Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-05-2021 17:36
Behavioral task
behavioral1
Sample
658CB5F3BD26B13BB619C625501D7283.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
658CB5F3BD26B13BB619C625501D7283.exe
-
Size
907KB
-
MD5
658cb5f3bd26b13bb619c625501d7283
-
SHA1
55ed61f7bd39147201a022ec3f83edfc8c58e002
-
SHA256
88f3320f4bcd533c568b9ba53205deb1b0e430c3c32a1dfa0bfded03851114a8
-
SHA512
d932c5b58120b466ae3451ececbb9fc323603d70b728294dce88e8b911c38dd65f0a81ec8fbba7f4c7dd2b9f9f3304de318a5297703e1d94204c89c3be55ad91
Malware Config
Extracted
Family
orcus
Botnet
People
C2
4.tcp.ngrok.io:16788
Mutex
55c8e5e3f5fe4794a3ef3a55735c66ad
Attributes
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\MultiRunner\MultiRunner.exe
-
reconnect_delay
10000
-
registry_keyname
MutliRunner
-
taskscheduler_taskname
MultiRunner
-
watchdog_path
AppData\MultiHelper.exe
Signatures
-
Orcus Main Payload 3 IoCs
resource yara_rule behavioral1/files/0x00050000000130cd-65.dat family_orcus behavioral1/files/0x00050000000130cd-67.dat family_orcus behavioral1/files/0x00050000000130cd-69.dat family_orcus -
Orcurs Rat Executable 3 IoCs
resource yara_rule behavioral1/files/0x00050000000130cd-65.dat orcus behavioral1/files/0x00050000000130cd-67.dat orcus behavioral1/files/0x00050000000130cd-69.dat orcus -
Executes dropped EXE 3 IoCs
pid Process 1528 MultiRunner.exe 1000 MultiHelper.exe 944 MultiHelper.exe -
Loads dropped DLL 2 IoCs
pid Process 1820 658CB5F3BD26B13BB619C625501D7283.exe 1528 MultiRunner.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 944 MultiHelper.exe 944 MultiHelper.exe 1528 MultiRunner.exe 1528 MultiRunner.exe 944 MultiHelper.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe 1528 MultiRunner.exe 944 MultiHelper.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1528 MultiRunner.exe Token: SeDebugPrivilege 1000 MultiHelper.exe Token: SeDebugPrivilege 944 MultiHelper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1528 MultiRunner.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1528 1820 658CB5F3BD26B13BB619C625501D7283.exe 29 PID 1820 wrote to memory of 1528 1820 658CB5F3BD26B13BB619C625501D7283.exe 29 PID 1820 wrote to memory of 1528 1820 658CB5F3BD26B13BB619C625501D7283.exe 29 PID 1820 wrote to memory of 1528 1820 658CB5F3BD26B13BB619C625501D7283.exe 29 PID 1528 wrote to memory of 1000 1528 MultiRunner.exe 30 PID 1528 wrote to memory of 1000 1528 MultiRunner.exe 30 PID 1528 wrote to memory of 1000 1528 MultiRunner.exe 30 PID 1528 wrote to memory of 1000 1528 MultiRunner.exe 30 PID 1000 wrote to memory of 944 1000 MultiHelper.exe 31 PID 1000 wrote to memory of 944 1000 MultiHelper.exe 31 PID 1000 wrote to memory of 944 1000 MultiHelper.exe 31 PID 1000 wrote to memory of 944 1000 MultiHelper.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\658CB5F3BD26B13BB619C625501D7283.exe"C:\Users\Admin\AppData\Local\Temp\658CB5F3BD26B13BB619C625501D7283.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe"C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Roaming\MultiHelper.exe"C:\Users\Admin\AppData\Roaming\MultiHelper.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe" 1528 /protectFile3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Roaming\MultiHelper.exe"C:\Users\Admin\AppData\Roaming\MultiHelper.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe" 1528 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
-