Analysis
-
max time kernel
159s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
08-04-2022 08:54
Behavioral task
behavioral1
Sample
ac8be183acf3079cd5475f8c170a98ae.exe
Resource
win7-20220331-en
General
-
Target
ac8be183acf3079cd5475f8c170a98ae.exe
-
Size
2.9MB
-
MD5
ac8be183acf3079cd5475f8c170a98ae
-
SHA1
4eab4aba5e2888496a267f2e755c5fbd29a5c25d
-
SHA256
c7ad74775251731d6ffc24878658341b5a3b3398a5480ab113f80af42eda32c3
-
SHA512
d3c80ff0ee04ecf898a0951433bf4e1dba25a214f4b1d902bc8e0a79a1b08bacc6813cd30c40a7a3f6cd10312b49850475f61f2f33886ad2797f25c37cfa54f3
Malware Config
Extracted
orcus
old
tools.3utilities.com:17650
3e72d23ec7f64b6aab470ad129f9a745
-
autostart_method
TaskScheduler
-
enable_keylogger
false
-
install_path
%programfiles%\vcredist\vcredistapp.exe
-
reconnect_delay
10000
-
registry_keyname
vcredistappreg
-
taskscheduler_taskname
vcredistappsch
-
watchdog_path
Temp\vcredistapp.exe
Extracted
44caliber
https://discord.com/api/webhooks/959366883545579581/Z1Be8qUrtXUbCZydkDEnV1VMcMYEDqpAE1fFmNhN26L5vd4nrcJOGi-iQnD-msZc-BJX
Signatures
-
Orcurs Rat Executable 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4284-124-0x0000000000D10000-0x0000000001004000-memory.dmp orcus -
Executes dropped EXE 1 IoCs
Processes:
libchrome.exepid process 4216 libchrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ac8be183acf3079cd5475f8c170a98ae.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1082102374-1487407228-1886994731-1000\Control Panel\International\Geo\Nation ac8be183acf3079cd5475f8c170a98ae.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 141 freegeoip.app 142 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
libchrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier libchrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 libchrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
libchrome.exepid process 4216 libchrome.exe 4216 libchrome.exe 4216 libchrome.exe 4216 libchrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ac8be183acf3079cd5475f8c170a98ae.exelibchrome.exedescription pid process Token: SeDebugPrivilege 4284 ac8be183acf3079cd5475f8c170a98ae.exe Token: SeDebugPrivilege 4216 libchrome.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
ac8be183acf3079cd5475f8c170a98ae.exedescription pid process target process PID 4284 wrote to memory of 4216 4284 ac8be183acf3079cd5475f8c170a98ae.exe libchrome.exe PID 4284 wrote to memory of 4216 4284 ac8be183acf3079cd5475f8c170a98ae.exe libchrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac8be183acf3079cd5475f8c170a98ae.exe"C:\Users\Admin\AppData\Local\Temp\ac8be183acf3079cd5475f8c170a98ae.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\libchrome.exe"C:\Users\Admin\AppData\Local\Temp\libchrome.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5f0a6137751223c932f77f1807ad0805e
SHA1af5befc8e36c8c062ef96ad57e8e1a1f39a2f675
SHA2562105779b2f3e3f454cea059d25484b9ef423a0318abc7c8cbe04289e393e8697
SHA512c4096757420b11bc3748522202efb0d8ee1ecd09e7b773505a96124a339e40951533432d02dfbc929380f8a15160ed2911018dee56b2af7db4d6d9222e4dee4a
-
Filesize
274KB
MD5f0a6137751223c932f77f1807ad0805e
SHA1af5befc8e36c8c062ef96ad57e8e1a1f39a2f675
SHA2562105779b2f3e3f454cea059d25484b9ef423a0318abc7c8cbe04289e393e8697
SHA512c4096757420b11bc3748522202efb0d8ee1ecd09e7b773505a96124a339e40951533432d02dfbc929380f8a15160ed2911018dee56b2af7db4d6d9222e4dee4a