Analysis

  • max time kernel
    27s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    31-07-2021 09:03

General

  • Target

    BDCA302A43DFD30F874CE13B2A20F4211E7BD88EBA40A.exe

  • Size

    789KB

  • MD5

    75e95a530e5fe926bcca7c2c1a008e18

  • SHA1

    ff759b9abdd18c05b51509f92146a801f3fae939

  • SHA256

    bdca302a43dfd30f874ce13b2a20f4211e7bd88eba40a0c41f30873389133d3d

  • SHA512

    ad2cc5878b248cda26e5464dea496ea67ddd9bdf120c56dceee2581a167ae0771d19b68c19b62f4c487d045b0680c7d3892ba8aa99023e93b6391ea8d49821da

Malware Config

Extracted

Family

orcus

Botnet

$

C2

lsdw.dyndns.org:10134

Mutex

bad69595827c48b5b9b2ea99aaff68b6

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • UAC bypass 3 TTPs
  • Orcurs Rat Executable 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BDCA302A43DFD30F874CE13B2A20F4211E7BD88EBA40A.exe
    "C:\Users\Admin\AppData\Local\Temp\BDCA302A43DFD30F874CE13B2A20F4211E7BD88EBA40A.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Users\Admin\Videos\show\mydoc.exe
        "C:\Users\Admin\Videos\show\mydoc.exe"
        3⤵
        • Checks whether UAC is enabled
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2268
        • C:\Windows\SysWOW64\cmd.exe
          "cmd"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks.exe /Delete /TN "Update\doc" /F
            5⤵
              PID:208
          • C:\Windows\SysWOW64\cmd.exe
            "cmd"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3468
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks.exe /Create /TN "Update\doc" /XML "C:\Users\Admin\AppData\Local\Temp\2029615973.xml"
              5⤵
              • Creates scheduled task(s)
              PID:1448

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Bypass User Account Control

    1
    T1088

    Scheduled Task

    1
    T1053

    Defense Evasion

    Bypass User Account Control

    1
    T1088

    Disabling Security Tools

    1
    T1089

    Modify Registry

    2
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2029615973.xml
      MD5

      fdd69428aa77b311dc8a1f6c375514ad

      SHA1

      4a36e515b36a24251dd1efe42686c64d553a9542

      SHA256

      6b4c638ca3ff660e43475a387ca57358e6b023b202c9c5e9b6cc15e180b988cf

      SHA512

      be738cc2b1e03d1963ef2333aa49c69aad6c5c1872b267970a47a1201132f22b04b8f5e9734afdfac192615a52fd5c6950061ad88c565610911f5b098c5fc604

    • memory/208-132-0x0000000000000000-mapping.dmp
    • memory/808-116-0x0000000004F90000-0x0000000004F91000-memory.dmp
      Filesize

      4KB

    • memory/808-117-0x0000000005530000-0x0000000005531000-memory.dmp
      Filesize

      4KB

    • memory/808-118-0x0000000005220000-0x00000000052CC000-memory.dmp
      Filesize

      688KB

    • memory/808-119-0x0000000005400000-0x00000000054B1000-memory.dmp
      Filesize

      708KB

    • memory/808-120-0x0000000005030000-0x000000000552E000-memory.dmp
      Filesize

      5.0MB

    • memory/808-121-0x00000000028D0000-0x00000000028D4000-memory.dmp
      Filesize

      16KB

    • memory/808-114-0x00000000006E0000-0x00000000006E1000-memory.dmp
      Filesize

      4KB

    • memory/1448-134-0x0000000000000000-mapping.dmp
    • memory/2268-143-0x0000000006120000-0x0000000006121000-memory.dmp
      Filesize

      4KB

    • memory/2268-141-0x0000000005D80000-0x0000000005D90000-memory.dmp
      Filesize

      64KB

    • memory/2268-151-0x0000000007360000-0x0000000007361000-memory.dmp
      Filesize

      4KB

    • memory/2268-123-0x0000000000000000-mapping.dmp
    • memory/2268-136-0x00000000055A0000-0x0000000005682000-memory.dmp
      Filesize

      904KB

    • memory/2268-137-0x0000000004B90000-0x0000000004B9C000-memory.dmp
      Filesize

      48KB

    • memory/2268-138-0x0000000004AA0000-0x0000000004F9E000-memory.dmp
      Filesize

      5.0MB

    • memory/2268-139-0x0000000005790000-0x00000000057EA000-memory.dmp
      Filesize

      360KB

    • memory/2268-140-0x0000000005890000-0x0000000005891000-memory.dmp
      Filesize

      4KB

    • memory/2268-150-0x0000000004C60000-0x0000000004C61000-memory.dmp
      Filesize

      4KB

    • memory/2268-142-0x0000000005D90000-0x0000000005DA5000-memory.dmp
      Filesize

      84KB

    • memory/2268-149-0x0000000006440000-0x0000000006441000-memory.dmp
      Filesize

      4KB

    • memory/2268-144-0x0000000005F20000-0x0000000005F2C000-memory.dmp
      Filesize

      48KB

    • memory/2268-145-0x00000000062F0000-0x00000000062F1000-memory.dmp
      Filesize

      4KB

    • memory/2268-146-0x00000000071E0000-0x00000000071E1000-memory.dmp
      Filesize

      4KB

    • memory/2268-147-0x0000000007D00000-0x0000000007D01000-memory.dmp
      Filesize

      4KB

    • memory/2268-148-0x0000000004C40000-0x0000000004C41000-memory.dmp
      Filesize

      4KB

    • memory/2640-131-0x0000000000000000-mapping.dmp
    • memory/3468-133-0x0000000000000000-mapping.dmp
    • memory/3736-122-0x0000000000000000-mapping.dmp