Analysis

  • max time kernel
    143s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 10:38

General

  • Target

    0aee6eccb540b68a3811f5909b934849e873fef1809392147905986e6111892c.exe

  • Size

    1.1MB

  • MD5

    a0cbd9c2da1bea56af84c24013fe5470

  • SHA1

    955092538e670b71cc05c3c2ba1225e2645a623b

  • SHA256

    0aee6eccb540b68a3811f5909b934849e873fef1809392147905986e6111892c

  • SHA512

    e12fdeb8bc4f7e3a5674e118073982098d5c6d8987ebd632266c6fb0b6e6f4806fc2bd93997bdc4c65dc4775f20cdd97b5bf615389ba6adb6fe4407d41526b3e

Malware Config

Extracted

Family

orcus

C2

serverguedin.ddns.net:10134

Mutex

bbab6692eea34e39a485be6a03573102

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    C:\Windows\System32\schost.exe

  • reconnect_delay

    10000

  • registry_keyname

    schost

  • taskscheduler_taskname

    schost

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus Main Payload 4 IoCs
  • Orcurs Rat Executable 5 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 10 IoCs
  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0aee6eccb540b68a3811f5909b934849e873fef1809392147905986e6111892c.exe
    "C:\Users\Admin\AppData\Local\Temp\0aee6eccb540b68a3811f5909b934849e873fef1809392147905986e6111892c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\temp\baseSoftware.exe
      "C:\Windows\temp\baseSoftware.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2352
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Windows\temp\MetroFramework.Design.dll"
      2⤵
      • Loads dropped DLL
      PID:2552
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Windows\temp\MetroFramework.dll"
      2⤵
      • Loads dropped DLL
      PID:2548
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Windows\temp\MetroFramework.Fonts.dll"
      2⤵
      • Loads dropped DLL
      PID:1752
    • C:\Windows\temp\updater.exe
      "C:\Windows\temp\updater.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Windows\SysWOW64\WindowsInput.exe
        "C:\Windows\SysWOW64\WindowsInput.exe" --install
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        PID:5044
      • C:\Windows\System32\schost.exe
        "C:\Windows\System32\schost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1920
  • C:\Windows\SysWOW64\WindowsInput.exe
    "C:\Windows\SysWOW64\WindowsInput.exe"
    1⤵
    • Executes dropped EXE
    PID:2516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\WindowsInput.exe

    Filesize

    21KB

    MD5

    e6fcf516d8ed8d0d4427f86e08d0d435

    SHA1

    c7691731583ab7890086635cb7f3e4c22ca5e409

    SHA256

    8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

    SHA512

    c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

  • C:\Windows\SysWOW64\WindowsInput.exe

    Filesize

    21KB

    MD5

    e6fcf516d8ed8d0d4427f86e08d0d435

    SHA1

    c7691731583ab7890086635cb7f3e4c22ca5e409

    SHA256

    8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

    SHA512

    c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

  • C:\Windows\SysWOW64\WindowsInput.exe

    Filesize

    21KB

    MD5

    e6fcf516d8ed8d0d4427f86e08d0d435

    SHA1

    c7691731583ab7890086635cb7f3e4c22ca5e409

    SHA256

    8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

    SHA512

    c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

  • C:\Windows\SysWOW64\WindowsInput.exe.config

    Filesize

    357B

    MD5

    a2b76cea3a59fa9af5ea21ff68139c98

    SHA1

    35d76475e6a54c168f536e30206578babff58274

    SHA256

    f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

    SHA512

    b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

  • C:\Windows\System32\schost.exe

    Filesize

    919KB

    MD5

    57bec90d9d6f74a4c32c49f0399a011b

    SHA1

    a8aa87489dcf4fdbd98bdd0c14f2f69aec33443a

    SHA256

    5c32d04afb9fc8f5ef384aaadf0b1b0f7398bb0e7545e15f63ab3204ba734a91

    SHA512

    45809def671e58a2426944fe16ad413e693821952dfe8206c267dc2abcd9e8578602e29d05eab4522e431dfa1322939036e2203854fe71045bd57424ad3b5119

  • C:\Windows\System32\schost.exe

    Filesize

    919KB

    MD5

    57bec90d9d6f74a4c32c49f0399a011b

    SHA1

    a8aa87489dcf4fdbd98bdd0c14f2f69aec33443a

    SHA256

    5c32d04afb9fc8f5ef384aaadf0b1b0f7398bb0e7545e15f63ab3204ba734a91

    SHA512

    45809def671e58a2426944fe16ad413e693821952dfe8206c267dc2abcd9e8578602e29d05eab4522e431dfa1322939036e2203854fe71045bd57424ad3b5119

  • C:\Windows\System32\schost.exe.config

    Filesize

    357B

    MD5

    a2b76cea3a59fa9af5ea21ff68139c98

    SHA1

    35d76475e6a54c168f536e30206578babff58274

    SHA256

    f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

    SHA512

    b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

  • C:\Windows\Temp\MetroFramework.Design.dll

    Filesize

    16KB

    MD5

    ab4c3529694fc8d2427434825f71b2b8

    SHA1

    7be378e382e43eae84f1567b3570bca9a67e7697

    SHA256

    0a4a96082e25767e4697033649b16c76a652e120757a2cecab8092ad0d716b65

    SHA512

    02d7935f68c30457da79ad7b039b22caed11d8aedfec7c96619ac6da59ceb7c5e7a758dced64ec02d31c37a2befccdc8eb59be9e2dc849aa2bc22fabb5fa00a5

  • C:\Windows\Temp\MetroFramework.Design.dll

    Filesize

    16KB

    MD5

    ab4c3529694fc8d2427434825f71b2b8

    SHA1

    7be378e382e43eae84f1567b3570bca9a67e7697

    SHA256

    0a4a96082e25767e4697033649b16c76a652e120757a2cecab8092ad0d716b65

    SHA512

    02d7935f68c30457da79ad7b039b22caed11d8aedfec7c96619ac6da59ceb7c5e7a758dced64ec02d31c37a2befccdc8eb59be9e2dc849aa2bc22fabb5fa00a5

  • C:\Windows\Temp\MetroFramework.Fonts.dll

    Filesize

    656KB

    MD5

    65ef4b23060128743cef937a43b82aa3

    SHA1

    cc72536b84384ec8479b9734b947dce885ef5d31

    SHA256

    c843869aaca5135c2d47296985f35c71ca8af4431288d04d481c4e46cc93ee26

    SHA512

    d06690f9aac0c6500aed387f692b3305dfc0708b08fc2f27eaa44b108908ccd8267b07f8fb8608eef5c803039caeabf8f88a18b7e5b1d850f32bbb72bcd3b0b7

  • C:\Windows\Temp\MetroFramework.Fonts.dll

    Filesize

    656KB

    MD5

    65ef4b23060128743cef937a43b82aa3

    SHA1

    cc72536b84384ec8479b9734b947dce885ef5d31

    SHA256

    c843869aaca5135c2d47296985f35c71ca8af4431288d04d481c4e46cc93ee26

    SHA512

    d06690f9aac0c6500aed387f692b3305dfc0708b08fc2f27eaa44b108908ccd8267b07f8fb8608eef5c803039caeabf8f88a18b7e5b1d850f32bbb72bcd3b0b7

  • C:\Windows\Temp\MetroFramework.Fonts.dll

    Filesize

    656KB

    MD5

    65ef4b23060128743cef937a43b82aa3

    SHA1

    cc72536b84384ec8479b9734b947dce885ef5d31

    SHA256

    c843869aaca5135c2d47296985f35c71ca8af4431288d04d481c4e46cc93ee26

    SHA512

    d06690f9aac0c6500aed387f692b3305dfc0708b08fc2f27eaa44b108908ccd8267b07f8fb8608eef5c803039caeabf8f88a18b7e5b1d850f32bbb72bcd3b0b7

  • C:\Windows\Temp\MetroFramework.Fonts.dll

    Filesize

    656KB

    MD5

    65ef4b23060128743cef937a43b82aa3

    SHA1

    cc72536b84384ec8479b9734b947dce885ef5d31

    SHA256

    c843869aaca5135c2d47296985f35c71ca8af4431288d04d481c4e46cc93ee26

    SHA512

    d06690f9aac0c6500aed387f692b3305dfc0708b08fc2f27eaa44b108908ccd8267b07f8fb8608eef5c803039caeabf8f88a18b7e5b1d850f32bbb72bcd3b0b7

  • C:\Windows\Temp\MetroFramework.dll

    Filesize

    345KB

    MD5

    34ea7f7d66563f724318e322ff08f4db

    SHA1

    d0aa8038a92eb43def2fffbbf4114b02636117c5

    SHA256

    c2c12d31b4844e29de31594fc9632a372a553631de0a0a04c8af91668e37cf49

    SHA512

    dceb1f9435b9479f6aea9b0644ba8c46338a7f458c313822a9d9b3266d79af395b9b2797ed3217c7048db8b22955ec6fe8b0b1778077fa1de587123ad9e6b148

  • C:\Windows\Temp\MetroFramework.dll

    Filesize

    345KB

    MD5

    34ea7f7d66563f724318e322ff08f4db

    SHA1

    d0aa8038a92eb43def2fffbbf4114b02636117c5

    SHA256

    c2c12d31b4844e29de31594fc9632a372a553631de0a0a04c8af91668e37cf49

    SHA512

    dceb1f9435b9479f6aea9b0644ba8c46338a7f458c313822a9d9b3266d79af395b9b2797ed3217c7048db8b22955ec6fe8b0b1778077fa1de587123ad9e6b148

  • C:\Windows\Temp\MetroFramework.dll

    Filesize

    345KB

    MD5

    34ea7f7d66563f724318e322ff08f4db

    SHA1

    d0aa8038a92eb43def2fffbbf4114b02636117c5

    SHA256

    c2c12d31b4844e29de31594fc9632a372a553631de0a0a04c8af91668e37cf49

    SHA512

    dceb1f9435b9479f6aea9b0644ba8c46338a7f458c313822a9d9b3266d79af395b9b2797ed3217c7048db8b22955ec6fe8b0b1778077fa1de587123ad9e6b148

  • C:\Windows\Temp\MetroFramework.dll

    Filesize

    345KB

    MD5

    34ea7f7d66563f724318e322ff08f4db

    SHA1

    d0aa8038a92eb43def2fffbbf4114b02636117c5

    SHA256

    c2c12d31b4844e29de31594fc9632a372a553631de0a0a04c8af91668e37cf49

    SHA512

    dceb1f9435b9479f6aea9b0644ba8c46338a7f458c313822a9d9b3266d79af395b9b2797ed3217c7048db8b22955ec6fe8b0b1778077fa1de587123ad9e6b148

  • C:\Windows\Temp\baseSoftware.exe

    Filesize

    12KB

    MD5

    5510def349448a8a994f4f32bffe8bca

    SHA1

    f9ffddd8e74f65d78397d7cb7170cd226de41048

    SHA256

    b3eaf38bebb28400a71969399ac86d28f2debcf068db3c089ee73b34d4c1514f

    SHA512

    012ac67ff0eba57510f8e443c45e90135a4219775337a0513d5045a25985f5d87d56ce8eced14575b0a3c06cd785ff9513b8b44f2df46814790853c7ffc021bc

  • C:\Windows\Temp\updater.exe

    Filesize

    919KB

    MD5

    57bec90d9d6f74a4c32c49f0399a011b

    SHA1

    a8aa87489dcf4fdbd98bdd0c14f2f69aec33443a

    SHA256

    5c32d04afb9fc8f5ef384aaadf0b1b0f7398bb0e7545e15f63ab3204ba734a91

    SHA512

    45809def671e58a2426944fe16ad413e693821952dfe8206c267dc2abcd9e8578602e29d05eab4522e431dfa1322939036e2203854fe71045bd57424ad3b5119

  • C:\Windows\temp\MetroFramework.Design.dll

    Filesize

    16KB

    MD5

    ab4c3529694fc8d2427434825f71b2b8

    SHA1

    7be378e382e43eae84f1567b3570bca9a67e7697

    SHA256

    0a4a96082e25767e4697033649b16c76a652e120757a2cecab8092ad0d716b65

    SHA512

    02d7935f68c30457da79ad7b039b22caed11d8aedfec7c96619ac6da59ceb7c5e7a758dced64ec02d31c37a2befccdc8eb59be9e2dc849aa2bc22fabb5fa00a5

  • C:\Windows\temp\MetroFramework.Fonts.dll

    Filesize

    656KB

    MD5

    65ef4b23060128743cef937a43b82aa3

    SHA1

    cc72536b84384ec8479b9734b947dce885ef5d31

    SHA256

    c843869aaca5135c2d47296985f35c71ca8af4431288d04d481c4e46cc93ee26

    SHA512

    d06690f9aac0c6500aed387f692b3305dfc0708b08fc2f27eaa44b108908ccd8267b07f8fb8608eef5c803039caeabf8f88a18b7e5b1d850f32bbb72bcd3b0b7

  • C:\Windows\temp\MetroFramework.dll

    Filesize

    345KB

    MD5

    34ea7f7d66563f724318e322ff08f4db

    SHA1

    d0aa8038a92eb43def2fffbbf4114b02636117c5

    SHA256

    c2c12d31b4844e29de31594fc9632a372a553631de0a0a04c8af91668e37cf49

    SHA512

    dceb1f9435b9479f6aea9b0644ba8c46338a7f458c313822a9d9b3266d79af395b9b2797ed3217c7048db8b22955ec6fe8b0b1778077fa1de587123ad9e6b148

  • C:\Windows\temp\baseSoftware.exe

    Filesize

    12KB

    MD5

    5510def349448a8a994f4f32bffe8bca

    SHA1

    f9ffddd8e74f65d78397d7cb7170cd226de41048

    SHA256

    b3eaf38bebb28400a71969399ac86d28f2debcf068db3c089ee73b34d4c1514f

    SHA512

    012ac67ff0eba57510f8e443c45e90135a4219775337a0513d5045a25985f5d87d56ce8eced14575b0a3c06cd785ff9513b8b44f2df46814790853c7ffc021bc

  • C:\Windows\temp\updater.exe

    Filesize

    919KB

    MD5

    57bec90d9d6f74a4c32c49f0399a011b

    SHA1

    a8aa87489dcf4fdbd98bdd0c14f2f69aec33443a

    SHA256

    5c32d04afb9fc8f5ef384aaadf0b1b0f7398bb0e7545e15f63ab3204ba734a91

    SHA512

    45809def671e58a2426944fe16ad413e693821952dfe8206c267dc2abcd9e8578602e29d05eab4522e431dfa1322939036e2203854fe71045bd57424ad3b5119

  • memory/1752-135-0x0000000000000000-mapping.dmp

  • memory/1920-176-0x000000001C6B0000-0x000000001C872000-memory.dmp

    Filesize

    1.8MB

  • memory/1920-175-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp

    Filesize

    10.8MB

  • memory/1920-171-0x0000000000000000-mapping.dmp

  • memory/2352-154-0x0000000005AD0000-0x0000000005B62000-memory.dmp

    Filesize

    584KB

  • memory/2352-159-0x0000000009640000-0x00000000096EA000-memory.dmp

    Filesize

    680KB

  • memory/2352-149-0x0000000000C90000-0x0000000000C9A000-memory.dmp

    Filesize

    40KB

  • memory/2352-156-0x0000000005A70000-0x0000000005A7A000-memory.dmp

    Filesize

    40KB

  • memory/2352-150-0x0000000005CE0000-0x0000000006284000-memory.dmp

    Filesize

    5.6MB

  • memory/2352-130-0x0000000000000000-mapping.dmp

  • memory/2352-153-0x00000000055F0000-0x000000000564C000-memory.dmp

    Filesize

    368KB

  • memory/2516-167-0x00000000017B0000-0x00000000017C2000-memory.dmp

    Filesize

    72KB

  • memory/2516-168-0x0000000001810000-0x000000000184C000-memory.dmp

    Filesize

    240KB

  • memory/2516-169-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp

    Filesize

    10.8MB

  • memory/2516-170-0x000000001A900000-0x000000001AA0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2548-134-0x0000000000000000-mapping.dmp

  • memory/2552-133-0x0000000000000000-mapping.dmp

  • memory/4740-145-0x0000000000000000-mapping.dmp

  • memory/4740-155-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp

    Filesize

    10.8MB

  • memory/4740-148-0x0000000000620000-0x000000000070C000-memory.dmp

    Filesize

    944KB

  • memory/5044-165-0x00007FFAB78F0000-0x00007FFAB83B1000-memory.dmp

    Filesize

    10.8MB

  • memory/5044-164-0x0000000000D10000-0x0000000000D1C000-memory.dmp

    Filesize

    48KB

  • memory/5044-160-0x0000000000000000-mapping.dmp