
General
-
Target
a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe
-
Size
924KB
-
MD5
df4d4c4eee0bb233905ef88daca5e3e0
-
SHA1
4c9c17b1c2e1654c7da04a3674f02cc15502b550
-
SHA256
a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e
-
SHA512
63517b87374cc0e3cf5a20ce2e64e44355bc88cb5a9688127dcd7285b1092b46362495272274513ec33d16ab17d050f1f8ff988ad431c662ed0e315abadddc0d
-
SSDEEP
24576:Yzra4MROxnFE3KrXpmrZlI0AilFEvxHinj:Yz1MiuQpmrZlI0AilFEvxHi
Malware Config
Extracted
orcus
192.168.0.2:3294
ef78f6dadb714fbfa27cffbd5e73fe5b
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\NvidiaControler\NvidiaControler.exe
-
reconnect_delay
10000
-
registry_keyname
NvidiaControler
-
taskscheduler_taskname
NvidiaControlers
-
watchdog_path
AppData\NvidiaControler.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x000800000001473f-43.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/files/0x000800000001473f-43.dat orcus behavioral1/memory/2116-47-0x0000000001080000-0x000000000116E000-memory.dmp orcus -
Executes dropped EXE 6 IoCs
pid Process 2860 WindowsInput.exe 2520 WindowsInput.exe 2116 NvidiaControler.exe 1632 NvidiaControler.exe 2444 NvidiaControler.exe 2332 NvidiaControler.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\NvidiaControler\NvidiaControler.exe.config a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File created C:\Program Files\NvidiaControler\NvidiaControler.exe a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File opened for modification C:\Program Files\NvidiaControler\NvidiaControler.exe a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2332 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2116 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe 2116 NvidiaControler.exe 2116 NvidiaControler.exe 2332 NvidiaControler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2116 NvidiaControler.exe Token: SeDebugPrivilege 2444 NvidiaControler.exe Token: SeDebugPrivilege 2332 NvidiaControler.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 NvidiaControler.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2116 NvidiaControler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2116 NvidiaControler.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2848 wrote to memory of 3020 2848 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 28 PID 2848 wrote to memory of 3020 2848 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 28 PID 2848 wrote to memory of 3020 2848 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 28 PID 3020 wrote to memory of 2356 3020 csc.exe 30 PID 3020 wrote to memory of 2356 3020 csc.exe 30 PID 3020 wrote to memory of 2356 3020 csc.exe 30 PID 2848 wrote to memory of 2860 2848 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 32 PID 2848 wrote to memory of 2860 2848 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 32 PID 2848 wrote to memory of 2860 2848 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 32 PID 2848 wrote to memory of 2116 2848 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 34 PID 2848 wrote to memory of 2116 2848 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 34 PID 2848 wrote to memory of 2116 2848 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 34 PID 2564 wrote to memory of 1632 2564 taskeng.exe 36 PID 2564 wrote to memory of 1632 2564 taskeng.exe 36 PID 2564 wrote to memory of 1632 2564 taskeng.exe 36 PID 2116 wrote to memory of 2444 2116 NvidiaControler.exe 37 PID 2116 wrote to memory of 2444 2116 NvidiaControler.exe 37 PID 2116 wrote to memory of 2444 2116 NvidiaControler.exe 37 PID 2116 wrote to memory of 2444 2116 NvidiaControler.exe 37 PID 2444 wrote to memory of 2332 2444 NvidiaControler.exe 38 PID 2444 wrote to memory of 2332 2444 NvidiaControler.exe 38 PID 2444 wrote to memory of 2332 2444 NvidiaControler.exe 38 PID 2444 wrote to memory of 2332 2444 NvidiaControler.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe"C:\Users\Admin\AppData\Local\Temp\a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pbkwudxd.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES193C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC193B.tmp"3⤵PID:2356
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2860
-
-
C:\Program Files\NvidiaControler\NvidiaControler.exe"C:\Program Files\NvidiaControler\NvidiaControler.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\NvidiaControler.exe"C:\Users\Admin\AppData\Roaming\NvidiaControler.exe" /launchSelfAndExit "C:\Program Files\NvidiaControler\NvidiaControler.exe" 2116 /protectFile3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\NvidiaControler.exe"C:\Users\Admin\AppData\Roaming\NvidiaControler.exe" /watchProcess "C:\Program Files\NvidiaControler\NvidiaControler.exe" 2116 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:2520
-
C:\Windows\system32\taskeng.exetaskeng.exe {F16CCD95-B49C-4D87-82D8-FCA8ADDCBB93} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files\NvidiaControler\NvidiaControler.exe"C:\Program Files\NvidiaControler\NvidiaControler.exe"2⤵
- Executes dropped EXE
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5df4d4c4eee0bb233905ef88daca5e3e0
SHA14c9c17b1c2e1654c7da04a3674f02cc15502b550
SHA256a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e
SHA51263517b87374cc0e3cf5a20ce2e64e44355bc88cb5a9688127dcd7285b1092b46362495272274513ec33d16ab17d050f1f8ff988ad431c662ed0e315abadddc0d
-
Filesize
1KB
MD519695e662da3e18968c6f69ee639e79f
SHA1a04dc1756995630e1aef16cc76564c08a7e4b9a6
SHA2568b15abb51e344f0dd3c5d3ea48f955939dc71591a2d55fb5b039b8c56b272351
SHA512a86afacebb092a9e4af8e4774391dbc79010318cf08c3cc2965160a0a0e6acec96c1aaf64e747a0977ea3d02db8e11e62d28c15993a268bef380938395975c4b
-
Filesize
76KB
MD58ebb2a590b44758b064dab73436738a5
SHA118dbe4d42a9cd462e09d08a77adc30e015011a9e
SHA25603f1641146b431a66832c563d7c59fbd33dab458d75c60e3eaf087baac830679
SHA512f920662613ae821e3dd80983c6abf5bb0c1b2be3a09c2ee4c1e23ac376462e7c8557d87bb9fda4abd42ac6b8598f1d13932aab167163877af26a3ea9d2453452
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
1KB
MD57c4fc283248152a1a7c982aaa4ca0299
SHA18a192900501caa78b9505bc9dec8fd98a9bc6f4d
SHA256b6b134ba424c1b9fd2a58db9ccc58c2fb5c0daa5b961ed0fe97a0edec0846597
SHA512134c167883325204dd42ac1d654ff1c0623a4e2b7ddbe85304f2ffc5b64b5ce0d4c1ff4a9a4313c2448f9641036b3aaf1a630b5a71146b4de5fa3d03259ce9cf
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
676B
MD5fae629b991508481fc922c1a9ba88e38
SHA1cef9752e892eadbca51e59c04a0e32cf41aecf85
SHA25637f34cf0ca3fa5d32ab5a91497fa9d4852864c731eb90fc726d883707282ad30
SHA5128baddf9cf8d0f343033f45c6b5bedf6e04a4150c29d027f55613361b8e0e95d2fb81c451627dc5930b4c1330ad3d5c36b93780394c603d4eed90c0cf6608221a
-
Filesize
208KB
MD56011503497b1b9250a05debf9690e52c
SHA1897aea61e9bffc82d7031f1b3da12fb83efc6d82
SHA25608f42b8d57bb61bc8f9628c8a80953b06ca4149d50108083fca6dc26bdd49434
SHA512604c33e82e8b5bb5c54389c2899c81e5482a06e69db08268173a5b4574327ee5de656d312011d07e50a2e398a4c9b0cd79029013f76e05e18cf67ce5a916ffd9
-
Filesize
349B
MD5bd0148e0baad528bbfa00f3c2b5eca4e
SHA1be9727a53632d9c0a48c0c94951f970baa100793
SHA2566a52b977bb261f03fd3ceff7f849d4f632d653f8923e7553686b377be50236b2
SHA512f502dbf37648dd20bb08cb1bccd607f00bf933eb8b443959af52fc7e1fe82b064dba3795a96b56d2f09b910021357fed9100fdf1ca390ee1e5c81990878cbd33