Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-05-2021 17:36
Behavioral task
behavioral1
Sample
658CB5F3BD26B13BB619C625501D7283.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
658CB5F3BD26B13BB619C625501D7283.exe
-
Size
907KB
-
MD5
658cb5f3bd26b13bb619c625501d7283
-
SHA1
55ed61f7bd39147201a022ec3f83edfc8c58e002
-
SHA256
88f3320f4bcd533c568b9ba53205deb1b0e430c3c32a1dfa0bfded03851114a8
-
SHA512
d932c5b58120b466ae3451ececbb9fc323603d70b728294dce88e8b911c38dd65f0a81ec8fbba7f4c7dd2b9f9f3304de318a5297703e1d94204c89c3be55ad91
Malware Config
Extracted
Family
orcus
Botnet
People
C2
4.tcp.ngrok.io:16788
Mutex
55c8e5e3f5fe4794a3ef3a55735c66ad
Attributes
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\MultiRunner\MultiRunner.exe
-
reconnect_delay
10000
-
registry_keyname
MutliRunner
-
taskscheduler_taskname
MultiRunner
-
watchdog_path
AppData\MultiHelper.exe
Signatures
-
Orcus Main Payload 2 IoCs
resource yara_rule behavioral2/files/0x000200000001ab54-123.dat family_orcus behavioral2/files/0x000200000001ab54-125.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/files/0x000200000001ab54-123.dat orcus behavioral2/files/0x000200000001ab54-125.dat orcus -
Executes dropped EXE 3 IoCs
pid Process 2476 MultiRunner.exe 3480 MultiHelper.exe 3228 MultiHelper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2476 MultiRunner.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 2476 MultiRunner.exe 3228 MultiHelper.exe 2476 MultiRunner.exe 3228 MultiHelper.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2476 MultiRunner.exe Token: SeDebugPrivilege 3480 MultiHelper.exe Token: SeDebugPrivilege 3228 MultiHelper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2476 MultiRunner.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3864 wrote to memory of 2476 3864 658CB5F3BD26B13BB619C625501D7283.exe 75 PID 3864 wrote to memory of 2476 3864 658CB5F3BD26B13BB619C625501D7283.exe 75 PID 3864 wrote to memory of 2476 3864 658CB5F3BD26B13BB619C625501D7283.exe 75 PID 2476 wrote to memory of 3480 2476 MultiRunner.exe 76 PID 2476 wrote to memory of 3480 2476 MultiRunner.exe 76 PID 2476 wrote to memory of 3480 2476 MultiRunner.exe 76 PID 3480 wrote to memory of 3228 3480 MultiHelper.exe 77 PID 3480 wrote to memory of 3228 3480 MultiHelper.exe 77 PID 3480 wrote to memory of 3228 3480 MultiHelper.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\658CB5F3BD26B13BB619C625501D7283.exe"C:\Users\Admin\AppData\Local\Temp\658CB5F3BD26B13BB619C625501D7283.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe"C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\MultiHelper.exe"C:\Users\Admin\AppData\Roaming\MultiHelper.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe" 2476 /protectFile3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Roaming\MultiHelper.exe"C:\Users\Admin\AppData\Roaming\MultiHelper.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\MultiRunner\MultiRunner.exe" 2476 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
-