Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2025, 01:11 UTC

General

  • Target

    f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8.exe

  • Size

    920KB

  • MD5

    b08bc930dc90e54bc888a9b8195ecc12

  • SHA1

    3019337f580bdc0c54c01a79e5144143fe10f17d

  • SHA256

    f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8

  • SHA512

    c3b8f048730ce8a0ac767bcdf970189af6034a2a7e6e7360b111f83008b32665c4f6cc9e23e4cbe8228931f1a0a56bfe1c89a776aafbbe49b898814fe38c3f20

  • SSDEEP

    24576:bwV4MROxnFZ3+kTZ1rZlI0AilFEvxHirXrD4:bwCMi7nrZlI0AilFEvxHir

Malware Config

Extracted

Family

orcus

Botnet

fake2

C2

192.168.50.22:10134

Mutex

d4279019eb0e484a85ded599a3e44bc6

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %appdata%\fake2\fake2.exe

  • reconnect_delay

    10000

  • registry_keyname

    fake2

  • taskscheduler_taskname

    fakee2

  • watchdog_path

    AppData\fake2.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8.exe
    "C:\Users\Admin\AppData\Local\Temp\f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bfr3shln.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8595.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8594.tmp"
        3⤵
          PID:2980
      • C:\Windows\SysWOW64\WindowsInput.exe
        "C:\Windows\SysWOW64\WindowsInput.exe" --install
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        PID:2852
      • C:\Users\Admin\AppData\Roaming\fake2\fake2.exe
        "C:\Users\Admin\AppData\Roaming\fake2\fake2.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Roaming\fake2.exe
          "C:\Users\Admin\AppData\Roaming\fake2.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\fake2\fake2.exe" 2776 /protectFile
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2928
          • C:\Users\Admin\AppData\Roaming\fake2.exe
            "C:\Users\Admin\AppData\Roaming\fake2.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\fake2\fake2.exe" 2776 "/protectFile"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1808
    • C:\Windows\SysWOW64\WindowsInput.exe
      "C:\Windows\SysWOW64\WindowsInput.exe"
      1⤵
      • Executes dropped EXE
      PID:2804
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {AFFECF9A-90A5-45AC-A5BA-A73BE1133D55} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Users\Admin\AppData\Roaming\fake2\fake2.exe
        C:\Users\Admin\AppData\Roaming\fake2\fake2.exe
        2⤵
        • Executes dropped EXE
        PID:1544

    Network

      No results found
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      152 B
      3
    • 192.168.50.22:10134
      fake2.exe
      52 B
      1
    No results found

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES8595.tmp

      Filesize

      1KB

      MD5

      1f727fe360a2f92c4728f39ca48f4de2

      SHA1

      1fcb701711c667dff6fe9fbcf517cad8d6052782

      SHA256

      8eb1f67a119fc1438fcd80a04d3dea28afd9d699ac9f3a368cb50e7241e0a054

      SHA512

      9dfba258647e13d1fc4fce4bfb935fb6234355e89a30e176aa30a8a8950a195ab2c474c5f7a97ca0abc99f3d52728d6604e25445adafcd305f4cc337c3b948c3

    • C:\Users\Admin\AppData\Local\Temp\bfr3shln.dll

      Filesize

      76KB

      MD5

      1bfe730d6e2b1cd6ff0356f15b3c80fd

      SHA1

      f1f7127827354ffe509f720ae7d3a89400f69104

      SHA256

      55d23ff2e9f88d234c3d5e199dbe8f6c7ce9bc1ee8b9476bfaa25286e33c3ea8

      SHA512

      615b510d73a3c131b4bbbac58970892987e12d6372cee992a2045f36a9cb65e79525d6c12fbef696ccbf63f7e552571330dbfa15b2eb661454adf7b6234eb0ce

    • C:\Users\Admin\AppData\Roaming\fake2.exe

      Filesize

      9KB

      MD5

      913967b216326e36a08010fb70f9dba3

      SHA1

      7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

      SHA256

      8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

      SHA512

      c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

    • C:\Users\Admin\AppData\Roaming\fake2\fake2.exe

      Filesize

      920KB

      MD5

      b08bc930dc90e54bc888a9b8195ecc12

      SHA1

      3019337f580bdc0c54c01a79e5144143fe10f17d

      SHA256

      f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8

      SHA512

      c3b8f048730ce8a0ac767bcdf970189af6034a2a7e6e7360b111f83008b32665c4f6cc9e23e4cbe8228931f1a0a56bfe1c89a776aafbbe49b898814fe38c3f20

    • C:\Windows\SysWOW64\WindowsInput.exe

      Filesize

      21KB

      MD5

      e6fcf516d8ed8d0d4427f86e08d0d435

      SHA1

      c7691731583ab7890086635cb7f3e4c22ca5e409

      SHA256

      8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

      SHA512

      c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

    • C:\Windows\SysWOW64\WindowsInput.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC8594.tmp

      Filesize

      676B

      MD5

      8c00d634b7baf7d8f8db0151dbe17550

      SHA1

      3ab3d5588c38d17120934b271d56fbefc20ab391

      SHA256

      49994be07caa29d4d25b6a86ce33c29ec04c42232979c799612e57ca53fabbca

      SHA512

      279e4712dc8519d13ce9dae51fbd2efb877f19e97f753b32c1b2d714cd5ce4cd8484608b34288d80f8e3642269ed67a28cf263951eedc62333655b0e16df84b3

    • \??\c:\Users\Admin\AppData\Local\Temp\bfr3shln.0.cs

      Filesize

      208KB

      MD5

      54511f23d6e93f391ec061e65eb8ecba

      SHA1

      cf4d8d8b57a36cfd710d41020e09d2816c692725

      SHA256

      66c5f9da5b51fbe62b5c8ca38dca18f90f226df574a4caf0ffdd0e5c1211edbe

      SHA512

      39f77b2a752f36918b4ccd286ac428302d37a8edd566a0226cd1c000a6fc029e8c05f8cc90de21143a678fcae62c28bf05e94d454c193f32c21a3448c0046116

    • \??\c:\Users\Admin\AppData\Local\Temp\bfr3shln.cmdline

      Filesize

      349B

      MD5

      ceafc081b003812cecd81a82f02fabae

      SHA1

      f418dfacec31131f35e15a08b136f46ef9532512

      SHA256

      700911825d2e2c50cdac3a67f4d12ac076e599a7468bb686451ec8a88718a67d

      SHA512

      e29be4c075424f0ccbdf4856e2477600d19dd7987de6ee0b2a51aa2f90ee7768ddb5198307232c760c88590a01ab1d4681f51bbd090a6050355c02d11ecff7b0

    • memory/1968-19-0x00000000005D0000-0x00000000005E6000-memory.dmp

      Filesize

      88KB

    • memory/1968-0-0x000007FEF5B8E000-0x000007FEF5B8F000-memory.dmp

      Filesize

      4KB

    • memory/1968-1-0x0000000002130000-0x000000000218C000-memory.dmp

      Filesize

      368KB

    • memory/1968-2-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1968-21-0x0000000000430000-0x0000000000442000-memory.dmp

      Filesize

      72KB

    • memory/1968-4-0x000007FEF58D0000-0x000007FEF626D000-memory.dmp

      Filesize

      9.6MB

    • memory/1968-3-0x000007FEF58D0000-0x000007FEF626D000-memory.dmp

      Filesize

      9.6MB

    • memory/1968-42-0x000007FEF58D0000-0x000007FEF626D000-memory.dmp

      Filesize

      9.6MB

    • memory/2428-17-0x000007FEF58D0000-0x000007FEF626D000-memory.dmp

      Filesize

      9.6MB

    • memory/2428-10-0x000007FEF58D0000-0x000007FEF626D000-memory.dmp

      Filesize

      9.6MB

    • memory/2776-43-0x0000000000EF0000-0x0000000000FDC000-memory.dmp

      Filesize

      944KB

    • memory/2776-44-0x0000000000D00000-0x0000000000D4E000-memory.dmp

      Filesize

      312KB

    • memory/2776-45-0x0000000000D70000-0x0000000000D88000-memory.dmp

      Filesize

      96KB

    • memory/2776-46-0x0000000000D90000-0x0000000000DA0000-memory.dmp

      Filesize

      64KB

    • memory/2804-33-0x0000000000370000-0x000000000037C000-memory.dmp

      Filesize

      48KB

    • memory/2852-29-0x0000000000210000-0x000000000021C000-memory.dmp

      Filesize

      48KB

    • memory/2928-56-0x0000000000BB0000-0x0000000000BB8000-memory.dmp

      Filesize

      32KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.