Overview
overview
7Static
static
313b606c1ea...18.exe
windows7-x64
713b606c1ea...18.exe
windows10-2004-x64
7$APPDATA/o...er.exe
windows7-x64
3$APPDATA/o...er.exe
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMPfolde...l3.dll
windows7-x64
3$TEMPfolde...l3.dll
windows10-2004-x64
3$TEMPfolde...r4.dll
windows7-x64
3$TEMPfolde...r4.dll
windows10-2004-x64
3$TEMPfolde...c4.dll
windows7-x64
3$TEMPfolde...c4.dll
windows10-2004-x64
3$TEMPfolde...s4.dll
windows7-x64
3$TEMPfolde...s4.dll
windows10-2004-x64
3$TEMPfolde...s3.dll
windows7-x64
3$TEMPfolde...s3.dll
windows10-2004-x64
3$TEMPfolde...bi.dll
windows7-x64
3$TEMPfolde...bi.dll
windows10-2004-x64
3$TEMPfolde...m3.dll
windows7-x64
3$TEMPfolde...m3.dll
windows10-2004-x64
3$TEMPfolde...l3.dll
windows7-x64
3$TEMPfolde...l3.dll
windows10-2004-x64
3$TEMPfolde...on.exe
windows7-x64
7$TEMPfolde...on.exe
windows10-2004-x64
7$TEMPfolde...e3.dll
windows7-x64
3$TEMPfolde...e3.dll
windows10-2004-x64
3$TEMPfolde...n3.dll
windows7-x64
3$TEMPfolde...n3.dll
windows10-2004-x64
3$TEMPfolde...e3.dll
windows7-x64
3$TEMPfolde...e3.dll
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 14:21
Static task
static1
Behavioral task
behavioral1
Sample
13b606c1ead30f0b9e8713a3c9c50e04_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
13b606c1ead30f0b9e8713a3c9c50e04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$APPDATA/ortmp/uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$APPDATA/ortmp/uninstaller.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$TEMPfolder/ortmp/freebl3.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$TEMPfolder/ortmp/freebl3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$TEMPfolder/ortmp/libnspr4.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$TEMPfolder/ortmp/libnspr4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMPfolder/ortmp/libplc4.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$TEMPfolder/ortmp/libplc4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$TEMPfolder/ortmp/libplds4.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$TEMPfolder/ortmp/libplds4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$TEMPfolder/ortmp/nss3.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$TEMPfolder/ortmp/nss3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$TEMPfolder/ortmp/nssckbi.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$TEMPfolder/ortmp/nssckbi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$TEMPfolder/ortmp/nssdbm3.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$TEMPfolder/ortmp/nssdbm3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$TEMPfolder/ortmp/nssutil3.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$TEMPfolder/ortmp/nssutil3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$TEMPfolder/ortmp/orion.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$TEMPfolder/ortmp/orion.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$TEMPfolder/ortmp/smime3.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$TEMPfolder/ortmp/smime3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$TEMPfolder/ortmp/softokn3.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$TEMPfolder/ortmp/softokn3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$TEMPfolder/ortmp/sqlite3.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$TEMPfolder/ortmp/sqlite3.dll
Resource
win10v2004-20240802-en
General
-
Target
$TEMPfolder/ortmp/orion.exe
-
Size
1.1MB
-
MD5
7166f7850b8bb5ef1c3d6eedd2f7fb6a
-
SHA1
c56ab5c922b13fde7888c4573e14e1f85868f58e
-
SHA256
16ab8660e4579f91f8be9d6363bd492593ec6c27763da2179f34f1f4799fbc70
-
SHA512
59785782fa896435dc34d466cb1850525b35bb0831ff24ec8cfdadc2fa591b5ece7dea2f488c39e9fb91db06c8c6c0261569b1098903c53a833f0ce4f398011f
-
SSDEEP
24576:6jySynMq8niqpQSV+KpP76O985l1YSQlkU0vJ+x2Tc/p/IP:mySxp9TNGxvA/p/IP
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion orion.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 Process not Found 2900 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cmdrun = "cmd.exe /C ipconfig /flushdns" orion.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dnsapi.dll orion.exe File opened for modification C:\Windows\system32\hyj\piak\opas.dat orion.exe File opened for modification C:\Windows\System32\dnsapi.dll orion.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orion.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS orion.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName orion.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer orion.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F53E693DDABF57A88A9B12B608B09B26C0608B74\Blob = 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 orion.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D830B6B8939ACB4928401060203BB648456BB4F8 orion.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D830B6B8939ACB4928401060203BB648456BB4F8\Blob = 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 orion.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A7BD54B233B5B2F70AF86F5BD1A0C0A772A59FC6 orion.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A7BD54B233B5B2F70AF86F5BD1A0C0A772A59FC6\Blob = 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 orion.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F53E693DDABF57A88A9B12B608B09B26C0608B74 orion.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe 3352 orion.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3352 orion.exe Token: SeTakeOwnershipPrivilege 3352 orion.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMPfolder\ortmp\orion.exe"C:\Users\Admin\AppData\Local\Temp\$TEMPfolder\ortmp\orion.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD5348a68340a0a3b773e071c9ad76482fc
SHA1878ffebcef1998e6b0dd4e12e7925152dae590a2
SHA256f0d77df045fa24246691c96e3d0e7713cf2e9a5324419d4a614bf07751b02749
SHA512d26364402521228458c8fff0f1df304556e23da9aaa66386db18a5fd1eec59445552e6aaaca554ca0bd253716853b86b55d7398c59375d66d36877b8e898ab55