Analysis

  • max time kernel
    151s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 23:51

General

  • Target

    c4d9d25dedcb02acf6eae98dec3fae4e53585ef8486d755f2b77740dd7ba7797.exe

  • Size

    2.8MB

  • MD5

    f7a46b53afa7814e739d59fcdbd527fc

  • SHA1

    b1d3158156a63d3981c3d49c33bb94ef899611d6

  • SHA256

    c4d9d25dedcb02acf6eae98dec3fae4e53585ef8486d755f2b77740dd7ba7797

  • SHA512

    0bb5d13d55fd27f1feb8c055118ba43fa0a611a2512abafbaceba0d2d3c0e5e9a45520d2f8093070589df422721f568fcc6b59fc2c994288ab5d2ec898b6b5da

Malware Config

Extracted

Family

orcus

C2

18.221.17.220:1604

Mutex

1141a9276f324b1f8a2d4f8f2fec0ac5

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %temp%\drivers\ac2ftsdgj8m5ms5.exe

  • reconnect_delay

    10000

  • registry_keyname

    steam

  • taskscheduler_taskname

    steam

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus Main Payload 2 IoCs
  • Orcurs Rat Executable 4 IoCs
  • Executes dropped EXE 8 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4d9d25dedcb02acf6eae98dec3fae4e53585ef8486d755f2b77740dd7ba7797.exe
    "C:\Users\Admin\AppData\Local\Temp\c4d9d25dedcb02acf6eae98dec3fae4e53585ef8486d755f2b77740dd7ba7797.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Users\Admin\AppData\Local\Temp\ProcessHacker.exe
        "C:\Users\Admin\AppData\Local\Temp\ProcessHacker.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3372
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Users\Admin\AppData\Local\Temp\svhost.exe
          "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
          4⤵
          • Executes dropped EXE
          PID:4160
      • C:\Users\Admin\AppData\Local\Temp\svñhost.exe
        "C:\Users\Admin\AppData\Local\Temp\svñhost.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4532
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/svñhost.exe" "%appdata%\Microsoft\MsDrvOp.exe" /Y
          4⤵
            PID:4628
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%appdata%\Microsoft\MsDrvOp.exe.lnk" /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4596
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\MsDrvOp.exe.lnk" /f
              5⤵
                PID:4544
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %appdata%\Microsoft\MsDrvOp.exe:Zone.Identifier
              4⤵
              • NTFS ADS
              PID:3428
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c ren "%appdata%\Microsoft\MsDrvOp.exe.jpg" MsDrvOp.exe
              4⤵
                PID:1960
              • C:\Users\Admin\AppData\Local\Temp\tmp.exe
                "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
                4⤵
                • Executes dropped EXE
                PID:1620
              • C:\Users\Admin\AppData\Local\Temp\svñhost.exe
                "C:/Users/Admin/AppData/Local/Temp/svñhost.exe"
                4⤵
                • Executes dropped EXE
                PID:552
          • C:\Users\Admin\AppData\Local\Temp\svhost.exe
            "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
            2⤵
            • Executes dropped EXE
            PID:2228

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svñhost.exe.log
          Filesize

          522B

          MD5

          8334a471a4b492ece225b471b8ad2fc8

          SHA1

          1cb24640f32d23e8f7800bd0511b7b9c3011d992

          SHA256

          5612afe347d8549cc95a0c710602bcc7d7b224361b613c0a6ba362092300c169

          SHA512

          56ae2e83355c331b00d782797f5664c2f373eac240e811aab978732503ae05eb20b08730d2427ed90efa5a706d71b42b57153596a45a6b5592e3dd9128b81c36

        • C:\Users\Admin\AppData\Local\Temp\ProcessHacker.exe
          Filesize

          1.6MB

          MD5

          b365af317ae730a67c936f21432b9c71

          SHA1

          a0bdfac3ce1880b32ff9b696458327ce352e3b1d

          SHA256

          bd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4

          SHA512

          cc3359e16c6fe905a9e176a87acf4c4ed5e22c29bfca11949799caf8442e00ec0d1679b3d8754dbc3e313528d3e8e82c0ec1941e2c3530b48229c1cb337f6b8b

        • C:\Users\Admin\AppData\Local\Temp\ProcessHacker.exe
          Filesize

          1.6MB

          MD5

          b365af317ae730a67c936f21432b9c71

          SHA1

          a0bdfac3ce1880b32ff9b696458327ce352e3b1d

          SHA256

          bd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4

          SHA512

          cc3359e16c6fe905a9e176a87acf4c4ed5e22c29bfca11949799caf8442e00ec0d1679b3d8754dbc3e313528d3e8e82c0ec1941e2c3530b48229c1cb337f6b8b

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          Filesize

          408KB

          MD5

          bcc445de41fcfbbad5c4b0b0a4ea859a

          SHA1

          520466387cc8283238d2b69252051de0853e2e74

          SHA256

          aac1eb531b6f215859319664221f762e837d5c19db39f75193ff28f768170bf0

          SHA512

          c2696bba3ffd74e2421de45a55c76a6dbbdd0c1c3266d711a533b9d38d9cee5a33c55b1053044ca7373b625aba37aa87d6b0b1ea61bc899ac113fdac31e92c5b

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          Filesize

          408KB

          MD5

          bcc445de41fcfbbad5c4b0b0a4ea859a

          SHA1

          520466387cc8283238d2b69252051de0853e2e74

          SHA256

          aac1eb531b6f215859319664221f762e837d5c19db39f75193ff28f768170bf0

          SHA512

          c2696bba3ffd74e2421de45a55c76a6dbbdd0c1c3266d711a533b9d38d9cee5a33c55b1053044ca7373b625aba37aa87d6b0b1ea61bc899ac113fdac31e92c5b

        • C:\Users\Admin\AppData\Local\Temp\svhost.exe
          Filesize

          256KB

          MD5

          8fdf47e0ff70c40ed3a17014aeea4232

          SHA1

          e6256a0159688f0560b015da4d967f41cbf8c9bd

          SHA256

          ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

          SHA512

          bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

        • C:\Users\Admin\AppData\Local\Temp\svhost.exe
          Filesize

          256KB

          MD5

          8fdf47e0ff70c40ed3a17014aeea4232

          SHA1

          e6256a0159688f0560b015da4d967f41cbf8c9bd

          SHA256

          ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

          SHA512

          bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

        • C:\Users\Admin\AppData\Local\Temp\svhost.exe
          Filesize

          2.5MB

          MD5

          0a7608db01cae07792cea95e792aa866

          SHA1

          71dff876e4d5edb6cea78fee7aa15845d4950e24

          SHA256

          c16336ab32195b08c1678220fbe0256fee865f623e2b32fcfa4d9825fd68977e

          SHA512

          990a6fa1b8adb6727b1dcd8931ad84fdcb556533b78f896a71eae2a7e3ae3222e4b8efaa4b629ced2841211750e0d8a75ddd546a983c2e586918dd8ba4e0dc42

        • C:\Users\Admin\AppData\Local\Temp\svhost.exe
          Filesize

          2.5MB

          MD5

          0a7608db01cae07792cea95e792aa866

          SHA1

          71dff876e4d5edb6cea78fee7aa15845d4950e24

          SHA256

          c16336ab32195b08c1678220fbe0256fee865f623e2b32fcfa4d9825fd68977e

          SHA512

          990a6fa1b8adb6727b1dcd8931ad84fdcb556533b78f896a71eae2a7e3ae3222e4b8efaa4b629ced2841211750e0d8a75ddd546a983c2e586918dd8ba4e0dc42

        • C:\Users\Admin\AppData\Local\Temp\svñhost.exe
          Filesize

          1009KB

          MD5

          eee2282277e64485627c058793aa65e0

          SHA1

          ed5ae121bf074decf9b7a95214e67874733a5cf2

          SHA256

          79e31aa291777d936bdbd198ebf53f3b7d230972fcf95f92908872aca6bf888c

          SHA512

          b5ea27c4b0e14687065c94b72fa3c177fe161a92c15aad7db48a466ea34745fbfd15d7305f022ef322f41169b81df621253ace5d0720d11eb8ccc688a251767b

        • C:\Users\Admin\AppData\Local\Temp\svñhost.exe
          Filesize

          1009KB

          MD5

          eee2282277e64485627c058793aa65e0

          SHA1

          ed5ae121bf074decf9b7a95214e67874733a5cf2

          SHA256

          79e31aa291777d936bdbd198ebf53f3b7d230972fcf95f92908872aca6bf888c

          SHA512

          b5ea27c4b0e14687065c94b72fa3c177fe161a92c15aad7db48a466ea34745fbfd15d7305f022ef322f41169b81df621253ace5d0720d11eb8ccc688a251767b

        • C:\Users\Admin\AppData\Local\Temp\svñhost.exe
          Filesize

          1009KB

          MD5

          eee2282277e64485627c058793aa65e0

          SHA1

          ed5ae121bf074decf9b7a95214e67874733a5cf2

          SHA256

          79e31aa291777d936bdbd198ebf53f3b7d230972fcf95f92908872aca6bf888c

          SHA512

          b5ea27c4b0e14687065c94b72fa3c177fe161a92c15aad7db48a466ea34745fbfd15d7305f022ef322f41169b81df621253ace5d0720d11eb8ccc688a251767b

        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          Filesize

          2.5MB

          MD5

          79682b35bc0d20012d115b060b13d59e

          SHA1

          187d5ae4ce46095c2a05fe45fe768bbb92b3e164

          SHA256

          c06240ad1258978e6588fd6b4c9efe32e90d109e5728848b0aed413a4c568b5e

          SHA512

          b727075ce2f003de057f0aeb8e53bcadeaa5bc685bc606b8e94078bbb61a1ea84a4f66d60e50a1574785d9ad0352235028861e0625929d77cafa52fb3e9ff24e

        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          Filesize

          2.5MB

          MD5

          79682b35bc0d20012d115b060b13d59e

          SHA1

          187d5ae4ce46095c2a05fe45fe768bbb92b3e164

          SHA256

          c06240ad1258978e6588fd6b4c9efe32e90d109e5728848b0aed413a4c568b5e

          SHA512

          b727075ce2f003de057f0aeb8e53bcadeaa5bc685bc606b8e94078bbb61a1ea84a4f66d60e50a1574785d9ad0352235028861e0625929d77cafa52fb3e9ff24e

        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          Filesize

          902KB

          MD5

          4f569bfdf48c4193795be0c012a66d9b

          SHA1

          9df29ae3f4c0666303204ae3d2b36b21ff483bb9

          SHA256

          8c46765193808e7655ea8d2a578da25b8a064dbd5eb1a42911bd26c4d82df333

          SHA512

          cb1c2c6539951d66d66448c64763d4efd9127bf9a593a93179ac7ff86a8100ec2380ae947cc87f22afef78489648ba8f7a8e1664b255f182efcda138c05b602f

        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          Filesize

          902KB

          MD5

          4f569bfdf48c4193795be0c012a66d9b

          SHA1

          9df29ae3f4c0666303204ae3d2b36b21ff483bb9

          SHA256

          8c46765193808e7655ea8d2a578da25b8a064dbd5eb1a42911bd26c4d82df333

          SHA512

          cb1c2c6539951d66d66448c64763d4efd9127bf9a593a93179ac7ff86a8100ec2380ae947cc87f22afef78489648ba8f7a8e1664b255f182efcda138c05b602f

        • C:\Users\Admin\AppData\Roaming\Microsoft\MsDrvOp.exe
          Filesize

          1009KB

          MD5

          eee2282277e64485627c058793aa65e0

          SHA1

          ed5ae121bf074decf9b7a95214e67874733a5cf2

          SHA256

          79e31aa291777d936bdbd198ebf53f3b7d230972fcf95f92908872aca6bf888c

          SHA512

          b5ea27c4b0e14687065c94b72fa3c177fe161a92c15aad7db48a466ea34745fbfd15d7305f022ef322f41169b81df621253ace5d0720d11eb8ccc688a251767b

        • memory/552-174-0x0000000005890000-0x0000000005922000-memory.dmp
          Filesize

          584KB

        • memory/552-168-0x0000000000000000-mapping.dmp
        • memory/552-169-0x0000000000400000-0x00000000004E8000-memory.dmp
          Filesize

          928KB

        • memory/552-172-0x0000000005D20000-0x00000000062C4000-memory.dmp
          Filesize

          5.6MB

        • memory/1496-132-0x0000000000000000-mapping.dmp
        • memory/1620-165-0x0000000000000000-mapping.dmp
        • memory/1620-173-0x00007FF8BE210000-0x00007FF8BECD1000-memory.dmp
          Filesize

          10.8MB

        • memory/1620-171-0x00000000004C0000-0x00000000005A8000-memory.dmp
          Filesize

          928KB

        • memory/1960-164-0x0000000000000000-mapping.dmp
        • memory/2228-135-0x0000000000000000-mapping.dmp
        • memory/2228-138-0x00000000005C0000-0x0000000000857000-memory.dmp
          Filesize

          2.6MB

        • memory/2320-131-0x0000000005910000-0x00000000059AC000-memory.dmp
          Filesize

          624KB

        • memory/2320-130-0x0000000000E30000-0x00000000010F6000-memory.dmp
          Filesize

          2.8MB

        • memory/3372-140-0x0000000000000000-mapping.dmp
        • memory/3428-163-0x0000000000000000-mapping.dmp
        • memory/3716-146-0x0000000000C00000-0x0000000000C6C000-memory.dmp
          Filesize

          432KB

        • memory/3716-142-0x0000000000000000-mapping.dmp
        • memory/4160-154-0x0000000000400000-0x0000000000449000-memory.dmp
          Filesize

          292KB

        • memory/4160-152-0x0000000000400000-0x0000000000449000-memory.dmp
          Filesize

          292KB

        • memory/4160-155-0x0000000000400000-0x0000000000449000-memory.dmp
          Filesize

          292KB

        • memory/4160-151-0x0000000000000000-mapping.dmp
        • memory/4160-157-0x0000000000400000-0x0000000000449000-memory.dmp
          Filesize

          292KB

        • memory/4532-149-0x0000000000140000-0x0000000000242000-memory.dmp
          Filesize

          1.0MB

        • memory/4532-145-0x0000000000000000-mapping.dmp
        • memory/4544-160-0x0000000000000000-mapping.dmp
        • memory/4596-158-0x0000000000000000-mapping.dmp
        • memory/4628-156-0x0000000000000000-mapping.dmp