Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-05-2021 17:37
Static task
static1
Behavioral task
behavioral1
Sample
f6d66119_extracted.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
f6d66119_extracted.exe
Resource
win10v20210408
General
-
Target
f6d66119_extracted.exe
-
Size
953KB
-
MD5
7c0515a40b439d120deb649fb8ccafe3
-
SHA1
c081cb8c417f69a8675f9c90b5cc6778d770d8a7
-
SHA256
3f25bc78db5f00c85bbd8662838858fa12989976b7be9c70aa6f68fe92c78a53
-
SHA512
12f160d3162f5fa8a62e972630e0e9c17385e7ab4a8760a8680f20a89f3acc64c1baff8a68b5a7b8e8f7785b72cac3ae7254bb1b223aacbe413a5e5a65455f41
Malware Config
Extracted
orcus
Start - Steam
185.217.1.185:911
a36e4add169c442b882f8f0c5cb7e8cf
-
autostart_method
TaskScheduler
-
enable_keylogger
false
-
install_path
%programdata%\Steam\Steam Client.exe
-
reconnect_delay
6600
-
registry_keyname
Steam Webhelper Standalone
-
taskscheduler_taskname
Steam Client WebHelper
-
watchdog_path
Temp\Steam Client WebHelper.exe
Signatures
-
Orcus Main Payload 3 IoCs
resource yara_rule behavioral2/files/0x000300000001ab56-124.dat family_orcus behavioral2/files/0x000300000001ab56-126.dat family_orcus behavioral2/files/0x000300000001ab56-135.dat family_orcus -
Orcurs Rat Executable 3 IoCs
resource yara_rule behavioral2/files/0x000300000001ab56-124.dat orcus behavioral2/files/0x000300000001ab56-126.dat orcus behavioral2/files/0x000300000001ab56-135.dat orcus -
Executes dropped EXE 4 IoCs
pid Process 4268 Steam Client.exe 3476 Steam Client.exe 492 Steam Client WebHelper.exe 1004 Steam Client WebHelper.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini f6d66119_extracted.exe File opened for modification C:\Windows\assembly\Desktop.ini f6d66119_extracted.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly f6d66119_extracted.exe File created C:\Windows\assembly\Desktop.ini f6d66119_extracted.exe File opened for modification C:\Windows\assembly\Desktop.ini f6d66119_extracted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1004 Steam Client WebHelper.exe 1004 Steam Client WebHelper.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 4268 Steam Client.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe 1004 Steam Client WebHelper.exe 4268 Steam Client.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4268 Steam Client.exe Token: SeDebugPrivilege 492 Steam Client WebHelper.exe Token: SeDebugPrivilege 1004 Steam Client WebHelper.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4652 wrote to memory of 3036 4652 f6d66119_extracted.exe 75 PID 4652 wrote to memory of 3036 4652 f6d66119_extracted.exe 75 PID 3036 wrote to memory of 2204 3036 csc.exe 77 PID 3036 wrote to memory of 2204 3036 csc.exe 77 PID 4652 wrote to memory of 4268 4652 f6d66119_extracted.exe 78 PID 4652 wrote to memory of 4268 4652 f6d66119_extracted.exe 78 PID 4268 wrote to memory of 492 4268 Steam Client.exe 80 PID 4268 wrote to memory of 492 4268 Steam Client.exe 80 PID 4268 wrote to memory of 492 4268 Steam Client.exe 80 PID 492 wrote to memory of 1004 492 Steam Client WebHelper.exe 81 PID 492 wrote to memory of 1004 492 Steam Client WebHelper.exe 81 PID 492 wrote to memory of 1004 492 Steam Client WebHelper.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6d66119_extracted.exe"C:\Users\Admin\AppData\Local\Temp\f6d66119_extracted.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\y-p2yf_o.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB973.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB972.tmp"3⤵PID:2204
-
-
-
C:\ProgramData\Steam\Steam Client.exe"C:\ProgramData\Steam\Steam Client.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\Steam Client WebHelper.exe"C:\Users\Admin\AppData\Local\Temp\Steam Client WebHelper.exe" /launchSelfAndExit "C:\ProgramData\Steam\Steam Client.exe" 4268 /protectFile3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\Steam Client WebHelper.exe"C:\Users\Admin\AppData\Local\Temp\Steam Client WebHelper.exe" /watchProcess "C:\ProgramData\Steam\Steam Client.exe" 4268 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
-
-
C:\ProgramData\Steam\Steam Client.exe"C:\ProgramData\Steam\Steam Client.exe"1⤵
- Executes dropped EXE
PID:3476