Analysis

  • max time kernel
    147s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2025, 01:05 UTC

General

  • Target

    b60cfa1815fa9efe3e68b8e69e6bfb289771b3fd88e8b86f0bdaff7e645c85fd.exe

  • Size

    840KB

  • MD5

    f7f107a2c4c837253f60c06159f25e66

  • SHA1

    76726e798bfb1101596b37fa048a2d76b88c20e1

  • SHA256

    b60cfa1815fa9efe3e68b8e69e6bfb289771b3fd88e8b86f0bdaff7e645c85fd

  • SHA512

    1ec94604fea2793b527d17a103ebee5e38aef333d9696c4571f2e7075fc8bc8cec24c3f7e227d37798f0d4939cb0aa97d3482dc51ee6fd169044faca8aeb8a67

  • SSDEEP

    24576:0LFS04YNEMuExDiU6E5R9s8xY/2l/d6N1Ibt+r+:0L34auS+UjfU2T21Ibt+r

Malware Config

Extracted

Family

orcus

C2

127.0.0.1

Mutex

d285de69bf4148bab013f46dc9a8b0ae

Attributes
  • administration_rights_required

    false

  • anti_debugger

    false

  • anti_tcp_analyzer

    false

  • antivm

    false

  • autostart_method

    1

  • change_creation_date

    false

  • force_installer_administrator_privileges

    false

  • hide_file

    false

  • install

    false

  • installation_folder

    %appdata%\Microsoft\Speech\AudioDriver.exe

  • installservice

    false

  • keylogger_enabled

    false

  • newcreationdate

    01/25/2025 20:19:33

  • plugins

    AgEAAA==

  • reconnect_delay

    10000

  • registry_autostart_keyname

    Audio HD Driver

  • registry_hidden_autostart

    false

  • set_admin_flag

    false

  • tasksch_name

    Audio HD Driver

  • tasksch_request_highest_privileges

    false

  • try_other_autostart_onfail

    false

aes.plain
1
CrackedByWardow

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b60cfa1815fa9efe3e68b8e69e6bfb289771b3fd88e8b86f0bdaff7e645c85fd.exe
    "C:\Users\Admin\AppData\Local\Temp\b60cfa1815fa9efe3e68b8e69e6bfb289771b3fd88e8b86f0bdaff7e645c85fd.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3040

Network

    No results found
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
  • 127.0.0.1:10134
    AudioDriver.exe
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe

    Filesize

    840KB

    MD5

    f7f107a2c4c837253f60c06159f25e66

    SHA1

    76726e798bfb1101596b37fa048a2d76b88c20e1

    SHA256

    b60cfa1815fa9efe3e68b8e69e6bfb289771b3fd88e8b86f0bdaff7e645c85fd

    SHA512

    1ec94604fea2793b527d17a103ebee5e38aef333d9696c4571f2e7075fc8bc8cec24c3f7e227d37798f0d4939cb0aa97d3482dc51ee6fd169044faca8aeb8a67

  • memory/1768-3-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/1768-2-0x00000000001F0000-0x00000000001FA000-memory.dmp

    Filesize

    40KB

  • memory/1768-0-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

    Filesize

    4KB

  • memory/1768-4-0x0000000000D00000-0x0000000000D4C000-memory.dmp

    Filesize

    304KB

  • memory/1768-7-0x0000000004420000-0x000000000446E000-memory.dmp

    Filesize

    312KB

  • memory/1768-1-0x0000000000E00000-0x0000000000ED8000-memory.dmp

    Filesize

    864KB

  • memory/1768-14-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/3040-16-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/3040-15-0x0000000000390000-0x0000000000468000-memory.dmp

    Filesize

    864KB

  • memory/3040-17-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/3040-18-0x0000000000600000-0x0000000000610000-memory.dmp

    Filesize

    64KB

  • memory/3040-19-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.