Edit tour

Windows Analysis Report
Orcus.exe

Overview

General Information

Sample name:Orcus.exe
Analysis ID:1458928
MD5:34cba084037df6b83cd8806623a9268e
SHA1:fbeca5c3cb6c934d2c12353d1157fcee1b167327
SHA256:abc40d0ebf12534d037a38ee073fb546149999355c219a8b03bdb2b61564fed2
Tags:exeHUN
Infos:

Detection

Orcus
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Orcus RAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to disable the Task Manager (.Net Source)
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Machine Learning detection for sample
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Suspicious desktop.ini Action
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Orcus.exe (PID: 7284 cmdline: "C:\Users\user\Desktop\Orcus.exe" MD5: 34CBA084037DF6B83CD8806623A9268E)
    • AudioDriver.exe (PID: 7336 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe" MD5: 34CBA084037DF6B83CD8806623A9268E)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Orcus RATOrcus has been advertised as a Remote Administration Tool (RAT) since early 2016. It has all the features that would be expected from a RAT and probably more. The long list of the commands is documented on their website. But what separates Orcus from the others is its capability to load custom plugins developed by users, as well as plugins that are readily available from the Orcus repository. In addition to that, users can also execute C# and VB.net code on the remote machine in real-time.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.orcus_rat
No configs have been found
SourceRuleDescriptionAuthorStrings
Orcus.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    Orcus.exeJoeSecurity_OrcusRatYara detected Orcus RATJ from THL <j@techhelplist.com> with thx to MalwareHunterTeam
      Orcus.exeMAL_BackNet_Nov18_1Detects BackNet samplesFlorian Roth
      • 0xc748f:$s1: ProcessedByFody
      • 0xcb5f3:$s2: SELECT * FROM AntivirusProduct
      Orcus.exeRAT_Orcusunknown J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
      • 0xc6ce0:$text01: Orcus.CommandManagement
      • 0xb789c:$text02: Orcus.Commands.
      • 0xbee51:$text02: Orcus.Commands.
      • 0xbf1a2:$text02: Orcus.Commands.
      • 0xbf42f:$text02: Orcus.Commands.
      • 0xbf8b8:$text02: Orcus.Commands.
      • 0xbfc98:$text02: Orcus.Commands.
      • 0xbfd9b:$text02: Orcus.Commands.
      • 0xc0149:$text02: Orcus.Commands.
      • 0xc04a9:$text02: Orcus.Commands.
      • 0xc08da:$text02: Orcus.Commands.
      • 0xc0bb0:$text02: Orcus.Commands.
      • 0xc0c96:$text02: Orcus.Commands.
      • 0xc174b:$text02: Orcus.Commands.
      • 0xc178f:$text02: Orcus.Commands.
      • 0xc1986:$text02: Orcus.Commands.
      • 0xc19bf:$text02: Orcus.Commands.
      • 0xc1c65:$text02: Orcus.Commands.
      • 0xc2164:$text02: Orcus.Commands.
      • 0xc2232:$text02: Orcus.Commands.
      • 0xc226a:$text02: Orcus.Commands.
      Orcus.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0xca47d:$f1: FileZilla\recentservers.xml
      • 0xc9718:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0xca809:$b1: Chrome\User Data\
      • 0xca875:$b1: Chrome\User Data\
      • 0xca10b:$b2: Mozilla\Firefox\Profiles
      • 0xca1ff:$b2: Mozilla\Firefox\Profiles
      • 0xc9e4c:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0xcf88f:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0xc9bfa:$b4: Opera Software\Opera Stable\Login Data
      • 0xc960c:$b5: YandexBrowser\User Data\
      • 0xc9678:$b5: YandexBrowser\User Data\
      • 0xc99b0:$s1: key3.db
      • 0xca13d:$s4: logins.json
      • 0xca2ed:$s4: logins.json
      • 0xc9146:$a1: username_value
      • 0xc9164:$a2: password_value
      • 0xc2e2e:$a3: encryptedUsername
      • 0xc9a12:$a3: encryptedUsername
      • 0xc2e1c:$a4: encryptedPassword
      • 0xc9a36:$a4: encryptedPassword
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeJoeSecurity_OrcusRatYara detected Orcus RATJ from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeMAL_BackNet_Nov18_1Detects BackNet samplesFlorian Roth
          • 0xc748f:$s1: ProcessedByFody
          • 0xcb5f3:$s2: SELECT * FROM AntivirusProduct
          C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeRAT_Orcusunknown J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
          • 0xc6ce0:$text01: Orcus.CommandManagement
          • 0xb789c:$text02: Orcus.Commands.
          • 0xbee51:$text02: Orcus.Commands.
          • 0xbf1a2:$text02: Orcus.Commands.
          • 0xbf42f:$text02: Orcus.Commands.
          • 0xbf8b8:$text02: Orcus.Commands.
          • 0xbfc98:$text02: Orcus.Commands.
          • 0xbfd9b:$text02: Orcus.Commands.
          • 0xc0149:$text02: Orcus.Commands.
          • 0xc04a9:$text02: Orcus.Commands.
          • 0xc08da:$text02: Orcus.Commands.
          • 0xc0bb0:$text02: Orcus.Commands.
          • 0xc0c96:$text02: Orcus.Commands.
          • 0xc174b:$text02: Orcus.Commands.
          • 0xc178f:$text02: Orcus.Commands.
          • 0xc1986:$text02: Orcus.Commands.
          • 0xc19bf:$text02: Orcus.Commands.
          • 0xc1c65:$text02: Orcus.Commands.
          • 0xc2164:$text02: Orcus.Commands.
          • 0xc2232:$text02: Orcus.Commands.
          • 0xc226a:$text02: Orcus.Commands.
          C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0xca47d:$f1: FileZilla\recentservers.xml
          • 0xc9718:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
          • 0xca809:$b1: Chrome\User Data\
          • 0xca875:$b1: Chrome\User Data\
          • 0xca10b:$b2: Mozilla\Firefox\Profiles
          • 0xca1ff:$b2: Mozilla\Firefox\Profiles
          • 0xc9e4c:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0xcf88f:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0xc9bfa:$b4: Opera Software\Opera Stable\Login Data
          • 0xc960c:$b5: YandexBrowser\User Data\
          • 0xc9678:$b5: YandexBrowser\User Data\
          • 0xc99b0:$s1: key3.db
          • 0xca13d:$s4: logins.json
          • 0xca2ed:$s4: logins.json
          • 0xc9146:$a1: username_value
          • 0xc9164:$a2: password_value
          • 0xc2e2e:$a3: encryptedUsername
          • 0xc9a12:$a3: encryptedUsername
          • 0xc2e1c:$a4: encryptedPassword
          • 0xc9a36:$a4: encryptedPassword
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1679321535.0000000000A72000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_OrcusRatYara detected Orcus RATJ from THL <j@techhelplist.com> with thx to MalwareHunterTeam
            00000000.00000000.1679321535.0000000000A72000.00000002.00000001.01000000.00000003.sdmpRAT_Orcusunknown J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
            • 0xc6ae0:$text01: Orcus.CommandManagement
            • 0xb769c:$text02: Orcus.Commands.
            • 0xbec51:$text02: Orcus.Commands.
            • 0xbefa2:$text02: Orcus.Commands.
            • 0xbf22f:$text02: Orcus.Commands.
            • 0xbf6b8:$text02: Orcus.Commands.
            • 0xbfa98:$text02: Orcus.Commands.
            • 0xbfb9b:$text02: Orcus.Commands.
            • 0xbff49:$text02: Orcus.Commands.
            • 0xc02a9:$text02: Orcus.Commands.
            • 0xc06da:$text02: Orcus.Commands.
            • 0xc09b0:$text02: Orcus.Commands.
            • 0xc0a96:$text02: Orcus.Commands.
            • 0xc154b:$text02: Orcus.Commands.
            • 0xc158f:$text02: Orcus.Commands.
            • 0xc1786:$text02: Orcus.Commands.
            • 0xc17bf:$text02: Orcus.Commands.
            • 0xc1a65:$text02: Orcus.Commands.
            • 0xc1f64:$text02: Orcus.Commands.
            • 0xc2032:$text02: Orcus.Commands.
            • 0xc206a:$text02: Orcus.Commands.
            Process Memory Space: Orcus.exe PID: 7284JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Process Memory Space: Orcus.exe PID: 7284JoeSecurity_OrcusRatYara detected Orcus RATJ from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                Process Memory Space: Orcus.exe PID: 7284RAT_Orcusunknown J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                • 0xc81e2:$text01: Orcus.CommandManagement
                • 0xd6fa2:$text01: Orcus.CommandManagement
                • 0xb9adf:$text02: Orcus.Commands.
                • 0xc0847:$text02: Orcus.Commands.
                • 0xc0b89:$text02: Orcus.Commands.
                • 0xc0e16:$text02: Orcus.Commands.
                • 0xc1293:$text02: Orcus.Commands.
                • 0xc165a:$text02: Orcus.Commands.
                • 0xc1759:$text02: Orcus.Commands.
                • 0xc1aec:$text02: Orcus.Commands.
                • 0xc1e47:$text02: Orcus.Commands.
                • 0xc2278:$text02: Orcus.Commands.
                • 0xc230b:$text02: Orcus.Commands.
                • 0xc23f1:$text02: Orcus.Commands.
                • 0xc2e5e:$text02: Orcus.Commands.
                • 0xc2ea2:$text02: Orcus.Commands.
                • 0xc3085:$text02: Orcus.Commands.
                • 0xc30be:$text02: Orcus.Commands.
                • 0xc335b:$text02: Orcus.Commands.
                • 0xc3831:$text02: Orcus.Commands.
                • 0xc38ff:$text02: Orcus.Commands.
                SourceRuleDescriptionAuthorStrings
                0.0.Orcus.exe.a91ef4.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  0.0.Orcus.exe.a91ef4.1.raw.unpackJoeSecurity_OrcusRatYara detected Orcus RATJ from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    0.0.Orcus.exe.a91ef4.1.raw.unpackMAL_BackNet_Nov18_1Detects BackNet samplesFlorian Roth
                    • 0xa739b:$s1: ProcessedByFody
                    • 0xab4ff:$s2: SELECT * FROM AntivirusProduct
                    0.0.Orcus.exe.a91ef4.1.raw.unpackRAT_Orcusunknown J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    • 0xa6bec:$text01: Orcus.CommandManagement
                    • 0x977a8:$text02: Orcus.Commands.
                    • 0x9ed5d:$text02: Orcus.Commands.
                    • 0x9f0ae:$text02: Orcus.Commands.
                    • 0x9f33b:$text02: Orcus.Commands.
                    • 0x9f7c4:$text02: Orcus.Commands.
                    • 0x9fba4:$text02: Orcus.Commands.
                    • 0x9fca7:$text02: Orcus.Commands.
                    • 0xa0055:$text02: Orcus.Commands.
                    • 0xa03b5:$text02: Orcus.Commands.
                    • 0xa07e6:$text02: Orcus.Commands.
                    • 0xa0abc:$text02: Orcus.Commands.
                    • 0xa0ba2:$text02: Orcus.Commands.
                    • 0xa1657:$text02: Orcus.Commands.
                    • 0xa169b:$text02: Orcus.Commands.
                    • 0xa1892:$text02: Orcus.Commands.
                    • 0xa18cb:$text02: Orcus.Commands.
                    • 0xa1b71:$text02: Orcus.Commands.
                    • 0xa2070:$text02: Orcus.Commands.
                    • 0xa213e:$text02: Orcus.Commands.
                    • 0xa2176:$text02: Orcus.Commands.
                    0.0.Orcus.exe.a91ef4.1.raw.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                    • 0xaa389:$f1: FileZilla\recentservers.xml
                    • 0xa9624:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                    • 0xaa715:$b1: Chrome\User Data\
                    • 0xaa781:$b1: Chrome\User Data\
                    • 0xaa017:$b2: Mozilla\Firefox\Profiles
                    • 0xaa10b:$b2: Mozilla\Firefox\Profiles
                    • 0xa9d58:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0xaf79b:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0xa9b06:$b4: Opera Software\Opera Stable\Login Data
                    • 0xa9518:$b5: YandexBrowser\User Data\
                    • 0xa9584:$b5: YandexBrowser\User Data\
                    • 0xa98bc:$s1: key3.db
                    • 0xaa049:$s4: logins.json
                    • 0xaa1f9:$s4: logins.json
                    • 0xa9052:$a1: username_value
                    • 0xa9070:$a2: password_value
                    • 0xa2d3a:$a3: encryptedUsername
                    • 0xa991e:$a3: encryptedUsername
                    • 0xa2d28:$a4: encryptedPassword
                    • 0xa9942:$a4: encryptedPassword
                    Click to see the 5 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Orcus.exe, ProcessId: 7284, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Load
                    Source: File createdAuthor: Maxime Thiebaut (@0xThiebaut), Tim Shelton (HAWK.IO): Data: EventID: 11, Image: C:\Users\user\Desktop\Orcus.exe, ProcessId: 7284, TargetFilename: C:\Windows\assembly\Desktop.ini
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Orcus.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeAvira: detection malicious, Label: HEUR/AGEN.1307306
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeReversingLabs: Detection: 84%
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeVirustotal: Detection: 68%Perma Link
                    Source: Orcus.exeReversingLabs: Detection: 84%
                    Source: Orcus.exeVirustotal: Detection: 68%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeJoe Sandbox ML: detected
                    Source: Orcus.exeJoe Sandbox ML: detected
                    Source: Orcus.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\Orcus.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll
                    Source: Orcus.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Orcus.Shared\obj\Release\Orcus.Shared.pdb|c source: Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdb source: AudioDriver.exe, 00000001.00000002.2924714015.0000000005AD0000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Orcus.Shared\obj\Release\Orcus.Shared.pdb source: Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\Visual Studio 2010\Projects\TaskService\obj\Release\Microsoft.Win32.TaskScheduler.pdb source: Orcus.exe, 00000000.00000002.1688375736.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689425162.0000000005A20000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdbL source: AudioDriver.exe, 00000001.00000002.2924714015.0000000005AD0000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\Visual Studio 2010\Projects\TaskService\obj\Release\Microsoft.Win32.TaskScheduler.pdbH source: Orcus.exe, 00000000.00000002.1688375736.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689425162.0000000005A20000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Features\Orcus.Service\obj\Release\Orcus.Service.pdb source: Orcus.exe, AudioDriver.exe.0.dr
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Features\Orcus.Service\obj\Release\Orcus.Service.pdbHfbf Tf_CorExeMainmscoree.dll source: Orcus.exe, AudioDriver.exe.0.dr
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Orcus.Plugins\obj\Release\Orcus.Plugins.pdb source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp

                    Networking

                    barindex
                    Source: Yara matchFile source: Orcus.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Orcus.exe.a91ef4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.Orcus.exe.a70000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, type: DROPPED
                    Source: unknownDNS traffic detected: query: 18.31.95.13.in-addr.arpa replaycode: Name error (3)
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeCode function: 1_2_00F9A09A recv,
                    Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aia.startssl.com/certs/ca.crt0
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aia.startssl.com/certs/sca.code3.crt06
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.startssl.com/sca-code3.crl0#
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.startssl.com/sfsca.crl0f
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                    Source: Orcus.exe, 00000000.00000002.1687145188.000000000122E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                    Source: Orcus.exe, 00000000.00000002.1687145188.0000000001264000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.
                    Source: Orcus.exe, 00000000.00000002.1687145188.0000000001264000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
                    Source: Orcus.exe, AudioDriver.exe.0.drString found in binary or memory: http://mirror.internode.on.net/pub/test/100meg.test
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.startssl.com00
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.startssl.com07
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                    Source: Orcus.exe, AudioDriver.exe.0.drString found in binary or memory: http://speedtest.netcologne.de/test_100mb.binehttp://www.speedtestx.de/testfiles/data_100mb.testehtt
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.startssl.com/0P
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, AudioDriver.exe, 00000001.00000002.2923403799.0000000003F95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.startssl.com/policy0
                    Source: Orcus.exe, AudioDriver.exe.0.drString found in binary or memory: https://api.ipify.org/I(.
                    Source: Orcus.exe, 00000000.00000002.1688375736.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689425162.0000000005A20000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://taskscheduler.codeplex.com/
                    Source: Orcus.exe, 00000000.00000002.1688375736.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689425162.0000000005A20000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://taskscheduler.codeplex.com/F

                    System Summary

                    barindex
                    Source: Orcus.exe, type: SAMPLEMatched rule: Detects BackNet samples Author: Florian Roth
                    Source: Orcus.exe, type: SAMPLEMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    Source: Orcus.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.0.Orcus.exe.a91ef4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects BackNet samples Author: Florian Roth
                    Source: 0.0.Orcus.exe.a91ef4.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    Source: 0.0.Orcus.exe.a91ef4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.0.Orcus.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: Detects BackNet samples Author: Florian Roth
                    Source: 0.0.Orcus.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    Source: 0.0.Orcus.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 00000000.00000000.1679321535.0000000000A72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    Source: Process Memory Space: Orcus.exe PID: 7284, type: MEMORYSTRMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, type: DROPPEDMatched rule: Detects BackNet samples Author: Florian Roth
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, type: DROPPEDMatched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: Yara matchFile source: Orcus.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Orcus.exe.a91ef4.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.Orcus.exe.a70000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1679321535.0000000000A72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Orcus.exe PID: 7284, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, type: DROPPED
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeCode function: 1_2_059C0266 NtQuerySystemInformation,
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeCode function: 1_2_059C0235 NtQuerySystemInformation,
                    Source: C:\Users\user\Desktop\Orcus.exeFile created: C:\Windows\assembly\Desktop.iniJump to behavior
                    Source: Orcus.exe, 00000000.00000002.1688375736.000000000443E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll8 vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Plugins.dll< vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.dllB vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Plugins.dll< vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Plugins.dll< vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.dllB vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll8 vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Plugins.dll< vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.dllB vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1687145188.000000000122E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000000.1679321535.0000000000A72000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOrcus.Service.exe: vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOrcus.Shared.dllB vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll8 vs Orcus.exe
                    Source: Orcus.exe, 00000000.00000002.1689425162.0000000005A20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll8 vs Orcus.exe
                    Source: Orcus.exeBinary or memory string: OriginalFilenameOrcus.Service.exe: vs Orcus.exe
                    Source: Orcus.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Orcus.exe, type: SAMPLEMatched rule: MAL_BackNet_Nov18_1 date = 2018-11-02, hash1 = 4ce82644eaa1a00cdb6e2f363743553f2e4bd1eddb8bc84e45eda7c0699d9adc, author = Florian Roth, description = Detects BackNet samples, reference = https://github.com/valsov/BackNet
                    Source: Orcus.exe, type: SAMPLEMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
                    Source: Orcus.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.0.Orcus.exe.a91ef4.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_BackNet_Nov18_1 date = 2018-11-02, hash1 = 4ce82644eaa1a00cdb6e2f363743553f2e4bd1eddb8bc84e45eda7c0699d9adc, author = Florian Roth, description = Detects BackNet samples, reference = https://github.com/valsov/BackNet
                    Source: 0.0.Orcus.exe.a91ef4.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
                    Source: 0.0.Orcus.exe.a91ef4.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.0.Orcus.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: MAL_BackNet_Nov18_1 date = 2018-11-02, hash1 = 4ce82644eaa1a00cdb6e2f363743553f2e4bd1eddb8bc84e45eda7c0699d9adc, author = Florian Roth, description = Detects BackNet samples, reference = https://github.com/valsov/BackNet
                    Source: 0.0.Orcus.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
                    Source: 0.0.Orcus.exe.a70000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 00000000.00000000.1679321535.0000000000A72000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
                    Source: Process Memory Space: Orcus.exe PID: 7284, type: MEMORYSTRMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, type: DROPPEDMatched rule: MAL_BackNet_Nov18_1 date = 2018-11-02, hash1 = 4ce82644eaa1a00cdb6e2f363743553f2e4bd1eddb8bc84e45eda7c0699d9adc, author = Florian Roth, description = Detects BackNet samples, reference = https://github.com/valsov/BackNet
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, type: DROPPEDMatched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: Orcus.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: AudioDriver.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Orcus.exe, CoreFtp.csCryptographic APIs: 'TransformFinalBlock'
                    Source: Orcus.exe, AesHelper.csCryptographic APIs: 'CreateDecryptor'
                    Source: Orcus.exe, Settings.csBase64 encoded string: 'ZCPD0Hc7aSoNVK4ze3kAjKW04YjCoEDsiuaUQ7yEwcX2OlQGS8T85DDTByaWDnoh', 'ibX8GBpztbPH17b1z2OOz5F0WlyUe4hKqFLU6u3eyqBENpsQmr1Es8qIYriNcr/qCw1Hp6GUJW0XYq0ZNxoijg=='
                    Source: 0.2.Orcus.exe.437ee30.7.raw.unpack, KeyDatabase.csBase64 encoded string: 'LLRoXV86AlBeBo3gr4j5ksNz+rUdyxTAXD7SqpWJBBkxzSUyDEiVA+O9eBOsRNGM', 'OKwgx+ENIbgtqRVdHAQDNzVAljJosuOsQvegxi9iaRp8fU2QMtC33rhaMK+0L+ie', 'gx7soik3QiZs2ND2XzdSE75IEDI3Y20JdsJgP6hZpb9H41GxM/QlnbjCKXlj5K8P', 'uuesSDgbaTSX5NoGigaHLi/gX5RCdz9spyy0H8i6QxA20VrDqnlslUpGgdejo9sy', 'Uz7Q/c4M0rYzv5dXs8JL1z8vWgB1ZUqJm6fm5+wiveEOlA0/ScCnhhio22vyEs7G', 'OGKNd3DCifhKxKHVlfNnsriucooii76f7LVzTFbES8PKlDC0IlmtpjTlZAcmnPPj', 'X0CqsAN8xg8RLjduBT4HCyNGUhRlKEajE68/lRhcQLMyQi9KO93AmyZiDmge58hD', 'KzxkwLJWqc3A5NLwo/kqQyGjOHcNEtx1UfT/uLHBuAA59oAEuOBwJF1c+OkbBjwG', 'SvAd86CrtADibJP4DQi0J/VoqtdGTL1yNDhVoSMH+tIZi6OLgd+x7QXNQuz8erFO', 'XInNAzTkeNpo24AaPlUlT+Yz9NuB/kt1x031WByMVo+d9ftF9wS7WWBwIpH2+mxz', 'Qr/7AtbODKwRvK1+Zl4qJNVNplORdKbLvldxC8vDjbUcjK86qxHPaIokWi9HosYb', 'HRcYJIwZghvv/DHAHRj81a5v0kSmAoSZ+NB1q63ICxH57QAryYkmYvYw2F5oVzaz', 'v7mj41wpeahjU+PxfULc5x6EKMqktqzLg0Vj37hXr/MV/nPnu+dlru6ErMoF3o/J', 'wIx+ssCbqA6eFjol20RLaSA2HKHvBjTJic5dLMQBPdfjE5c646aV4gVtXpbdoFCx', 'uEIWQfHpHaUjgniOrw9ATEaDCCpvRR6uSCDZPN00dwHLWb+9pZJSkLkBUAiY5y4Q', 'Y5ytkJax0ay/eI3J6J/U4SbJ7cZmvZ0bffpcQjW+rwLOGpq4AtuBRZV7M3aBYE7F', 'XD1MIMwBM17D+Tmmi9LZ+DEhg2kZpxY1SmTyqv90lM+qgF+U5q5JXh05kqO8V170', 'JQafwmk8QA9GqijIahqYL/ISzOhmcUYXiNxQ80Pv6DI/cgq8Qd0E8BlZwd7X4f4C', 'pDRUjkDFFnKMacyoXf7IGPlDfOAYSGyjyOLWzK7Nmu3Id3TGR99dEQyC3g0b1Q0U', 'KacKd1h5i1mmRhJ5AlfVDXZMX77XCvO8AecWrLg9rZflhwBuLNeS7yxeygPaTMgl', 'UnNFCa+15bwu9haUERlOlwxpDI7DGKxz0vNDda3C6hf7n0muX/2YIDdOQqf8hfO2', 'KKppwnlOWmznL/8v6Fy1zVmdtGOw1hKaKtaOcgg1u9Ig8c6N4hhLMgYcGQqYrUJN', 'TnnQJTTI6Mcmi1/X3swqam0XaXWgTTvnkOShXaOcEztHPaB8f9z3T7cZPPEkBiyD', 'SAAuLX3l/wZJ1J3V0mFWqhzDVtMA2BhL8dZ4tV3ojemJdKFZUYbEJCBG8whhCYee', 'LjLuGByUVKa6V4KrQoDlHHpAHaqYI5P35/BcR4Z7kDClpGsL0dYG7E9meDfWnRju', 'hSXzzzybSgOYwDbkh0tbGHUB5fKieNOoULCZsPfPZ1EkMf3wmXzF2XPUPDdN5FVE', 'G5LGae6g7sOouwyMyendq4hFGTe9m94Riu8msKLXxUPHXeUb5BIH1ULNfn9d3ZGz', 'sHHZnz5a+F35s0VENqJXHtlEDvHubuN36y+3NOeiaXvZ7pgC8Y84Aw2wF5n0bbt8', 'swx0nHzDyVuHHezsYZW/+rS9z9IKBnVvUIOIdaH/buVZ+quH7D/vqj7MN9Oj6D4J', '/DEeR4iP4I2G2hA9DQCekUGFbswgwn0ra9eMmFwsfQOi48wYXrhl78yieJQRuwdw', 'GW+pdpbEzDWJ6kgB+lig+R1i5HSDZYaoFLITlPVvZHsi9QyU32rEdM6OFDJvq2Vk', 'VJJ4za8d9HFKohFmSpvhdiSb44JNd5GAnTsyFX2jT+J3couTiGBfDEYiVT1jtOEn', 'WD88YgwKQ7UXIbWksOUPn5b5X+X/K+7p8jJFq4Exd5pqRo1/1dcOOUo6BXyYG6Z8', 'wl0yMQGTnLTmIcVs4TkWLVTM7YgpbwecQt3KcxN1sIuJv8eZnlbvb0n51dsXpvdn', 'hPm4vV7aw7i1Ss7hRMfs8WLRGxK8OAaAn/B1wXEEc2VqvVs+BFf6A9YGGNCK8Dxg', 'Gt3emW4XxKDllLyO7RhB2toJlr5kmtVsx1hxZ7fH11o6OhuAJvwsh/KXEzKGZPBQ', 'hTv/t6X3gx6UAxgi4wRuHp9PIZXYFIClnIz2hQYePtA9aL2HX9GTpU32Yi8RDg1x', 'pVV0CEPKllCk03vZKSfB0v2Taee5xNRkG/aHQ1wnXMEpof9qrRFEYbiBAZgXTwIO', 'ypaZWoqA/XRWYHsn1+7cJuY5YYt0cRBBWiKEg5KzhsnSZ7DAkAtLBsFBhyvH44md', 'rsu+ut+M6pTxLOeN7WwAWoNDzk65Yg0D7p1sPZvqMbFTWY5JPAh7MHoGQZkzifyh', 'XDZe0kBvd0EiI69cJlPNsKholDNzrFurqlV/mJujo4EdKRmHkdGR6F4i30fRpZjU', 'VKr2j3gn2d+CobbgXvtCKl4UdcNPBl1lePlYYoGZhYCI97i+e7oc6UoHEARAEMY1', 'puCUoUYp24GLuB8TKygEAToyvRqQL9IaHPutAEDPbF0OsniEl+TCdJh2H1nz89Rf', '/su7PIEOzM1ch1yvca4Sl3vMMfquA9RIMrIRv3I2gw7+llVbcy/xU5iiTbhGjlh8', 'PetZ5Lw
                    Source: 0.2.Orcus.exe.432ee10.11.raw.unpack, KeyDatabase.csBase64 encoded string: 'LLRoXV86AlBeBo3gr4j5ksNz+rUdyxTAXD7SqpWJBBkxzSUyDEiVA+O9eBOsRNGM', 'OKwgx+ENIbgtqRVdHAQDNzVAljJosuOsQvegxi9iaRp8fU2QMtC33rhaMK+0L+ie', 'gx7soik3QiZs2ND2XzdSE75IEDI3Y20JdsJgP6hZpb9H41GxM/QlnbjCKXlj5K8P', 'uuesSDgbaTSX5NoGigaHLi/gX5RCdz9spyy0H8i6QxA20VrDqnlslUpGgdejo9sy', 'Uz7Q/c4M0rYzv5dXs8JL1z8vWgB1ZUqJm6fm5+wiveEOlA0/ScCnhhio22vyEs7G', 'OGKNd3DCifhKxKHVlfNnsriucooii76f7LVzTFbES8PKlDC0IlmtpjTlZAcmnPPj', 'X0CqsAN8xg8RLjduBT4HCyNGUhRlKEajE68/lRhcQLMyQi9KO93AmyZiDmge58hD', 'KzxkwLJWqc3A5NLwo/kqQyGjOHcNEtx1UfT/uLHBuAA59oAEuOBwJF1c+OkbBjwG', 'SvAd86CrtADibJP4DQi0J/VoqtdGTL1yNDhVoSMH+tIZi6OLgd+x7QXNQuz8erFO', 'XInNAzTkeNpo24AaPlUlT+Yz9NuB/kt1x031WByMVo+d9ftF9wS7WWBwIpH2+mxz', 'Qr/7AtbODKwRvK1+Zl4qJNVNplORdKbLvldxC8vDjbUcjK86qxHPaIokWi9HosYb', 'HRcYJIwZghvv/DHAHRj81a5v0kSmAoSZ+NB1q63ICxH57QAryYkmYvYw2F5oVzaz', 'v7mj41wpeahjU+PxfULc5x6EKMqktqzLg0Vj37hXr/MV/nPnu+dlru6ErMoF3o/J', 'wIx+ssCbqA6eFjol20RLaSA2HKHvBjTJic5dLMQBPdfjE5c646aV4gVtXpbdoFCx', 'uEIWQfHpHaUjgniOrw9ATEaDCCpvRR6uSCDZPN00dwHLWb+9pZJSkLkBUAiY5y4Q', 'Y5ytkJax0ay/eI3J6J/U4SbJ7cZmvZ0bffpcQjW+rwLOGpq4AtuBRZV7M3aBYE7F', 'XD1MIMwBM17D+Tmmi9LZ+DEhg2kZpxY1SmTyqv90lM+qgF+U5q5JXh05kqO8V170', 'JQafwmk8QA9GqijIahqYL/ISzOhmcUYXiNxQ80Pv6DI/cgq8Qd0E8BlZwd7X4f4C', 'pDRUjkDFFnKMacyoXf7IGPlDfOAYSGyjyOLWzK7Nmu3Id3TGR99dEQyC3g0b1Q0U', 'KacKd1h5i1mmRhJ5AlfVDXZMX77XCvO8AecWrLg9rZflhwBuLNeS7yxeygPaTMgl', 'UnNFCa+15bwu9haUERlOlwxpDI7DGKxz0vNDda3C6hf7n0muX/2YIDdOQqf8hfO2', 'KKppwnlOWmznL/8v6Fy1zVmdtGOw1hKaKtaOcgg1u9Ig8c6N4hhLMgYcGQqYrUJN', 'TnnQJTTI6Mcmi1/X3swqam0XaXWgTTvnkOShXaOcEztHPaB8f9z3T7cZPPEkBiyD', 'SAAuLX3l/wZJ1J3V0mFWqhzDVtMA2BhL8dZ4tV3ojemJdKFZUYbEJCBG8whhCYee', 'LjLuGByUVKa6V4KrQoDlHHpAHaqYI5P35/BcR4Z7kDClpGsL0dYG7E9meDfWnRju', 'hSXzzzybSgOYwDbkh0tbGHUB5fKieNOoULCZsPfPZ1EkMf3wmXzF2XPUPDdN5FVE', 'G5LGae6g7sOouwyMyendq4hFGTe9m94Riu8msKLXxUPHXeUb5BIH1ULNfn9d3ZGz', 'sHHZnz5a+F35s0VENqJXHtlEDvHubuN36y+3NOeiaXvZ7pgC8Y84Aw2wF5n0bbt8', 'swx0nHzDyVuHHezsYZW/+rS9z9IKBnVvUIOIdaH/buVZ+quH7D/vqj7MN9Oj6D4J', '/DEeR4iP4I2G2hA9DQCekUGFbswgwn0ra9eMmFwsfQOi48wYXrhl78yieJQRuwdw', 'GW+pdpbEzDWJ6kgB+lig+R1i5HSDZYaoFLITlPVvZHsi9QyU32rEdM6OFDJvq2Vk', 'VJJ4za8d9HFKohFmSpvhdiSb44JNd5GAnTsyFX2jT+J3couTiGBfDEYiVT1jtOEn', 'WD88YgwKQ7UXIbWksOUPn5b5X+X/K+7p8jJFq4Exd5pqRo1/1dcOOUo6BXyYG6Z8', 'wl0yMQGTnLTmIcVs4TkWLVTM7YgpbwecQt3KcxN1sIuJv8eZnlbvb0n51dsXpvdn', 'hPm4vV7aw7i1Ss7hRMfs8WLRGxK8OAaAn/B1wXEEc2VqvVs+BFf6A9YGGNCK8Dxg', 'Gt3emW4XxKDllLyO7RhB2toJlr5kmtVsx1hxZ7fH11o6OhuAJvwsh/KXEzKGZPBQ', 'hTv/t6X3gx6UAxgi4wRuHp9PIZXYFIClnIz2hQYePtA9aL2HX9GTpU32Yi8RDg1x', 'pVV0CEPKllCk03vZKSfB0v2Taee5xNRkG/aHQ1wnXMEpof9qrRFEYbiBAZgXTwIO', 'ypaZWoqA/XRWYHsn1+7cJuY5YYt0cRBBWiKEg5KzhsnSZ7DAkAtLBsFBhyvH44md', 'rsu+ut+M6pTxLOeN7WwAWoNDzk65Yg0D7p1sPZvqMbFTWY5JPAh7MHoGQZkzifyh', 'XDZe0kBvd0EiI69cJlPNsKholDNzrFurqlV/mJujo4EdKRmHkdGR6F4i30fRpZjU', 'VKr2j3gn2d+CobbgXvtCKl4UdcNPBl1lePlYYoGZhYCI97i+e7oc6UoHEARAEMY1', 'puCUoUYp24GLuB8TKygEAToyvRqQL9IaHPutAEDPbF0OsniEl+TCdJh2H1nz89Rf', '/su7PIEOzM1ch1yvca4Sl3vMMfquA9RIMrIRv3I2gw7+llVbcy/xU5iiTbhGjlh8', 'PetZ5Lw
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/4@1/1
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeCode function: 1_2_059C00EA AdjustTokenPrivileges,
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeCode function: 1_2_059C00B3 AdjustTokenPrivileges,
                    Source: C:\Users\user\Desktop\Orcus.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeMutant created: \Sessions\1\BaseNamedObjects\ZCPD0Hc7aSoNVK4ze3kAjKW04YjCoEDsiuaUQ7yEwcX2OlQGS8T85DDTByaWDnoh
                    Source: Orcus.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Orcus.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Orcus.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Orcus.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: Orcus.exeReversingLabs: Detection: 84%
                    Source: Orcus.exeVirustotal: Detection: 68%
                    Source: Orcus.exeString found in binary or memory: --install
                    Source: C:\Users\user\Desktop\Orcus.exeFile read: C:\Users\user\Desktop\Orcus.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Orcus.exe "C:\Users\user\Desktop\Orcus.exe"
                    Source: C:\Users\user\Desktop\Orcus.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe "C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"
                    Source: C:\Users\user\Desktop\Orcus.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe "C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: version.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: wldp.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: profapi.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: shfolder.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: ntmarta.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: propsys.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: edputil.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: netutils.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: slc.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: userenv.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: sppc.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\Desktop\Orcus.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: shfolder.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: security.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeSection loaded: schannel.dll
                    Source: C:\Users\user\Desktop\Orcus.exeFile written: C:\Windows\assembly\Desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Orcus.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                    Source: Orcus.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Orcus.exeStatic file information: File size 1108480 > 1048576
                    Source: C:\Users\user\Desktop\Orcus.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dll
                    Source: Orcus.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Orcus.Shared\obj\Release\Orcus.Shared.pdb|c source: Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdb source: AudioDriver.exe, 00000001.00000002.2924714015.0000000005AD0000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Orcus.Shared\obj\Release\Orcus.Shared.pdb source: Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\Visual Studio 2010\Projects\TaskService\obj\Release\Microsoft.Win32.TaskScheduler.pdb source: Orcus.exe, 00000000.00000002.1688375736.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689425162.0000000005A20000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdbL source: AudioDriver.exe, 00000001.00000002.2924714015.0000000005AD0000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\Visual Studio 2010\Projects\TaskService\obj\Release\Microsoft.Win32.TaskScheduler.pdbH source: Orcus.exe, 00000000.00000002.1688375736.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689425162.0000000005A20000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Features\Orcus.Service\obj\Release\Orcus.Service.pdb source: Orcus.exe, AudioDriver.exe.0.dr
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Features\Orcus.Service\obj\Release\Orcus.Service.pdbHfbf Tf_CorExeMainmscoree.dll source: Orcus.exe, AudioDriver.exe.0.dr
                    Source: Binary string: D:\Dokumente\Visual Studio 2015\Projects\Orcus\MainSource\Orcus.Plugins\obj\Release\Orcus.Plugins.pdb source: Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: Orcus.exe, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                    Source: Orcus.exe, CodeCommand.cs.Net Code: ProcessCommand
                    Source: Orcus.exe, PluginLoader.cs.Net Code: LoadPlugins System.Reflection.Assembly.Load(byte[])
                    Source: Orcus.exe, PluginLoader.cs.Net Code: LoadPlugin System.Reflection.Assembly.Load(byte[])
                    Source: Yara matchFile source: Process Memory Space: Orcus.exe PID: 7284, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeCode function: 1_2_013C24E1 push esp; ret
                    Source: Orcus.exeStatic PE information: section name: .text entropy: 7.604818383949422
                    Source: AudioDriver.exe.0.drStatic PE information: section name: .text entropy: 7.604818383949422
                    Source: C:\Users\user\Desktop\Orcus.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Orcus.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows LoadJump to behavior
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Orcus.exeMemory allocated: 1520000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Orcus.exeMemory allocated: 3300000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Orcus.exeMemory allocated: 1520000 memory commit | memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeMemory allocated: 1040000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeMemory allocated: 2ED0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeMemory allocated: 4ED0000 memory commit | memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Orcus.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeWindow / User API: threadDelayed 3591
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeWindow / User API: threadDelayed 6388
                    Source: C:\Users\user\Desktop\Orcus.exe TID: 7304Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe TID: 7380Thread sleep time: -4611686018427385s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe TID: 7388Thread sleep count: 3591 > 30
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe TID: 7388Thread sleep time: -1795500s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe TID: 7388Thread sleep count: 6388 > 30
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe TID: 7388Thread sleep time: -3194000s >= -30000s
                    Source: C:\Users\user\Desktop\Orcus.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeThread delayed: delay time: 922337203685477
                    Source: Orcus.exe, 00000000.00000002.1687145188.00000000012C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: Orcus.exe, AudioDriver.exe.0.drBinary or memory string: VirtualMachineDetector
                    Source: AudioDriver.exe.0.drBinary or memory string: VMware SVGA7VirtualBox Graphics Adapter3VM Additions S3 Trio32/64
                    Source: AudioDriver.exe.0.drBinary or memory string: IsOnVmWare
                    Source: AudioDriver.exe, 00000001.00000002.2921662864.00000000010EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: Orcus.exe, 00000000.00000002.1687145188.0000000001264000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}2
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\Orcus.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Orcus.exe, MozillaDecryptor.csReference to suspicious API methods: NativeMethods.LoadLibrary(GetMsvcrPath().FullName)
                    Source: Orcus.exe, MozillaDecryptor.csReference to suspicious API methods: ((NSS_InitPtr)Marshal.GetDelegateForFunctionPointer(NativeMethods.GetProcAddress(_nss3DllPtr, "NSS_Init"), typeof(NSS_InitPtr)))(_configDir)
                    Source: Orcus.exe, KeyProcessing.csReference to suspicious API methods: NativeMethods.MapVirtualKey(vkCode, 2u)
                    Source: C:\Users\user\Desktop\Orcus.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe "C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"
                    Source: Orcus.exe, AudioDriver.exe.0.drBinary or memory string: ProgMan
                    Source: Orcus.exe, AudioDriver.exe.0.drBinary or memory string: Shell_TrayWnd5The process does not exist
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Web.Extensions\3.5.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Web.Extensions\3.5.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Orcus.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: Orcus.exe, WindowsModules.cs.Net Code: SetTaskManager
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    Registry Run Keys / Startup Folder
                    1
                    Access Token Manipulation
                    11
                    Masquerading
                    OS Credential Dumping11
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    12
                    Process Injection
                    11
                    Disable or Modify Tools
                    LSASS Memory2
                    Process Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    31
                    Virtualization/Sandbox Evasion
                    Security Account Manager31
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    DLL Side-Loading
                    1
                    Access Token Manipulation
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                    Process Injection
                    LSA Secrets2
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Deobfuscate/Decode Files or Information
                    Cached Domain Credentials12
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Obfuscated Files or Information
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
                    Software Packing
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    DLL Side-Loading
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1458928 Sample: Orcus.exe Startdate: 18/06/2024 Architecture: WINDOWS Score: 100 21 18.31.95.13.in-addr.arpa 2->21 25 Malicious sample detected (through community Yara rule) 2->25 27 Antivirus / Scanner detection for submitted sample 2->27 29 Multi AV Scanner detection for submitted file 2->29 31 8 other signatures 2->31 7 Orcus.exe 1 10 2->7         started        signatures3 process4 file5 15 C:\Users\user\AppData\...\AudioDriver.exe, PE32 7->15 dropped 17 C:\Users\...\AudioDriver.exe:Zone.Identifier, ASCII 7->17 dropped 19 C:\Users\user\AppData\Local\...\Orcus.exe.log, ASCII 7->19 dropped 33 Creates an undocumented autostart registry key 7->33 11 AudioDriver.exe 4 7->11         started        signatures6 process7 dnsIp8 23 192.168.1.72, 10134, 49731, 49738 unknown unknown 11->23 35 Antivirus detection for dropped file 11->35 37 Multi AV Scanner detection for dropped file 11->37 39 Machine Learning detection for dropped file 11->39 signatures9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Orcus.exe84%ReversingLabsWin32.Trojan.Sorcurat
                    Orcus.exe69%VirustotalBrowse
                    Orcus.exe100%AviraHEUR/AGEN.1307306
                    Orcus.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe100%AviraHEUR/AGEN.1307306
                    C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe84%ReversingLabsWin32.Trojan.Sorcurat
                    C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe69%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    18.31.95.13.in-addr.arpa1%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
                    http://ocsp.thawte.com00%URL Reputationsafe
                    http://crl.startssl.com/sfsca.crl0f0%Avira URL Cloudsafe
                    http://speedtest.netcologne.de/test_100mb.binehttp://www.speedtestx.de/testfiles/data_100mb.testehtt0%Avira URL Cloudsafe
                    https://taskscheduler.codeplex.com/0%Avira URL Cloudsafe
                    https://taskscheduler.codeplex.com/0%VirustotalBrowse
                    http://mirror.internode.on.net/pub/test/100meg.test0%VirustotalBrowse
                    http://aia.startssl.com/certs/sca.code3.crt060%Avira URL Cloudsafe
                    http://mirror.internode.on.net/pub/test/100meg.test0%Avira URL Cloudsafe
                    http://speedtest.netcologne.de/test_100mb.binehttp://www.speedtestx.de/testfiles/data_100mb.testehtt0%VirustotalBrowse
                    http://aia.startssl.com/certs/ca.crt00%Avira URL Cloudsafe
                    http://crl.startssl.com/sca-code3.crl0#0%Avira URL Cloudsafe
                    https://taskscheduler.codeplex.com/F0%Avira URL Cloudsafe
                    http://aia.startssl.com/certs/sca.code3.crt060%VirustotalBrowse
                    http://www.startssl.com/0P0%Avira URL Cloudsafe
                    http://ocsp.startssl.com070%Avira URL Cloudsafe
                    http://go.microsoft.0%Avira URL Cloudsafe
                    http://aia.startssl.com/certs/ca.crt00%VirustotalBrowse
                    http://crl.startssl.com/sfsca.crl0f0%VirustotalBrowse
                    https://api.ipify.org/I(.0%Avira URL Cloudsafe
                    http://www.startssl.com/policy00%Avira URL Cloudsafe
                    https://taskscheduler.codeplex.com/F0%VirustotalBrowse
                    http://www.startssl.com/0P0%VirustotalBrowse
                    http://crl.startssl.com/sca-code3.crl0#0%VirustotalBrowse
                    http://ocsp.startssl.com000%Avira URL Cloudsafe
                    http://go.micros0%Avira URL Cloudsafe
                    http://go.microsoft.LinkId=421270%Avira URL Cloudsafe
                    https://api.ipify.org/I(.0%VirustotalBrowse
                    http://www.startssl.com/policy00%VirustotalBrowse
                    http://go.microsoft.0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    18.31.95.13.in-addr.arpa
                    unknown
                    unknownfalseunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://taskscheduler.codeplex.com/Orcus.exe, 00000000.00000002.1688375736.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689425162.0000000005A20000.00000004.08000000.00040000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://aia.startssl.com/certs/sca.code3.crt06Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.startssl.com/sfsca.crl0fOrcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://speedtest.netcologne.de/test_100mb.binehttp://www.speedtestx.de/testfiles/data_100mb.testehttOrcus.exe, AudioDriver.exe.0.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.thawte.com/ThawteTimestampingCA.crl0Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://mirror.internode.on.net/pub/test/100meg.testOrcus.exe, AudioDriver.exe.0.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://aia.startssl.com/certs/ca.crt0Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.startssl.com/sca-code3.crl0#Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://taskscheduler.codeplex.com/FOrcus.exe, 00000000.00000002.1688375736.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689425162.0000000005A20000.00000004.08000000.00040000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://ocsp.thawte.com0Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.startssl.com/0POrcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://ocsp.startssl.com07Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://go.microsoft.Orcus.exe, 00000000.00000002.1687145188.0000000001264000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.ipify.org/I(.Orcus.exe, AudioDriver.exe.0.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.startssl.com/policy0Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmp, AudioDriver.exe, 00000001.00000002.2923403799.0000000003F95000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://ocsp.startssl.com00Orcus.exe, 00000000.00000002.1688095271.000000000332A000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.0000000004301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688095271.000000000333F000.00000004.00000800.00020000.00000000.sdmp, Orcus.exe, 00000000.00000002.1687626223.0000000001670000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1689233490.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Orcus.exe, 00000000.00000002.1688375736.000000000437E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://go.microsoft.LinkId=42127Orcus.exe, 00000000.00000002.1687145188.0000000001264000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://go.microsOrcus.exe, 00000000.00000002.1687145188.000000000122E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    IPDomainCountryFlagASNASN NameMalicious
                    IP
                    192.168.1.72
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1458928
                    Start date and time:2024-06-18 16:21:08 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 51s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Orcus.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@3/4@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 98%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    10:22:22API Interceptor329431x Sleep call for process: AudioDriver.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Users\user\Desktop\Orcus.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):622
                    Entropy (8bit):5.203985387786025
                    Encrypted:false
                    SSDEEP:12:Q3LaJU2C9XAn10U26KxdWzKha0U29xtUz1B0U2uk71K6xhk70U2+Eb5iv:MLF2CpI326KIKhm29Iz52VM2+Z
                    MD5:3FEFBDAEEA2B3C0B1738C7C2C4208DAE
                    SHA1:EEF0612FB6E4EA572211089CDBBCC80B42E46861
                    SHA-256:D4EB6A636CC01004A0A74A4B34510B32F7F12B16BF780D155555336A93D11471
                    SHA-512:894F3FE2832936648838BBD155CEE8E470215D11225048DAC20F132BE73E2256827254C4DD677969A65941E911A94202E4EDB364D058A56B96B932355A9C97D6
                    Malicious:true
                    Reputation:low
                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Core\06983816e9e9c8e14e0c69f787b06c62\System.Core.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\74774597e319a738b792e6a6c06d3559\System.Xml.ni.dll",0..
                    Process:C:\Users\user\Desktop\Orcus.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):1108480
                    Entropy (8bit):7.513165271755696
                    Encrypted:false
                    SSDEEP:24576:vpS04YNEMuExDiU6E5R9s8xY/2l/dot1Ibt+re+mOl5MBZkGMe6zp:vL4auS+UjfU2TorIbt+rX/SkG76l
                    MD5:34CBA084037DF6B83CD8806623A9268E
                    SHA1:FBECA5C3CB6C934D2C12353D1157FCEE1B167327
                    SHA-256:ABC40D0EBF12534D037A38EE073FB546149999355C219A8B03BDB2B61564FED2
                    SHA-512:EC2B201486A4C651A907C2BFD70C06AA5A892EC6FE3A6CFFD7C1650D6E7B64EAD6891CAD53342A6CDAE9500722790486A8099F1BD2CA174243BE64C82E3A90CB
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: Joe Security
                    • Rule: JoeSecurity_OrcusRat, Description: Yara detected Orcus RAT, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    • Rule: MAL_BackNet_Nov18_1, Description: Detects BackNet samples, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: Florian Roth
                    • Rule: RAT_Orcus, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 84%
                    • Antivirus: Virustotal, Detection: 69%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....pf.............................2... ........@.. .......................@............@.................................t2..W....@....................... ....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc....... ......................@..B.................2......H.......t...................X............................................(....*..0..t........(.....(............s....(......}.....{...........s....o.....{...........s....o.....{....o....,...{....(....*.(....*.*..R........s....(....&*....0..R........o....o....o....o....t......{....r...p.o.....o.........(....o.....{....(....o....*....{....r+..po.....{....(....o....*..R........s....(....&*....(....*..0..S.......(....(,....rG..p(...... ....(....rO..p..(.......(.....s....%.o....(.
                    Process:C:\Users\user\Desktop\Orcus.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    Process:C:\Users\user\Desktop\Orcus.exe
                    File Type:Windows desktop.ini
                    Category:dropped
                    Size (bytes):227
                    Entropy (8bit):5.2735028737400205
                    Encrypted:false
                    SSDEEP:6:a1eZBXVNYTF0NwoScUbtSgyAXIWv7v5PMKq:UeZBFNYTswUq1r5zq
                    MD5:F7F759A5CD40BC52172E83486B6DE404
                    SHA1:D74930F354A56CFD03DC91AA96D8AE9657B1EE54
                    SHA-256:A709C2551B8818D7849D31A65446DC2F8C4CCA2DCBBC5385604286F49CFDAF1C
                    SHA-512:A50B7826BFE72506019E4B1148A214C71C6F4743C09E809EF15CD0E0223F3078B683D203200910B07B5E1E34B94F0FE516AC53527311E2943654BFCEADE53298
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:; ==++==..; ..; Copyright (c) Microsoft Corporation. All rights reserved...; ..; ==--==..[.ShellClassInfo]..CLSID={1D2680C9-0E2A-469d-B787-065558BC7D43}..ConfirmFileOp=1..InfoTip=Contains application stability information...
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.513165271755696
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:Orcus.exe
                    File size:1'108'480 bytes
                    MD5:34cba084037df6b83cd8806623a9268e
                    SHA1:fbeca5c3cb6c934d2c12353d1157fcee1b167327
                    SHA256:abc40d0ebf12534d037a38ee073fb546149999355c219a8b03bdb2b61564fed2
                    SHA512:ec2b201486a4c651a907c2bfd70c06aa5a892ec6fe3a6cffd7c1650d6e7b64ead6891cad53342a6cdae9500722790486a8099f1bd2ca174243be64c82e3a90cb
                    SSDEEP:24576:vpS04YNEMuExDiU6E5R9s8xY/2l/dot1Ibt+re+mOl5MBZkGMe6zp:vL4auS+UjfU2TorIbt+rX/SkG76l
                    TLSH:3435E1007FECCE16C2ED7678A4631CC50770EC57A996EB8E689465EE28BF311E134297
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....pf.............................2... ........@.. .......................@............@................................
                    Icon Hash:1f7d1cbc78713397
                    Entrypoint:0x4d32ce
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66708C86 [Mon Jun 17 19:20:38 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xd32740x57.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x3d200.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1120000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xd12d40xd14004a64de196396bacc618e512a368d7addFalse0.7790250242682198data7.604818383949422IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xd40000x3d2000x3d20089ce51e8069a405532a7c32fa431bdafFalse0.7157064800613497data6.95069786855404IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x1120000xc0x200be2ff49954173db36836ec47f2d4f30bFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xd42b00x150acPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0004176915579894
                    RT_ICON0xe935c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.5176416656808234
                    RT_ICON0xf9b840x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.5999316796300189
                    RT_ICON0x10302c0x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.6171441774491682
                    RT_ICON0x1084b40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.6087033538025508
                    RT_ICON0x10c6dc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.6643153526970954
                    RT_ICON0x10ec840x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.7012195121951219
                    RT_ICON0x10fd2c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.7594262295081967
                    RT_ICON0x1106b40x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.8235815602836879
                    RT_GROUP_ICON0x110b1c0x84Targa image data - Map 65536 x 20652 x 10.7045454545454546
                    RT_VERSION0x110ba00x308data0.4536082474226804
                    RT_MANIFEST0x110ea80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 18, 2024 16:22:01.452037096 CEST4973110134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:01.456888914 CEST1013449731192.168.1.72192.168.2.4
                    Jun 18, 2024 16:22:01.456974030 CEST4973110134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:01.474620104 CEST4973110134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:01.479443073 CEST1013449731192.168.1.72192.168.2.4
                    Jun 18, 2024 16:22:22.822170019 CEST1013449731192.168.1.72192.168.2.4
                    Jun 18, 2024 16:22:22.822246075 CEST4973110134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:23.080607891 CEST4973810134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:23.085598946 CEST1013449738192.168.1.72192.168.2.4
                    Jun 18, 2024 16:22:23.085675955 CEST4973810134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:23.087214947 CEST4973810134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:23.092057943 CEST1013449738192.168.1.72192.168.2.4
                    Jun 18, 2024 16:22:44.432159901 CEST1013449738192.168.1.72192.168.2.4
                    Jun 18, 2024 16:22:44.432301044 CEST4973810134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:44.546293020 CEST5419810134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:44.551625013 CEST1013454198192.168.1.72192.168.2.4
                    Jun 18, 2024 16:22:44.551726103 CEST5419810134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:44.552237988 CEST5419810134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:22:44.557291985 CEST1013454198192.168.1.72192.168.2.4
                    Jun 18, 2024 16:23:05.935681105 CEST1013454198192.168.1.72192.168.2.4
                    Jun 18, 2024 16:23:05.935861111 CEST5419810134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:06.061754942 CEST5419910134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:06.066787004 CEST1013454199192.168.1.72192.168.2.4
                    Jun 18, 2024 16:23:06.066941977 CEST5419910134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:06.067754030 CEST5419910134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:06.072988987 CEST1013454199192.168.1.72192.168.2.4
                    Jun 18, 2024 16:23:27.467794895 CEST1013454199192.168.1.72192.168.2.4
                    Jun 18, 2024 16:23:27.467896938 CEST5419910134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:27.585563898 CEST4973110134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:27.591290951 CEST5420010134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:27.596148014 CEST1013454200192.168.1.72192.168.2.4
                    Jun 18, 2024 16:23:27.596249104 CEST5420010134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:27.597182989 CEST5420010134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:27.603086948 CEST1013454200192.168.1.72192.168.2.4
                    Jun 18, 2024 16:23:48.965353012 CEST1013454200192.168.1.72192.168.2.4
                    Jun 18, 2024 16:23:48.965622902 CEST5420010134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:49.088608027 CEST5420110134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:49.094255924 CEST1013454201192.168.1.72192.168.2.4
                    Jun 18, 2024 16:23:49.094335079 CEST5420110134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:49.094763041 CEST5420110134192.168.2.4192.168.1.72
                    Jun 18, 2024 16:23:49.099960089 CEST1013454201192.168.1.72192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 18, 2024 16:22:35.995414019 CEST5354966162.159.36.2192.168.2.4
                    Jun 18, 2024 16:22:36.485363960 CEST5038453192.168.2.41.1.1.1
                    Jun 18, 2024 16:22:36.493103027 CEST53503841.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jun 18, 2024 16:22:36.485363960 CEST192.168.2.41.1.1.10xd525Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jun 18, 2024 16:22:36.493103027 CEST1.1.1.1192.168.2.40xd525Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                    Target ID:0
                    Start time:10:21:59
                    Start date:18/06/2024
                    Path:C:\Users\user\Desktop\Orcus.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Orcus.exe"
                    Imagebase:0xa70000
                    File size:1'108'480 bytes
                    MD5 hash:34CBA084037DF6B83CD8806623A9268E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_OrcusRat, Description: Yara detected Orcus RAT, Source: 00000000.00000000.1679321535.0000000000A72000.00000002.00000001.01000000.00000003.sdmp, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    • Rule: RAT_Orcus, Description: unknown, Source: 00000000.00000000.1679321535.0000000000A72000.00000002.00000001.01000000.00000003.sdmp, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:10:22:00
                    Start date:18/06/2024
                    Path:C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"
                    Imagebase:0x770000
                    File size:1'108'480 bytes
                    MD5 hash:34CBA084037DF6B83CD8806623A9268E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: Joe Security
                    • Rule: JoeSecurity_OrcusRat, Description: Yara detected Orcus RAT, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    • Rule: MAL_BackNet_Nov18_1, Description: Detects BackNet samples, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: Florian Roth
                    • Rule: RAT_Orcus, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam
                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\Microsoft\Speech\AudioDriver.exe, Author: ditekSHen
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 84%, ReversingLabs
                    • Detection: 69%, Virustotal, Browse
                    Reputation:low
                    Has exited:false

                    No disassembly