General
-
Target
Sigma boy.exe
-
Size
839KB
-
Sample
241217-3jh8rssndv
-
MD5
5ff4807e24e3435c8e2d88be60086109
-
SHA1
3724453097aa75f412094aa9d72d53be07e99ef6
-
SHA256
227befcbc16bcd69e4f1b9b634492eba0c952e06b9ed94b199edce3804b84f51
-
SHA512
0f4a80c5e26b87bb5223d509111c9401ce763fd4f5bfb845ef8cbfde1bfbe0e71c33bc594b4a842948fca731b02a106e138eaec017505bab6b8a454303d71032
-
SSDEEP
24576:BpS04YNEMuExDiU6E5R9s8xY/2l/dmtnIbt+rP:BL4auS+UjfU2TmdIbt+r
Behavioral task
behavioral1
Sample
Sigma boy.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Sigma boy.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
147.185.221.24
6dca1f42faa743d681c44618578d8050
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
12/17/2024 15:29:42
-
plugins
AgEAAA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
Sigma boy.exe
-
Size
839KB
-
MD5
5ff4807e24e3435c8e2d88be60086109
-
SHA1
3724453097aa75f412094aa9d72d53be07e99ef6
-
SHA256
227befcbc16bcd69e4f1b9b634492eba0c952e06b9ed94b199edce3804b84f51
-
SHA512
0f4a80c5e26b87bb5223d509111c9401ce763fd4f5bfb845ef8cbfde1bfbe0e71c33bc594b4a842948fca731b02a106e138eaec017505bab6b8a454303d71032
-
SSDEEP
24576:BpS04YNEMuExDiU6E5R9s8xY/2l/dmtnIbt+rP:BL4auS+UjfU2TmdIbt+r
-
Modifies WinLogon for persistence
-
Orcus family
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Modifies WinLogon
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Winlogon Helper DLL
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5