Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
29-06-2021 07:12
Static task
static1
Behavioral task
behavioral1
Sample
25BE4FB3B1C478E02194503047AC838A.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
25BE4FB3B1C478E02194503047AC838A.exe
Resource
win10v20210410
General
-
Target
25BE4FB3B1C478E02194503047AC838A.exe
-
Size
911KB
-
MD5
25be4fb3b1c478e02194503047ac838a
-
SHA1
a4223aa801bae210d077ea9c30835bdd3a82aa22
-
SHA256
28506529f97de0d6a877427c102e62425f63c764dd2d55f4510dcc5d49335085
-
SHA512
67cf89cd1d3592044d878f4876a2f7a2a2e8412ec13c16b977b2ba8512cd94970c8058479e39c436691d1c95f3c795feb9ce464cbb4923bf8e12b74c03f71df6
Malware Config
Extracted
orcus
74.201.28.60:4296
Hysteria4
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe
-
reconnect_delay
10000
-
registry_keyname
Hysteria
-
taskscheduler_taskname
Hysteria
-
watchdog_path
AppData\WindowsUserApplicationData.exe
Signatures
-
Orcus Main Payload 4 IoCs
resource yara_rule behavioral1/files/0x00040000000130cc-65.dat family_orcus behavioral1/files/0x00040000000130cc-67.dat family_orcus behavioral1/files/0x00040000000130cc-69.dat family_orcus behavioral1/files/0x00040000000130cc-93.dat family_orcus -
Orcurs Rat Executable 4 IoCs
resource yara_rule behavioral1/files/0x00040000000130cc-65.dat orcus behavioral1/files/0x00040000000130cc-67.dat orcus behavioral1/files/0x00040000000130cc-69.dat orcus behavioral1/files/0x00040000000130cc-93.dat orcus -
Executes dropped EXE 4 IoCs
pid Process 520 WindowsUserApplicationData.exe 1652 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 108 WindowsUserApplicationData.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe.config 25BE4FB3B1C478E02194503047AC838A.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe 25BE4FB3B1C478E02194503047AC838A.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe 25BE4FB3B1C478E02194503047AC838A.exe -
Loads dropped DLL 3 IoCs
pid Process 940 25BE4FB3B1C478E02194503047AC838A.exe 520 WindowsUserApplicationData.exe 1652 WindowsUserApplicationData.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hysteria = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\O\\WindowsUserApplicationData.exe\"" WindowsUserApplicationData.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe 1264 WindowsUserApplicationData.exe 520 WindowsUserApplicationData.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 520 WindowsUserApplicationData.exe Token: SeDebugPrivilege 1652 WindowsUserApplicationData.exe Token: SeDebugPrivilege 1264 WindowsUserApplicationData.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 940 wrote to memory of 520 940 25BE4FB3B1C478E02194503047AC838A.exe 26 PID 940 wrote to memory of 520 940 25BE4FB3B1C478E02194503047AC838A.exe 26 PID 940 wrote to memory of 520 940 25BE4FB3B1C478E02194503047AC838A.exe 26 PID 940 wrote to memory of 520 940 25BE4FB3B1C478E02194503047AC838A.exe 26 PID 520 wrote to memory of 1652 520 WindowsUserApplicationData.exe 27 PID 520 wrote to memory of 1652 520 WindowsUserApplicationData.exe 27 PID 520 wrote to memory of 1652 520 WindowsUserApplicationData.exe 27 PID 520 wrote to memory of 1652 520 WindowsUserApplicationData.exe 27 PID 1652 wrote to memory of 1264 1652 WindowsUserApplicationData.exe 28 PID 1652 wrote to memory of 1264 1652 WindowsUserApplicationData.exe 28 PID 1652 wrote to memory of 1264 1652 WindowsUserApplicationData.exe 28 PID 1652 wrote to memory of 1264 1652 WindowsUserApplicationData.exe 28 PID 1740 wrote to memory of 108 1740 taskeng.exe 32 PID 1740 wrote to memory of 108 1740 taskeng.exe 32 PID 1740 wrote to memory of 108 1740 taskeng.exe 32 PID 1740 wrote to memory of 108 1740 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\25BE4FB3B1C478E02194503047AC838A.exe"C:\Users\Admin\AppData\Local\Temp\25BE4FB3B1C478E02194503047AC838A.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Roaming\WindowsUserApplicationData.exe"C:\Users\Admin\AppData\Roaming\WindowsUserApplicationData.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe" 5203⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\WindowsUserApplicationData.exe"C:\Users\Admin\AppData\Roaming\WindowsUserApplicationData.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe" 5204⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FB6D90E3-DDE4-4D9E-BB1E-067E18F6E4BE} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe"2⤵
- Executes dropped EXE
PID:108
-