General
-
Target
fghhjgfhj.exe
-
Size
1.2MB
-
Sample
241224-qjse8ayjdw
-
MD5
a3f7146a9e0a134c8c50658c2347420f
-
SHA1
ca40306a2199bc3ea7c8b1b013b029dbe1b71215
-
SHA256
a97cf2657ba794b8420f84f139b5b31ad7bb33dc0da80c276095a0fd4a123a8b
-
SHA512
d2cf202195e5db81b6668cd1579ed32cf81d1bbf4eddf004ee4817b1932a38e5aa416248161948032e128fac77045a42f36dc71f4b126ee56285d8afc1c8e1d5
-
SSDEEP
24576:FSBS04YNEMuExDiU6E5R9s8xY/2l/dRJ5dtsPxNGf3HIbt+rF:FSj4auS+UjfU2T/5XDPIbt+r
Behavioral task
behavioral1
Sample
fghhjgfhj.exe
Resource
win7-20240903-en
Malware Config
Extracted
orcus
127.0.0.1
m5email-hitting.gl.at.ply.gg
f1ab2b6bff84430c801a9bc21e12178d
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
12/24/2024 14:16:44
-
plugins
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
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
fghhjgfhj.exe
-
Size
1.2MB
-
MD5
a3f7146a9e0a134c8c50658c2347420f
-
SHA1
ca40306a2199bc3ea7c8b1b013b029dbe1b71215
-
SHA256
a97cf2657ba794b8420f84f139b5b31ad7bb33dc0da80c276095a0fd4a123a8b
-
SHA512
d2cf202195e5db81b6668cd1579ed32cf81d1bbf4eddf004ee4817b1932a38e5aa416248161948032e128fac77045a42f36dc71f4b126ee56285d8afc1c8e1d5
-
SSDEEP
24576:FSBS04YNEMuExDiU6E5R9s8xY/2l/dRJ5dtsPxNGf3HIbt+rF:FSj4auS+UjfU2T/5XDPIbt+r
-
Orcus family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
3Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1