General
-
Target
AimAssist.exe
-
Size
839KB
-
Sample
250101-zyebkstrdt
-
MD5
9232f68810b230913f7b46b2db02d8a1
-
SHA1
afece387cdf0f80acf98f57589234b584a8e13c4
-
SHA256
8e2de94aa59d77bb4ba00b39e5b4dddf69321a558975388c666f51084339a03e
-
SHA512
8169ccfd632b590040335c5b59db1a9a50d477795c4e00c49ba3b846e3d2cdc839e3cc2e3f2ebc8450d8f9bced96e596d11cd74cf5a789d29ba49476364f5488
-
SSDEEP
24576:SxdS04YNEMuExDiU6E5R9s8xY/2l/d2tnIbt+r2:GP4auS+UjfU2T2dIbt+r
Behavioral task
behavioral1
Sample
AimAssist.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
AimAssist.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
3buy-response.gl.at.ply.gg
20bafa3dc96e4ee8b82bbe11a3472987
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
01/01/2025 13:05:49
-
plugins
AgEAAA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
AimAssist.exe
-
Size
839KB
-
MD5
9232f68810b230913f7b46b2db02d8a1
-
SHA1
afece387cdf0f80acf98f57589234b584a8e13c4
-
SHA256
8e2de94aa59d77bb4ba00b39e5b4dddf69321a558975388c666f51084339a03e
-
SHA512
8169ccfd632b590040335c5b59db1a9a50d477795c4e00c49ba3b846e3d2cdc839e3cc2e3f2ebc8450d8f9bced96e596d11cd74cf5a789d29ba49476364f5488
-
SSDEEP
24576:SxdS04YNEMuExDiU6E5R9s8xY/2l/d2tnIbt+r2:GP4auS+UjfU2T2dIbt+r
-
Modifies WinLogon for persistence
-
Orcus family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3