Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20/11/2024, 00:11
General
-
Target
die.exe
-
Size
3.0MB
-
MD5
e0e9f2b50bfa42d18679c8c0b429cddd
-
SHA1
b7f28f076a3d109396380bf85bfb732fa45b7901
-
SHA256
dad9c156fb5562b5ca6a3fc66ce92d0435091a0444448633a8d8d0e7caee6534
-
SHA512
d5cfbe7977b6b0fbdcc1326065976b3cefac3b1f5d0e7b013d96d5967dd8288e5f612f02aca45869a817752331bef98ee6358251b139ce1d6606a2609005e3fa
-
SSDEEP
49152:eNODf7+QSLqZeM9/04zgaMWUljQfJgVXkKAypQxb0/o9JnCmsWncFf0I74gu3KM:egyb2MnjQBEUNypSb6o9JCm
Malware Config
Extracted
orcus
10.211.55.25:10134
0d5c4caa686e4bf1a077d8b4011ad8f2
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus family
-
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/memory/468-1-0x0000021B02B80000-0x0000021B02E78000-memory.dmp orcus behavioral1/files/0x0028000000045041-9.dat orcus -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation die.exe -
Executes dropped EXE 1 IoCs
pid Process 1640 Orcus.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Orcus\Orcus.exe die.exe File created C:\Program Files\Orcus\Orcus.exe.config die.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 468 wrote to memory of 1640 468 die.exe 82 PID 468 wrote to memory of 1640 468 die.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\die.exe"C:\Users\Admin\AppData\Local\Temp\die.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files\Orcus\Orcus.exe"C:\Program Files\Orcus\Orcus.exe"2⤵
- Executes dropped EXE
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5e0e9f2b50bfa42d18679c8c0b429cddd
SHA1b7f28f076a3d109396380bf85bfb732fa45b7901
SHA256dad9c156fb5562b5ca6a3fc66ce92d0435091a0444448633a8d8d0e7caee6534
SHA512d5cfbe7977b6b0fbdcc1326065976b3cefac3b1f5d0e7b013d96d5967dd8288e5f612f02aca45869a817752331bef98ee6358251b139ce1d6606a2609005e3fa
-
Filesize
349B
MD589817519e9e0b4e703f07e8c55247861
SHA14636de1f6c997a25c3190f73f46a3fd056238d78
SHA256f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13
SHA512b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3