Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2024, 01:33 UTC

General

  • Target

    1895ea7718500dfd7ddf4ccbf5057816fc06f849e72e644ba72c57f6241ca860.exe

  • Size

    3.0MB

  • MD5

    5061282fe58821440585f7bbb1708423

  • SHA1

    f64e5554bd39d34f872f9e74bef2b6bdcdb5541d

  • SHA256

    1895ea7718500dfd7ddf4ccbf5057816fc06f849e72e644ba72c57f6241ca860

  • SHA512

    3ad7f99cba8fded3c1be9c3ee3611308915eedaea18ec9c02b7ef245d2cd4bb7caab8cb15f50db00f64eb4c6c2ac180feeb7fc5d4f91caab0943c2e1fbb3d61d

  • SSDEEP

    49152:Y02N8QFUwqYZeM9/ZzzBjMkPUayX82+YXAypQxb9ndo9JnCmFWncFf0I74gu3tM:Yd0wGGzBjryX82uypSb9ndo9JCm

Malware Config

Extracted

Family

orcus

C2

192.168.50.155:10134

Mutex

5c4ed961518e4098bff05128f1a5b804

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\sistem\sistem.exe

  • reconnect_delay

    10000

  • registry_keyname

    sistem

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcurs Rat Executable 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1895ea7718500dfd7ddf4ccbf5057816fc06f849e72e644ba72c57f6241ca860.exe
    "C:\Users\Admin\AppData\Local\Temp\1895ea7718500dfd7ddf4ccbf5057816fc06f849e72e644ba72c57f6241ca860.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\SysWOW64\WindowsInput.exe
      "C:\Windows\SysWOW64\WindowsInput.exe" --install
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2312
    • C:\Program Files\sistem\sistem.exe
      "C:\Program Files\sistem\sistem.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2476
  • C:\Windows\SysWOW64\WindowsInput.exe
    "C:\Windows\SysWOW64\WindowsInput.exe"
    1⤵
    • Executes dropped EXE
    PID:2764

Network

    No results found
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    152 B
    3
  • 192.168.50.155:10134
    sistem.exe
    52 B
    1
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\sistem\sistem.exe

    Filesize

    3.0MB

    MD5

    5061282fe58821440585f7bbb1708423

    SHA1

    f64e5554bd39d34f872f9e74bef2b6bdcdb5541d

    SHA256

    1895ea7718500dfd7ddf4ccbf5057816fc06f849e72e644ba72c57f6241ca860

    SHA512

    3ad7f99cba8fded3c1be9c3ee3611308915eedaea18ec9c02b7ef245d2cd4bb7caab8cb15f50db00f64eb4c6c2ac180feeb7fc5d4f91caab0943c2e1fbb3d61d

  • C:\Windows\SysWOW64\WindowsInput.exe

    Filesize

    21KB

    MD5

    a80be96476032d2eaa901d180fe9fb73

    SHA1

    f378d0bc5fefb9ea0b5006f020091ffcbcd7acec

    SHA256

    d6075c1ed6f285f5de01ce0cc6a817b59054da8b19f20bc7081cfe7fb2b1af42

    SHA512

    210c0c4c845b416a601015fba5ccd2a3e8a4b81d3b4c5e0491b07bd0dcad938d9b118728bb1abc21eb73c5f9263a3c08e1822ece91002a2d1f0983857f0192ea

  • C:\Windows\SysWOW64\WindowsInput.exe.config

    Filesize

    357B

    MD5

    a2b76cea3a59fa9af5ea21ff68139c98

    SHA1

    35d76475e6a54c168f536e30206578babff58274

    SHA256

    f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

    SHA512

    b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

  • memory/1796-0-0x000007FEF57D3000-0x000007FEF57D4000-memory.dmp

    Filesize

    4KB

  • memory/1796-1-0x0000000000B90000-0x0000000000E8A000-memory.dmp

    Filesize

    3.0MB

  • memory/1796-3-0x0000000000250000-0x000000000025E000-memory.dmp

    Filesize

    56KB

  • memory/1796-2-0x00000000024E0000-0x000000000253C000-memory.dmp

    Filesize

    368KB

  • memory/1796-4-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB

  • memory/1796-5-0x0000000000410000-0x0000000000422000-memory.dmp

    Filesize

    72KB

  • memory/1796-31-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2312-17-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2312-20-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2312-16-0x000007FEF57D0000-0x000007FEF61BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2312-15-0x0000000000220000-0x000000000022C000-memory.dmp

    Filesize

    48KB

  • memory/2476-32-0x0000000000D10000-0x000000000100A000-memory.dmp

    Filesize

    3.0MB

  • memory/2476-33-0x0000000000BD0000-0x0000000000BE2000-memory.dmp

    Filesize

    72KB

  • memory/2476-34-0x000000001AF00000-0x000000001AF58000-memory.dmp

    Filesize

    352KB

  • memory/2476-35-0x0000000000BE0000-0x0000000000BF8000-memory.dmp

    Filesize

    96KB

  • memory/2476-36-0x0000000000BC0000-0x0000000000BD0000-memory.dmp

    Filesize

    64KB

  • memory/2764-22-0x0000000000800000-0x000000000080C000-memory.dmp

    Filesize

    48KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.