Analysis
-
max time kernel
27s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-07-2021 15:12
Static task
static1
Behavioral task
behavioral1
Sample
52EE41A4329C6874DF19851AC928C8E8.exe
Resource
win7v20210410
General
-
Target
52EE41A4329C6874DF19851AC928C8E8.exe
-
Size
899KB
-
MD5
52ee41a4329c6874df19851ac928c8e8
-
SHA1
ba47b57ff5b0c6d02ea5a1b80e96cee5387b03de
-
SHA256
e7e7d51e82941b9eb56f82854e9682dc7a8593185ce6216082d5f795ceace582
-
SHA512
6f640819de2f407337578e047df76aadc23f2062c0a798a47a05bd6407b924f286f71cb4ef1c00b568223ac8e5c05afa39261cdcf86e8e913ff0e23096c201ac
Malware Config
Extracted
orcus
orcustop4ik.duckdns.org:6666
9280ed1ca561486e8b0282e7c4fcd77c
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%appdata%\Windows Defender\UnzipManager.exe
-
reconnect_delay
10000
-
registry_keyname
Unzipper
-
taskscheduler_taskname
Unzipper
-
watchdog_path
AppData\WindowsServer\svhost.exe
Signatures
-
Orcus Main Payload 5 IoCs
resource yara_rule behavioral2/files/0x000200000001ab0a-119.dat family_orcus behavioral2/files/0x000200000001ab0a-120.dat family_orcus behavioral2/files/0x000100000001ab13-148.dat family_orcus behavioral2/files/0x000100000001ab13-150.dat family_orcus behavioral2/files/0x000100000001ab13-161.dat family_orcus -
Orcurs Rat Executable 5 IoCs
resource yara_rule behavioral2/files/0x000200000001ab0a-119.dat orcus behavioral2/files/0x000200000001ab0a-120.dat orcus behavioral2/files/0x000100000001ab13-148.dat orcus behavioral2/files/0x000100000001ab13-150.dat orcus behavioral2/files/0x000100000001ab13-161.dat orcus -
Executes dropped EXE 5 IoCs
pid Process 2792 WinRarUnzipper.exe 2132 WindowsInput.exe 1676 WindowsInput.exe 3644 UnzipManager.exe 1588 UnzipManager.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation 52EE41A4329C6874DF19851AC928C8E8.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe WinRarUnzipper.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config WinRarUnzipper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance 52EE41A4329C6874DF19851AC928C8E8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3644 UnzipManager.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3644 UnzipManager.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3628 wrote to memory of 2792 3628 52EE41A4329C6874DF19851AC928C8E8.exe 75 PID 3628 wrote to memory of 2792 3628 52EE41A4329C6874DF19851AC928C8E8.exe 75 PID 3628 wrote to memory of 2792 3628 52EE41A4329C6874DF19851AC928C8E8.exe 75 PID 2792 wrote to memory of 2132 2792 WinRarUnzipper.exe 76 PID 2792 wrote to memory of 2132 2792 WinRarUnzipper.exe 76 PID 2792 wrote to memory of 3644 2792 WinRarUnzipper.exe 78 PID 2792 wrote to memory of 3644 2792 WinRarUnzipper.exe 78 PID 2792 wrote to memory of 3644 2792 WinRarUnzipper.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\52EE41A4329C6874DF19851AC928C8E8.exe"C:\Users\Admin\AppData\Local\Temp\52EE41A4329C6874DF19851AC928C8E8.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\Desktop\WinRarUnzipper.exe"C:\Users\Admin\Desktop\WinRarUnzipper.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2132
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender\UnzipManager.exe"C:\Users\Admin\AppData\Roaming\Windows Defender\UnzipManager.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3644
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:1676
-
C:\Users\Admin\AppData\Roaming\Windows Defender\UnzipManager.exe"C:\Users\Admin\AppData\Roaming\Windows Defender\UnzipManager.exe"1⤵
- Executes dropped EXE
PID:1588