Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 18:18

General

  • Target

    Orcus.Administration.exe

  • Size

    3.9MB

  • MD5

    d2ad90e1c4ca9ea13c31febb5424ad40

  • SHA1

    fe6742914356f7e2b29430ec3f46d2343dac07aa

  • SHA256

    ac5343d5eb944b51c8dee8adfb5975402199813230af90bb33c24f411c545b63

  • SHA512

    6a049d35af887bb96a08165a25d693f3e0dbf40a91c1e1c9db4df56a04a2171836197c10058232918e333a8021c8c0a3f01f014997147b2c62acee900fe6e357

  • SSDEEP

    49152:MO541QLPPV7Al40NVANW8cyTj/e1nsaLlZWneHAl4:MO1V7Al40NG48cyTC5LlZWneHAl4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Orcus.Administration.exe
    "C:\Users\Admin\AppData\Local\Temp\Orcus.Administration.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=Orcus.Administration.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f435088569a3c840cefb380ac59a6d6b

    SHA1

    4483da791baee6cb8b48a7551dd4eac0131c9d46

    SHA256

    fafb7f75a7809a259a0ab12edd7a252b5122a61ea311710ebcbb63d824be3dff

    SHA512

    99f222475691b0fcbccd84f775fbdd794f96220e1771cc8869b0ce5a647ca8e462250e189388a9f7441c13447be2e8028c3953342e05389942307b508f473134

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5d398d40fda996e2413cdb771ae81a6

    SHA1

    561b855830d17161d10225d967fe935890a8722c

    SHA256

    7419336cd3396c19ddbffcba04daa260f991ec7cb5ae20d07bcbb3770a46cb63

    SHA512

    c26409259edd08b357780c7a33ea31ab56ac3a920bd38f78ddec7cf3c7f7a31265ebcab679949159b87a23ab20e0b2214a0be5e002bd2497d8588d9ea434d0bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fce8b77d1fa99f1a4a04797e848658b3

    SHA1

    0935083703d13fa0a96ea6dfa85f230c4d791384

    SHA256

    287d77f5a56ca93f8b7b867a68c7d0dfb385f1cacfe0e6d4b0849949a3efa044

    SHA512

    a76c30b5855b69824e49bc79d89d4a3e96d4bae408656d51b5ae31fe4cbd6f5e1af36350e68a14e950a44b6bcc3945041bafa969147aa2c8af9644f928cf79ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5764c85645844d0fc8a2d93f4befd9df

    SHA1

    7bdf6f65bba79fc22d962dcc9926a625b3dfb900

    SHA256

    dfd5fd41946b84b14ff0c7ebfd38e85e08a673f1d87b5b5b2d40f43bfce97c58

    SHA512

    e063fbf482f8f5617c257efbc13c99f98a538a0b897993c5c7289d779147818aca7e426eaadc3a9ae60993f9fa4ed370606febf183c47ba12cfc2bf2ba9af19e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8db3efd29b49ee71390cc66bd350ae3

    SHA1

    9c4a8bc092b86367747a1913597e556d8ccfc658

    SHA256

    0e21432529edfdf131664be92a783378acac3ab4bd6a8266dd48bbf22e256b4c

    SHA512

    ee2a88a6d4332e701b129f8109359a7fb66116fbc76f8aeb31a88cf44b6f5df201a922c4f50adc2633a917d49772a44f160345e5610ee6521a6800edee25f573

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b528bf401764eb627739836e755646bd

    SHA1

    e6173e33874f9bca6c509058842d2b6c02aa4457

    SHA256

    767d1254e72d589b940b111a87bc374dcbb8bbfd4e0e20f1403b2f0f2f67b62b

    SHA512

    b39c589bd1e7def1661f2f53027fda63e74eb22269f9dd3df518ed20d94b77e224b5f110be125ad14cd0a948b8515949f345d377b73649702974b8917a27ea00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    113a2d8f9c4e9151db56165a052b43d1

    SHA1

    a85386e69082c38bf08a8d7209fdcfa6c4dbb16c

    SHA256

    715437081044cf53a3fde3509d91f966d962300d80ee9796dcf8cb7bc22378bc

    SHA512

    97cd6c44a6b7f4911fe6ebf7771cfe48293cbce580b278f9a1557810134f621a41c62a38725a6ee9a5136312ff8168fe5b37f95149114faf1c2aed0198894430

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edcf1ca3cc4ecc857fa3517d729d8e22

    SHA1

    69f337ee1b75de2ad127d6decb690b3a41ab3a24

    SHA256

    3dd37f0ea2a3beb80c9f8d002ca5b50f494f70beb34ff829174275de41e03ab5

    SHA512

    0b29a6850c5ba0dd81c5ba37f1099ce0b3af0b943812c8027005fae54205d6c8d9e5833913bb6af221bca26115882565e8241dced949e542f80acb1ae4fd3f23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25d222783d5e5ec26f6b93ea63fd0342

    SHA1

    47bfbda68581efdf05710fc4ff821216fed5b87d

    SHA256

    dcb98d470bfcc5ac546d9dac2edd9d222f9d718f6a6a966b77f4a4e839220ee3

    SHA512

    32a99b14e310b3c11f4056d85de4efde20a0713b75e8e76531950d5356003c148205ffa76dc0e8a0ce67d7bb8c7663e7a5b16bcaabfac3cfb69a5ec4b5dbb94b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e983e979447398da87cab4d636e64528

    SHA1

    217f7082cdcc55b79fcc629073dc8ce7ba9beb81

    SHA256

    d59bea78e40d4540107c591c27c3887723fc9fe004a167c335adb39144b23a71

    SHA512

    617658ad5a30173e174a28afc3353a67dffc0dacc59a4c437464c04846f783b3625bb646f05555173754810e874820fcb784354ede3549577ea9bdce96067c82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b15dff00a49b7a241f2b13aa9353cbc6

    SHA1

    6dbb9a1ce2555ec2b08ceb9fdafb903f7042a95e

    SHA256

    7633745f9bd04d1d91f4bc0d7df7ec4368abc07d2a1087816a3454160a9a0c23

    SHA512

    03cbf1859a799b6956c412fa3cd7f6c48796a00ba55f63037afb9670215bc0834f9c387045dfbe4a29494455061e1f360b4a9ff7ea28d5cd52a99b03bdea55e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29ebaf50fd03222ba4b7402be64b8787

    SHA1

    b2475b02889dc8e49be39ad3b4859a0b515533a3

    SHA256

    fc34242c766985eaf3e5035667f41177304d315524774cc24adba0330b11f1bc

    SHA512

    73c5e5ac7993e7f79f30bc0c382df545690ee9e2b121d06bb8c50e5d8c98e87c7b036240e991306b9dd9ca1d8725aee5696b4ad81b2f8891476aac0c7c19b549

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5631aca73b0a9069e916a8cb158a1cb4

    SHA1

    59ea9f0b51f5ccb4a0dd4c42075794d791df9f92

    SHA256

    78c429981f446be70ad69df0e5955fb12fc649d376788e5ca24964291e37b3ef

    SHA512

    7113025b2a442bf6064ee138dbd759b2efaefe8bdfe748e8b994b0d7cb54f872ce78603e4117fac10ddb84c3f034eb48485ea7a2f23741cf8bafbd20ce315265

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b97ae8563a796dfb935e11626d0269ff

    SHA1

    a19e228b6d297a6b93cd5561523bc7750cd10ef0

    SHA256

    598bd1dccaf0c8d13b937e55e6da7cf99af39114f5516ed89af672f6bd3d5bcf

    SHA512

    98ead0d1ee0ee36f594f0ee2cfdb45228e06990e71e42837b96ae0c1c54e95e15be998de3492a8ca909f57030f727cde207bf3453a2f00ac2a7fed11c12b5d08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50bcf5ec2825c40e103eec5afe5d9f84

    SHA1

    1273992299e4d5a7d36bb54fb6405ebcebf4a8f8

    SHA256

    dd267fd213ae3fbc92cea17c62a3ba533d18bd66f0f47859e996091889a33215

    SHA512

    ed4dd87b138681c4e0876c0e4691806cc048009ac2f88a5f3503adb87966baf131c17cb7ba60d21eef30437f4773d15f88cb2d18b952f310141e90b553ac91db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    061ead5e7dc21115621ef84885f97787

    SHA1

    669523ba2752a85624e89790baaa0ae3092d691b

    SHA256

    6baa1658ea8134d60d6bd29cb6a3cb2c8202d74edf6cb6017b359a05a41597e4

    SHA512

    b5dbf1b78c67880d9ce8d0b16d37caf2a810fa78d642f67d814e2c137489e6f3bb42bf9ce3dada63d01600b3018af0e6465cf9bab6e298316d8d19c816debc17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24eced4d58b4f1b5f59d121ee2548a85

    SHA1

    ce008d40c79b7ec0e609b1cfcf6ca3023af897e1

    SHA256

    1dc0c42b2f694def56f91377b605d3910e3f9d29dc71c60544906e28ee212674

    SHA512

    869be847a02fbd90f03456fdc364c83957aac0417c94723eb61e36bdc3ac50b99d0f85fcb759ca6865e27f3cbb790ecf2dc9e2642580751d2a845b48aa646f25

  • C:\Users\Admin\AppData\Local\Temp\CabFEA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFFD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b