Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-05-2021 17:36
Behavioral task
behavioral1
Sample
658CB5F3BD26B13BB619C625501D7283.exe
Resource
win7v20210408
General
-
Target
658CB5F3BD26B13BB619C625501D7283.exe
-
Size
907KB
-
MD5
658cb5f3bd26b13bb619c625501d7283
-
SHA1
55ed61f7bd39147201a022ec3f83edfc8c58e002
-
SHA256
88f3320f4bcd533c568b9ba53205deb1b0e430c3c32a1dfa0bfded03851114a8
-
SHA512
d932c5b58120b466ae3451ececbb9fc323603d70b728294dce88e8b911c38dd65f0a81ec8fbba7f4c7dd2b9f9f3304de318a5297703e1d94204c89c3be55ad91
Malware Config
Extracted
orcus
People
4.tcp.ngrok.io:16788
55c8e5e3f5fe4794a3ef3a55735c66ad
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\MultiRunner\MultiRunner.exe
-
reconnect_delay
10000
-
registry_keyname
MutliRunner
-
taskscheduler_taskname
MultiRunner
-
watchdog_path
AppData\MultiHelper.exe
Signatures
-
Orcus Main Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe family_orcus C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe family_orcus -
Orcurs Rat Executable 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe orcus C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe orcus -
Executes dropped EXE 3 IoCs
Processes:
MultiRunner.exeMultiHelper.exeMultiHelper.exepid process 2476 MultiRunner.exe 3480 MultiHelper.exe 3228 MultiHelper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MultiRunner.exeMultiHelper.exepid process 2476 MultiRunner.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
MultiRunner.exeMultiHelper.exeMultiHelper.exedescription pid process Token: SeDebugPrivilege 2476 MultiRunner.exe Token: SeDebugPrivilege 3480 MultiHelper.exe Token: SeDebugPrivilege 3228 MultiHelper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MultiRunner.exepid process 2476 MultiRunner.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
658CB5F3BD26B13BB619C625501D7283.exeMultiRunner.exeMultiHelper.exedescription pid process target process PID 3864 wrote to memory of 2476 3864 658CB5F3BD26B13BB619C625501D7283.exe MultiRunner.exe PID 3864 wrote to memory of 2476 3864 658CB5F3BD26B13BB619C625501D7283.exe MultiRunner.exe PID 3864 wrote to memory of 2476 3864 658CB5F3BD26B13BB619C625501D7283.exe MultiRunner.exe PID 2476 wrote to memory of 3480 2476 MultiRunner.exe MultiHelper.exe PID 2476 wrote to memory of 3480 2476 MultiRunner.exe MultiHelper.exe PID 2476 wrote to memory of 3480 2476 MultiRunner.exe MultiHelper.exe PID 3480 wrote to memory of 3228 3480 MultiHelper.exe MultiHelper.exe PID 3480 wrote to memory of 3228 3480 MultiHelper.exe MultiHelper.exe PID 3480 wrote to memory of 3228 3480 MultiHelper.exe MultiHelper.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\658CB5F3BD26B13BB619C625501D7283.exe"C:\Users\Admin\AppData\Local\Temp\658CB5F3BD26B13BB619C625501D7283.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe"C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\MultiHelper.exe"C:\Users\Admin\AppData\Roaming\MultiHelper.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe" 2476 /protectFile3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Roaming\MultiHelper.exe"C:\Users\Admin\AppData\Roaming\MultiHelper.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe" 2476 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
MD5
913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
MD5
913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
MD5
913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
MD5
a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
MD5
658cb5f3bd26b13bb619c625501d7283
SHA155ed61f7bd39147201a022ec3f83edfc8c58e002
SHA25688f3320f4bcd533c568b9ba53205deb1b0e430c3c32a1dfa0bfded03851114a8
SHA512d932c5b58120b466ae3451ececbb9fc323603d70b728294dce88e8b911c38dd65f0a81ec8fbba7f4c7dd2b9f9f3304de318a5297703e1d94204c89c3be55ad91
-
MD5
658cb5f3bd26b13bb619c625501d7283
SHA155ed61f7bd39147201a022ec3f83edfc8c58e002
SHA25688f3320f4bcd533c568b9ba53205deb1b0e430c3c32a1dfa0bfded03851114a8
SHA512d932c5b58120b466ae3451ececbb9fc323603d70b728294dce88e8b911c38dd65f0a81ec8fbba7f4c7dd2b9f9f3304de318a5297703e1d94204c89c3be55ad91
-
MD5
a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad