General
-
Target
smd.exe
-
Size
839KB
-
Sample
250104-atnl1s1pfw
-
MD5
3144e31b05fa12d135e40cb1ee92b155
-
SHA1
4c7c273b547ec8d42e439c687285d9060c7d3065
-
SHA256
f56dc459e9d914a4291b02ee04ac3837d088bb3c08901e00a63802be90167c41
-
SHA512
0ff81376b6db8ca1ada7b624bbb2bc622c817dabbf7bad1d8c6aba40d663dab1f2dd3a0b621650d020f62d6ca5f044024be220eac5e40990918ef6890039e438
-
SSDEEP
24576:1xdS04YNEMuExDiU6E5R9s8xY/2l/d2tnIbt+rT:bP4auS+UjfU2T2dIbt+r
Behavioral task
behavioral1
Sample
smd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
smd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
orcus
3shop-extreme.gl.at.ply.gg
51d6e45eabea4bbf89f8114ec5d59be0
-
administration_rights_required
false
-
anti_debugger
false
-
anti_tcp_analyzer
false
-
antivm
false
-
autostart_method
1
-
change_creation_date
false
-
force_installer_administrator_privileges
false
-
hide_file
false
-
install
false
-
installation_folder
%appdata%\Microsoft\Speech\AudioDriver.exe
-
installservice
false
-
keylogger_enabled
false
-
newcreationdate
01/03/2025 20:57:17
-
plugins
AgEAAA==
-
reconnect_delay
10000
-
registry_autostart_keyname
Audio HD Driver
-
registry_hidden_autostart
false
-
set_admin_flag
false
-
tasksch_name
Audio HD Driver
-
tasksch_request_highest_privileges
false
-
try_other_autostart_onfail
false
Targets
-
-
Target
smd.exe
-
Size
839KB
-
MD5
3144e31b05fa12d135e40cb1ee92b155
-
SHA1
4c7c273b547ec8d42e439c687285d9060c7d3065
-
SHA256
f56dc459e9d914a4291b02ee04ac3837d088bb3c08901e00a63802be90167c41
-
SHA512
0ff81376b6db8ca1ada7b624bbb2bc622c817dabbf7bad1d8c6aba40d663dab1f2dd3a0b621650d020f62d6ca5f044024be220eac5e40990918ef6890039e438
-
SSDEEP
24576:1xdS04YNEMuExDiU6E5R9s8xY/2l/d2tnIbt+rT:bP4auS+UjfU2T2dIbt+r
-
Modifies WinLogon for persistence
-
Orcus family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3