Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 18:55
Behavioral task
behavioral1
Sample
a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56N.exe
Resource
win7-20240903-en
General
-
Target
a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56N.exe
-
Size
842KB
-
MD5
6ed8b8befe2c808932e76058343a2b10
-
SHA1
3da7ff017767177385acf8938fa7bec98e2e07df
-
SHA256
a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56
-
SHA512
685576d27e021576259dab701e5ce7815ace1dae550a99525f68c181eeb3e604d33105fa4ec8c12f192e1340aa2b8c61ed600793fe46e182251ff6b9ffc4929b
-
SSDEEP
24576:+I4PD3o8uzVfhWfmz1ldP71kYOJPAdW8cRhY:+PP7JuOWdT1kY9dWBY
Malware Config
Extracted
orcus
192.168.2.4
a3607d62eed94a4d8d054d250287d86f
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
11/26/2024 08:35:25
-
plugins
AgEAAA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Signatures
-
Orcus family
-
Executes dropped EXE 1 IoCs
Processes:
Image-Ogpj.scrpid Process 2968 Image-Ogpj.scr -
Processes:
resource yara_rule behavioral1/memory/2100-0-0x000000013F370000-0x000000013F3F4000-memory.dmp upx behavioral1/memory/2100-19-0x000000013F370000-0x000000013F3F4000-memory.dmp upx behavioral1/memory/2100-21-0x000000013F370000-0x000000013F3F4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Image-Ogpj.scrdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Image-Ogpj.scr -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56N.exedescription pid Process procid_target PID 2100 wrote to memory of 2968 2100 a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56N.exe 30 PID 2100 wrote to memory of 2968 2100 a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56N.exe 30 PID 2100 wrote to memory of 2968 2100 a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56N.exe 30 PID 2100 wrote to memory of 2968 2100 a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56N.exe"C:\Users\Admin\AppData\Local\Temp\a3754fbae8f866e178b5f1158a89eeeb770b23026a11b48e79b90ea62d146c56N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Image-Ogpj.scr"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Image-Ogpj.scr" /S2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
855KB
MD50c9b9d93b1938108ffe6d2860ae9a32d
SHA106891084a5e117b5f8953b336a10cfb149aa9b89
SHA256ed84165ca307b37979dbf6ea4872b9b4b581beb789fa26fa46d807b348a9a66b
SHA512f66c7245b411e904d75094e37b488299de992a967b2ba67023bda22b9f34fe4dadbd11b4f344aa55337f41d3565bb4629c5c78ed8b32474eb7764ba4289c5043