Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
29-06-2021 07:12
Static task
static1
Behavioral task
behavioral1
Sample
25BE4FB3B1C478E02194503047AC838A.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
25BE4FB3B1C478E02194503047AC838A.exe
Resource
win10v20210410
General
-
Target
25BE4FB3B1C478E02194503047AC838A.exe
-
Size
911KB
-
MD5
25be4fb3b1c478e02194503047ac838a
-
SHA1
a4223aa801bae210d077ea9c30835bdd3a82aa22
-
SHA256
28506529f97de0d6a877427c102e62425f63c764dd2d55f4510dcc5d49335085
-
SHA512
67cf89cd1d3592044d878f4876a2f7a2a2e8412ec13c16b977b2ba8512cd94970c8058479e39c436691d1c95f3c795feb9ce464cbb4923bf8e12b74c03f71df6
Malware Config
Extracted
orcus
74.201.28.60:4296
Hysteria4
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe
-
reconnect_delay
10000
-
registry_keyname
Hysteria
-
taskscheduler_taskname
Hysteria
-
watchdog_path
AppData\WindowsUserApplicationData.exe
Signatures
-
Orcus Main Payload 3 IoCs
resource yara_rule behavioral2/files/0x000200000001ab66-123.dat family_orcus behavioral2/files/0x000200000001ab66-125.dat family_orcus behavioral2/files/0x000200000001ab66-134.dat family_orcus -
Orcurs Rat Executable 3 IoCs
resource yara_rule behavioral2/files/0x000200000001ab66-123.dat orcus behavioral2/files/0x000200000001ab66-125.dat orcus behavioral2/files/0x000200000001ab66-134.dat orcus -
Executes dropped EXE 4 IoCs
pid Process 3944 WindowsUserApplicationData.exe 3148 WindowsUserApplicationData.exe 3396 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe 25BE4FB3B1C478E02194503047AC838A.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe 25BE4FB3B1C478E02194503047AC838A.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe.config 25BE4FB3B1C478E02194503047AC838A.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hysteria = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\O\\WindowsUserApplicationData.exe\"" WindowsUserApplicationData.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3944 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe 3944 WindowsUserApplicationData.exe 3992 WindowsUserApplicationData.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3944 WindowsUserApplicationData.exe Token: SeDebugPrivilege 3396 WindowsUserApplicationData.exe Token: SeDebugPrivilege 3992 WindowsUserApplicationData.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3188 wrote to memory of 3944 3188 25BE4FB3B1C478E02194503047AC838A.exe 76 PID 3188 wrote to memory of 3944 3188 25BE4FB3B1C478E02194503047AC838A.exe 76 PID 3188 wrote to memory of 3944 3188 25BE4FB3B1C478E02194503047AC838A.exe 76 PID 3944 wrote to memory of 3396 3944 WindowsUserApplicationData.exe 78 PID 3944 wrote to memory of 3396 3944 WindowsUserApplicationData.exe 78 PID 3944 wrote to memory of 3396 3944 WindowsUserApplicationData.exe 78 PID 3396 wrote to memory of 3992 3396 WindowsUserApplicationData.exe 79 PID 3396 wrote to memory of 3992 3396 WindowsUserApplicationData.exe 79 PID 3396 wrote to memory of 3992 3396 WindowsUserApplicationData.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\25BE4FB3B1C478E02194503047AC838A.exe"C:\Users\Admin\AppData\Local\Temp\25BE4FB3B1C478E02194503047AC838A.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Roaming\WindowsUserApplicationData.exe"C:\Users\Admin\AppData\Roaming\WindowsUserApplicationData.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe" 39443⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Roaming\WindowsUserApplicationData.exe"C:\Users\Admin\AppData\Roaming\WindowsUserApplicationData.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe" 39444⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O\WindowsUserApplicationData.exe"1⤵
- Executes dropped EXE
PID:3148