Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 01:04
Behavioral task
behavioral1
Sample
c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe
Resource
win7-20240903-en
General
-
Target
c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe
-
Size
846KB
-
MD5
a4f5fb669ad89d875dcf5c4a5bbd83ca
-
SHA1
aea2c7b6e7a1f35b020db77d84c2959dcd11e592
-
SHA256
c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620
-
SHA512
e2b8645533feef0b30c8e96ba4580ed522ce61f9e4744b8c129d00a827dc531de8a952c256aef2880f66acbfd70e741d035b4b7257b28a429c0ef032d4f93e67
-
SSDEEP
24576:Ol9S04YNEMuExDiU6E5R9s8xY/2l/dOB+Ibt+rq1:Olv4auS+UjfU2TW+Ibt+ry
Malware Config
Extracted
orcus
100.81.139.78
60f564945224442d80b2e5489060a433
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
11/24/2024 20:57:47
-
plugins
AgUFyfihswTdIPqEArukcmEdSF06Hw9CAFMAbwBEACAAUAByAG8AdABlAGMAdABpAG8AbgAHAzEALgAwAEEgZgAxAGYAMAA4ADQAOQBjADgANQBlADUANAA4AGUAMABhADUAZABiADkAOAA1AGIAOABhADYAYwBmADkANAAwAAEFl6aNkQPXkQKOmwKLvFcpr24sKCsVRABpAHMAYQBiAGwAZQAgAFcAZQBiAGMAYQBtACAATABpAGcAaAB0AHMABwMxAC4AMABBIGQAMgBmADMAOQAzAGQANAA4ADcAZgA4ADQANwBjADAAYgAwAGIAYwA0AGQAMABkAGUAOQA0ADcAMQA5AGQAYQABAAAEBA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Signatures
-
Orcus family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1604 c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe"C:\Users\Admin\AppData\Local\Temp\c6071501a797d26d9db29ecb3f2b5137bc59c7e06b8bbb3ccdb615c65ff3c620.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604