Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
OrcamePDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OrcamePDF.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
QtCore4.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
QtCore4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
QtGui4.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
QtGui4.dll
Resource
win10v2004-20240802-en
General
-
Target
OrcamePDF.exe
-
Size
178KB
-
MD5
7cd87f8ad0cd8279f8699cd441238338
-
SHA1
523c83c22647164b7e7465fecaf798f3be5ac2d8
-
SHA256
71a7f53796731bd270704b825af080d1e84e2bb4d2184bb77926cd895dc87214
-
SHA512
b5ee28a24ba6fc4bb0e8a5b0c1a5adbfac204be43635ad99998bd4617726a5b5f95876dbdc7807b30cc74569b431ef7eb4a540f3e62b759e2fb36df9cff10796
-
SSDEEP
3072:k+sGBD3O9O6qe+4T+vqwqYROyCUbSIMAAAAAAAUAAAk2o5U:kZGBD3O9O6qe+4T+vqwqYROyCUbSDv5U
Malware Config
Extracted
https://raw.githubusercontent.com/massgravel/Microsoft-Activation-Scripts/b1b5299c4725d97349b18b59061647198f7cc59b/MAS/All-In-One-Version-KL/MAS_AIO.cmd
https://bitbucket.org/WindowsAddict/microsoft-activation-scripts/raw/b1b5299c4725d97349b18b59061647198f7cc59b/MAS/All-In-One-Version-KL/MAS_AIO.cmd
https://codeberg.org/massgravel/Microsoft-Activation-Scripts/raw/commit/b1b5299c4725d97349b18b59061647198f7cc59b/MAS/All-In-One-Version-KL/MAS_AIO.cmd
https://rochaservicos.online/www.zip
Signatures
-
pid Process 2908 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OrcamePDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2908 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2908 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2728 2716 OrcamePDF.exe 30 PID 2716 wrote to memory of 2728 2716 OrcamePDF.exe 30 PID 2716 wrote to memory of 2728 2716 OrcamePDF.exe 30 PID 2716 wrote to memory of 2728 2716 OrcamePDF.exe 30 PID 2728 wrote to memory of 2908 2728 cmd.exe 32 PID 2728 wrote to memory of 2908 2728 cmd.exe 32 PID 2728 wrote to memory of 2908 2728 cmd.exe 32 PID 2728 wrote to memory of 2908 2728 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\OrcamePDF.exe"C:\Users\Admin\AppData\Local\Temp\OrcamePDF.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Sogdsim.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -file C:\Users\Admin\AppData\Roaming\Sogdsim.ps13⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD57e3d70cb81034e80141f30ad77bbc3c5
SHA18d056b32b80284d08dca18ae3791943c3c3234b6
SHA256a25385776ed383c11e47aa444eab0b925efa3d10ce69e2394123487fdc171b21
SHA5129517d03f43a027578824381940ef6bdf581dea8faf2744f2bda87b27ab975babcfd00a6b384109275ac2b821ba17cc4f0f76d8837d8ebdcb1561c3aa1880b76a
-
Filesize
2KB
MD55c26dc436889cdcefdf3e145b43f1806
SHA14f96e93bb2011e69f77d458b092257911e74de9d
SHA256dc68909778fb5c96bcb0b2f5ea912ea6b663549a15c33fb65c9ae85124ba2427
SHA512242e2aa9f69fc8849c3bbd8ff3ee6c37195e1de691f82cc6d46b93522d2f3a164ae1b56e9848f13f3f5fbf1a40d408d4a9632fc251a8a81efc5123ccb640beee