Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2025, 01:11

General

  • Target

    f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8.exe

  • Size

    920KB

  • MD5

    b08bc930dc90e54bc888a9b8195ecc12

  • SHA1

    3019337f580bdc0c54c01a79e5144143fe10f17d

  • SHA256

    f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8

  • SHA512

    c3b8f048730ce8a0ac767bcdf970189af6034a2a7e6e7360b111f83008b32665c4f6cc9e23e4cbe8228931f1a0a56bfe1c89a776aafbbe49b898814fe38c3f20

  • SSDEEP

    24576:bwV4MROxnFZ3+kTZ1rZlI0AilFEvxHirXrD4:bwCMi7nrZlI0AilFEvxHir

Malware Config

Extracted

Family

orcus

Botnet

fake2

C2

192.168.50.22:10134

Mutex

d4279019eb0e484a85ded599a3e44bc6

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %appdata%\fake2\fake2.exe

  • reconnect_delay

    10000

  • registry_keyname

    fake2

  • taskscheduler_taskname

    fakee2

  • watchdog_path

    AppData\fake2.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8.exe
    "C:\Users\Admin\AppData\Local\Temp\f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kx593qlt.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCC1B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCC1A.tmp"
        3⤵
          PID:4972
      • C:\Windows\SysWOW64\WindowsInput.exe
        "C:\Windows\SysWOW64\WindowsInput.exe" --install
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        PID:4120
      • C:\Users\Admin\AppData\Roaming\fake2\fake2.exe
        "C:\Users\Admin\AppData\Roaming\fake2\fake2.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3852
        • C:\Users\Admin\AppData\Roaming\fake2.exe
          "C:\Users\Admin\AppData\Roaming\fake2.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\fake2\fake2.exe" 3852 /protectFile
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4876
          • C:\Users\Admin\AppData\Roaming\fake2.exe
            "C:\Users\Admin\AppData\Roaming\fake2.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\fake2\fake2.exe" 3852 "/protectFile"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5100
    • C:\Windows\SysWOW64\WindowsInput.exe
      "C:\Windows\SysWOW64\WindowsInput.exe"
      1⤵
      • Executes dropped EXE
      PID:756
    • C:\Users\Admin\AppData\Roaming\fake2\fake2.exe
      C:\Users\Admin\AppData\Roaming\fake2\fake2.exe
      1⤵
      • Executes dropped EXE
      PID:532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fake2.exe.log

      Filesize

      425B

      MD5

      4eaca4566b22b01cd3bc115b9b0b2196

      SHA1

      e743e0792c19f71740416e7b3c061d9f1336bf94

      SHA256

      34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

      SHA512

      bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

    • C:\Users\Admin\AppData\Local\Temp\RESCC1B.tmp

      Filesize

      1KB

      MD5

      798c2b45f6fe7d414f47a07eb83f7c17

      SHA1

      110ec82d4a1099339555e2b6ae3fbc3b51160628

      SHA256

      97322808d840e58de933d49a7186112f59c60f1a190cc140bb318a126c54368b

      SHA512

      cfd74a5e7288ac112bc2858e38a0b6a5a8d02f589698a9be9b2e26f7f7a04ec4207383c6058a1ecb45fe382e0d47a1f09aece2edc61c89078831744d932f959f

    • C:\Users\Admin\AppData\Local\Temp\kx593qlt.dll

      Filesize

      76KB

      MD5

      4ae562459ec2e6110dc83197c7a675bb

      SHA1

      6073a9a654d1b15ae407ea3424b6bf8d62d5fe40

      SHA256

      f7b8b9f0225abb198aa27189e46906c5c79c322aa20b8d020938d35a9053952a

      SHA512

      e88f1b330991eeef7656a238a4252346a0985c5ebae472a357971d9b07e7da3b5ee603fa8e420795248a491bafed376652dec4f867eb6343acedda826b2fddba

    • C:\Users\Admin\AppData\Roaming\fake2.exe

      Filesize

      9KB

      MD5

      913967b216326e36a08010fb70f9dba3

      SHA1

      7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

      SHA256

      8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

      SHA512

      c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

    • C:\Users\Admin\AppData\Roaming\fake2\fake2.exe

      Filesize

      920KB

      MD5

      b08bc930dc90e54bc888a9b8195ecc12

      SHA1

      3019337f580bdc0c54c01a79e5144143fe10f17d

      SHA256

      f15288549b3206cac5192ee6449f4b1f2ed796e3a7e72dad63b239e4660447f8

      SHA512

      c3b8f048730ce8a0ac767bcdf970189af6034a2a7e6e7360b111f83008b32665c4f6cc9e23e4cbe8228931f1a0a56bfe1c89a776aafbbe49b898814fe38c3f20

    • C:\Windows\SysWOW64\WindowsInput.exe

      Filesize

      21KB

      MD5

      e6fcf516d8ed8d0d4427f86e08d0d435

      SHA1

      c7691731583ab7890086635cb7f3e4c22ca5e409

      SHA256

      8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

      SHA512

      c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

    • C:\Windows\SysWOW64\WindowsInput.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCCC1A.tmp

      Filesize

      676B

      MD5

      c0687b87b0d6b16cff18fab043abbe38

      SHA1

      908fc14bbe05d52ce18b7ad54226cf011eb98912

      SHA256

      d370ca9753eaabd6cfee42590649aa997350e684fe8117df48e9103bc078ac30

      SHA512

      62ace48640dea6175ae12c964bb1aab6550af25a98d54a48eaaab95a361197fa0f911906293565f272f5a1709a9a1755f2eddbeede6ee1297bc24fa6d38ba6b2

    • \??\c:\Users\Admin\AppData\Local\Temp\kx593qlt.0.cs

      Filesize

      208KB

      MD5

      666a535aea3c55f005c1ce79fb98aee6

      SHA1

      308d1a8cadbb564ae0d74899a36a94895efa764f

      SHA256

      819d5854949905bb0d924d1d9fc2120f4e81bc435a868a3419d662f1a315d1d3

      SHA512

      b22af6aba6c01f3b3fb9b59e7c28621db56f8d687026ed5ba6f737f7b2c101031ef5f94159ff0fd84491bdd0bb623eb087094a2ee23bad58200312b78bfd1e7e

    • \??\c:\Users\Admin\AppData\Local\Temp\kx593qlt.cmdline

      Filesize

      349B

      MD5

      ba5062aafaf722ae8b81c09a0be92c25

      SHA1

      9164ec04e3360f36a18b5d396badd05385af3e98

      SHA256

      804bad1f3cd75d813ceb9d36aa17a3ef6d87a01768c9113e76f437c06726ddff

      SHA512

      14bd25138de1b3f388baaf3263dd0078d7cece99170c0a87b08ab9f7cbf33c4ab2125fc70d32b392f6fb23dcf766fbff1bb0667cc622db246d8b6feb7f839e11

    • memory/756-48-0x0000000019F00000-0x000000001A00A000-memory.dmp

      Filesize

      1.0MB

    • memory/2748-25-0x0000000001590000-0x00000000015A2000-memory.dmp

      Filesize

      72KB

    • memory/2748-1-0x00007FF9D5A20000-0x00007FF9D63C1000-memory.dmp

      Filesize

      9.6MB

    • memory/2748-23-0x000000001C820000-0x000000001C836000-memory.dmp

      Filesize

      88KB

    • memory/2748-8-0x00007FF9D5A20000-0x00007FF9D63C1000-memory.dmp

      Filesize

      9.6MB

    • memory/2748-0-0x00007FF9D5CD5000-0x00007FF9D5CD6000-memory.dmp

      Filesize

      4KB

    • memory/2748-26-0x000000001CE50000-0x000000001CE70000-memory.dmp

      Filesize

      128KB

    • memory/2748-7-0x000000001C750000-0x000000001C7EC000-memory.dmp

      Filesize

      624KB

    • memory/2748-6-0x000000001C1E0000-0x000000001C6AE000-memory.dmp

      Filesize

      4.8MB

    • memory/2748-2-0x000000001BB00000-0x000000001BB5C000-memory.dmp

      Filesize

      368KB

    • memory/2748-64-0x00007FF9D5A20000-0x00007FF9D63C1000-memory.dmp

      Filesize

      9.6MB

    • memory/2748-5-0x000000001BD00000-0x000000001BD0E000-memory.dmp

      Filesize

      56KB

    • memory/3852-66-0x0000000002D70000-0x0000000002D82000-memory.dmp

      Filesize

      72KB

    • memory/3852-65-0x0000000000AF0000-0x0000000000BDC000-memory.dmp

      Filesize

      944KB

    • memory/3852-67-0x000000001C610000-0x000000001C65E000-memory.dmp

      Filesize

      312KB

    • memory/3852-69-0x000000001C7A0000-0x000000001C7B8000-memory.dmp

      Filesize

      96KB

    • memory/3852-70-0x000000001CB60000-0x000000001CB70000-memory.dmp

      Filesize

      64KB

    • memory/4120-43-0x0000000002990000-0x00000000029CC000-memory.dmp

      Filesize

      240KB

    • memory/4120-42-0x0000000002930000-0x0000000002942000-memory.dmp

      Filesize

      72KB

    • memory/4120-41-0x00000000008A0000-0x00000000008AC000-memory.dmp

      Filesize

      48KB

    • memory/4120-40-0x00007FF9D2C13000-0x00007FF9D2C15000-memory.dmp

      Filesize

      8KB

    • memory/4500-16-0x00007FF9D5A20000-0x00007FF9D63C1000-memory.dmp

      Filesize

      9.6MB

    • memory/4500-21-0x00007FF9D5A20000-0x00007FF9D63C1000-memory.dmp

      Filesize

      9.6MB

    • memory/4876-84-0x0000000000760000-0x0000000000768000-memory.dmp

      Filesize

      32KB