Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 01:04
Behavioral task
behavioral1
Sample
7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe
Resource
win7-20240903-en
General
-
Target
7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe
-
Size
5.0MB
-
MD5
14fb495cc853da2b1bab0ef9ad8ea15f
-
SHA1
b6d6589a7a5638c50cbd6cf6482c31db3f941fec
-
SHA256
7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e
-
SHA512
a97cf03fe6c59fb334d57c6dc3f5aca28f80ab3d3b3a89ec9d1f5e08d856ca0d5da8e8eedbe469c31d0a9d3aba8a5a90772d76abf386951d402bab94124b8081
-
SSDEEP
24576:nEu4MROxnFe3idtrrcI0AilFEvxHPfmoo6:nIMiwkrrcI0AilFEvxHP
Malware Config
Extracted
orcus
Test Hack
127.0.0.1:10134
de4e6099f84e48d89e40ea74092aa6a9
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\HDAudioDriver\HDAudioDriver.exe
-
reconnect_delay
10000
-
registry_keyname
Realtek_audio_driver
-
taskscheduler_taskname
Orcus
-
watchdog_path
Temp\chrome.exe
Signatures
-
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b92-21.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/memory/1048-1-0x0000000000B60000-0x0000000000C4A000-memory.dmp orcus behavioral2/files/0x000a000000023b92-21.dat orcus -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation HDAudioDriver.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation chrome.exe -
Executes dropped EXE 3 IoCs
pid Process 3984 HDAudioDriver.exe 1664 chrome.exe 232 chrome.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek_audio_driver = "\"C:\\Program Files (x86)\\HDAudioDriver\\HDAudioDriver.exe\"" HDAudioDriver.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\HDAudioDriver\HDAudioDriver.exe 7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe File opened for modification C:\Program Files (x86)\HDAudioDriver\HDAudioDriver.exe 7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe File created C:\Program Files (x86)\HDAudioDriver\HDAudioDriver.exe.config 7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HDAudioDriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3984 HDAudioDriver.exe 3984 HDAudioDriver.exe 3984 HDAudioDriver.exe 232 chrome.exe 232 chrome.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 232 chrome.exe 3984 HDAudioDriver.exe 3984 HDAudioDriver.exe 232 chrome.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 3984 HDAudioDriver.exe 232 chrome.exe 232 chrome.exe 3984 HDAudioDriver.exe 3984 HDAudioDriver.exe 232 chrome.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 232 chrome.exe 3984 HDAudioDriver.exe 3984 HDAudioDriver.exe 232 chrome.exe 232 chrome.exe 3984 HDAudioDriver.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe 3984 HDAudioDriver.exe 232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3984 HDAudioDriver.exe Token: SeDebugPrivilege 1664 chrome.exe Token: SeDebugPrivilege 232 chrome.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3984 HDAudioDriver.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3984 HDAudioDriver.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3984 HDAudioDriver.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3984 1048 7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe 83 PID 1048 wrote to memory of 3984 1048 7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe 83 PID 1048 wrote to memory of 3984 1048 7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe 83 PID 3984 wrote to memory of 1664 3984 HDAudioDriver.exe 84 PID 3984 wrote to memory of 1664 3984 HDAudioDriver.exe 84 PID 3984 wrote to memory of 1664 3984 HDAudioDriver.exe 84 PID 1664 wrote to memory of 232 1664 chrome.exe 85 PID 1664 wrote to memory of 232 1664 chrome.exe 85 PID 1664 wrote to memory of 232 1664 chrome.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe"C:\Users\Admin\AppData\Local\Temp\7e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\HDAudioDriver\HDAudioDriver.exe"C:\Program Files (x86)\HDAudioDriver\HDAudioDriver.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe" /launchSelfAndExit "C:\Program Files (x86)\HDAudioDriver\HDAudioDriver.exe" 3984 /protectFile3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe" /watchProcess "C:\Program Files (x86)\HDAudioDriver\HDAudioDriver.exe" 3984 "/protectFile"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD514fb495cc853da2b1bab0ef9ad8ea15f
SHA1b6d6589a7a5638c50cbd6cf6482c31db3f941fec
SHA2567e5af014d000b8f289f758666ec44efc8e5b65475248944cd439433af0ff187e
SHA512a97cf03fe6c59fb334d57c6dc3f5aca28f80ab3d3b3a89ec9d1f5e08d856ca0d5da8e8eedbe469c31d0a9d3aba8a5a90772d76abf386951d402bab94124b8081
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
1KB
MD5d1dc14cf97a4c6135bd96eb847637c4a
SHA100f8650501e4a45bce03e8cfc673e3ae6ee2d367
SHA2561b8dadb9abfc3283f024582cc053fb8c76633faeb1718efc38f8b57228a21968
SHA512fc733c8a0a26dfb5cfd97496bb461ceb7b9bd0ab4d38c701e3deebc336705edb3e32173fde749931fdc75981254ba54bb096a4613bbdcdb7e4ec61dca8d55f4a