Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 01:11
Behavioral task
behavioral1
Sample
f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exe
Resource
win7-20241010-en
General
-
Target
f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exe
-
Size
846KB
-
MD5
6f72012126cf579d7827db2852a5d3d3
-
SHA1
62aa428de035cdfb003821f813a7460079345c71
-
SHA256
f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91
-
SHA512
3316b90d31a79fb7f9843f5ef5b735081fc448737cbd864aeba17089c82508fbef01ae3b5555cf05e7882ad5a71bab05c029f5cccf6dd94ce6d3cd515f1da387
-
SSDEEP
24576:NeVS04YNEMuExDiU6E5R9s8xY/2l/dGdIbt+r4:Nen4auS+UjfU2TAIbt+r
Malware Config
Extracted
orcus
7cities-blessed.gl.at.ply.gg
8a028f9932904de190b99b35299f86b4
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
11/17/2024 16:18:35
-
plugins
AgUFyfihswTdIPqEArukcmEdSF06Hw9CAFMAbwBEACAAUAByAG8AdABlAGMAdABpAG8AbgAHAzEALgAwAEEgZQBjAGMANQBkAGIAYQA1ADEAOAA0AGQANAA5AGMAZQBhAGQAZAAyADAAYwA2AGYAZAA0ADgAZgAxADUANwA2AAEFl6aNkQPXkQKOmwKLvFcpr24sKCsVRABpAHMAYQBiAGwAZQAgAFcAZQBiAGMAYQBtACAATABpAGcAaAB0AHMABwMxAC4AMABBIDQANAA1ADcAYQBjAGYANQBiADgAMwA5ADQAZgAyAGQAYQA2ADgANwA4AGUAZABmAGEANABlADQAZQA3ADIAOQABAAAEBA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Signatures
-
Orcus family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exe -
Executes dropped EXE 1 IoCs
Processes:
AudioDriver.exepid process 4040 AudioDriver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exeAudioDriver.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AudioDriver.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
AudioDriver.exepid process 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe 4040 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AudioDriver.exedescription pid process Token: SeDebugPrivilege 4040 AudioDriver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AudioDriver.exepid process 4040 AudioDriver.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
AudioDriver.exepid process 4040 AudioDriver.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exedescription pid process target process PID 3168 wrote to memory of 4040 3168 f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exe AudioDriver.exe PID 3168 wrote to memory of 4040 3168 f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exe AudioDriver.exe PID 3168 wrote to memory of 4040 3168 f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exe AudioDriver.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exe"C:\Users\Admin\AppData\Local\Temp\f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
846KB
MD56f72012126cf579d7827db2852a5d3d3
SHA162aa428de035cdfb003821f813a7460079345c71
SHA256f462c69fd4c49ef432fee2a0068a9aa697220c8a1c72cafb14356c9114a3fe91
SHA5123316b90d31a79fb7f9843f5ef5b735081fc448737cbd864aeba17089c82508fbef01ae3b5555cf05e7882ad5a71bab05c029f5cccf6dd94ce6d3cd515f1da387