Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 01:01
Behavioral task
behavioral1
Sample
a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe
Resource
win7-20240508-en
General
-
Target
a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe
-
Size
924KB
-
MD5
df4d4c4eee0bb233905ef88daca5e3e0
-
SHA1
4c9c17b1c2e1654c7da04a3674f02cc15502b550
-
SHA256
a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e
-
SHA512
63517b87374cc0e3cf5a20ce2e64e44355bc88cb5a9688127dcd7285b1092b46362495272274513ec33d16ab17d050f1f8ff988ad431c662ed0e315abadddc0d
-
SSDEEP
24576:Yzra4MROxnFE3KrXpmrZlI0AilFEvxHinj:Yz1MiuQpmrZlI0AilFEvxHi
Malware Config
Extracted
orcus
192.168.0.2:3294
ef78f6dadb714fbfa27cffbd5e73fe5b
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\NvidiaControler\NvidiaControler.exe
-
reconnect_delay
10000
-
registry_keyname
NvidiaControler
-
taskscheduler_taskname
NvidiaControlers
-
watchdog_path
AppData\NvidiaControler.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002341c-65.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/files/0x000700000002341c-65.dat orcus behavioral2/memory/4888-76-0x00000000002E0000-0x00000000003CE000-memory.dmp orcus -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation NvidiaControler.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation NvidiaControler.exe -
Executes dropped EXE 6 IoCs
pid Process 2624 WindowsInput.exe 5072 WindowsInput.exe 4888 NvidiaControler.exe 4260 NvidiaControler.exe 760 NvidiaControler.exe 3504 NvidiaControler.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File opened for modification C:\Windows\assembly\Desktop.ini a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\NvidiaControler\NvidiaControler.exe.config a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File created C:\Program Files\NvidiaControler\NvidiaControler.exe a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File opened for modification C:\Program Files\NvidiaControler\NvidiaControler.exe a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File opened for modification C:\Windows\assembly\Desktop.ini a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe File opened for modification C:\Windows\assembly a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4888 NvidiaControler.exe 4888 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 3504 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe 4888 NvidiaControler.exe 3504 NvidiaControler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4888 NvidiaControler.exe Token: SeDebugPrivilege 760 NvidiaControler.exe Token: SeDebugPrivilege 3504 NvidiaControler.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4888 NvidiaControler.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4888 NvidiaControler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4888 NvidiaControler.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2508 5020 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 81 PID 5020 wrote to memory of 2508 5020 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 81 PID 2508 wrote to memory of 1756 2508 csc.exe 83 PID 2508 wrote to memory of 1756 2508 csc.exe 83 PID 5020 wrote to memory of 2624 5020 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 85 PID 5020 wrote to memory of 2624 5020 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 85 PID 5020 wrote to memory of 4888 5020 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 87 PID 5020 wrote to memory of 4888 5020 a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe 87 PID 4888 wrote to memory of 760 4888 NvidiaControler.exe 89 PID 4888 wrote to memory of 760 4888 NvidiaControler.exe 89 PID 4888 wrote to memory of 760 4888 NvidiaControler.exe 89 PID 760 wrote to memory of 3504 760 NvidiaControler.exe 90 PID 760 wrote to memory of 3504 760 NvidiaControler.exe 90 PID 760 wrote to memory of 3504 760 NvidiaControler.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe"C:\Users\Admin\AppData\Local\Temp\a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4tjgvffd.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES76B7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC76B6.tmp"3⤵PID:1756
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2624
-
-
C:\Program Files\NvidiaControler\NvidiaControler.exe"C:\Program Files\NvidiaControler\NvidiaControler.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Roaming\NvidiaControler.exe"C:\Users\Admin\AppData\Roaming\NvidiaControler.exe" /launchSelfAndExit "C:\Program Files\NvidiaControler\NvidiaControler.exe" 4888 /protectFile3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Roaming\NvidiaControler.exe"C:\Users\Admin\AppData\Roaming\NvidiaControler.exe" /watchProcess "C:\Program Files\NvidiaControler\NvidiaControler.exe" 4888 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:5072
-
C:\Program Files\NvidiaControler\NvidiaControler.exe"C:\Program Files\NvidiaControler\NvidiaControler.exe"1⤵
- Executes dropped EXE
PID:4260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5df4d4c4eee0bb233905ef88daca5e3e0
SHA14c9c17b1c2e1654c7da04a3674f02cc15502b550
SHA256a96fb9f82e3e9c69d5e101f23d2f53899c2ac8d8fcb4ae638f1fe0225aee3b6e
SHA51263517b87374cc0e3cf5a20ce2e64e44355bc88cb5a9688127dcd7285b1092b46362495272274513ec33d16ab17d050f1f8ff988ad431c662ed0e315abadddc0d
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
76KB
MD5eb5fff58146f0b2f9fdcdbdb65b3871f
SHA18e8dea894b5a36b697c1633fcb7f557a880bce80
SHA2564178adfd1fa92387332a6dfff59ff4eb06f14e3842fab2fdd415ff75e654171a
SHA51256ad6d2f505696499b17a8ff216c91a04e18d6a7f3b468b2b7092f3ed9b5d67344cd7d3ee110b348bbbd3c5aa2499fad61746df6cd8c02190fa0f12c6a382f25
-
Filesize
1KB
MD521bba5818bd7bd501db91b50ff678468
SHA10d057f2194533ce7facf9e533bfe7622649d3745
SHA25613da90948fb1dc843dd422b6c9c0171a5407173738d9a485392b2be9c51a09b0
SHA512f4d1ddfe23b21260b540c1bea8b9d08cbd78a7004bf379bc94fd5f40126909f8649b3ec071c8de3d4e0bff7d3b8a1ab6d82649e7f5fe93b405cb1a6385d82381
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
1KB
MD56d9e80de3d41b69744bfcc10199218fa
SHA1ab1f3531dff55c4930df54369ee452ab6899f194
SHA25668431dac3fdd4f046fc9f3875d1910d31654c4581dc90452b8a95e986d16653f
SHA5128904489ddf9d44537bca1fc825d8c703b35de19c18e8b83a3d6e3c8d0f8dd3d3f4e25df91572bc3291fd656dc125b16bfd4081f64c48e2e721b6b8a8daa76055
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
208KB
MD576bfa17012f34a4f8af2ae43e212ff3b
SHA10f5433cf7832bba349424d76af8a1b929bcdeca2
SHA2560566ed8059aac1226d648eed09d67dc3cd97879496deb78f6487d1c65bb78130
SHA512bd8581a2704046407e9bc5a4c121230c73b04734f5fdf5291367010e0379c5f2270b3dfba30ffed0aa062c78e26b8239490eb030d8758df4eb26fc5f9bd38dcb
-
Filesize
349B
MD5cd686f71574e4594482db5c92ad9d9c5
SHA1b1cdb91aaf9b5cfae5f9c57622ac2d968b5a4165
SHA2568c6adcf114cb2b4738031a968dc35119aec4a3c4250ba0e94b90267b3c46ac3e
SHA512b7bbff4853e3db14d09aa3fce1fed8d868da5ff0e20963ec0516793f6126556c70f87fcd2f13938abb770955424e37970786ad046401b4f21bcfbf77706a6045
-
Filesize
676B
MD531eabce2ec0c38bf70343cee1808b596
SHA1f8cbdf5fbafcac78a845af909743089dc7fbfc3d
SHA256ecc12061f5f4dc7d431721cc06122ec2474c6703ae83ca17b329f2806890c01e
SHA512e30718db7ae12203d0fe09417cf6d12669c1ff52b3ba814c447de07760ce85a6c2b0902116aa000b933b60f6b2f48e257d73a99a667eda7ebd6f992d76200d62