Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 18:04
Behavioral task
behavioral1
Sample
HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe
Resource
win10v2004-20220812-en
General
-
Target
HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe
-
Size
908KB
-
MD5
f1e4a04ced6ac22acfbe73b93cfa55a0
-
SHA1
ef35307d8850052c45827d4873abd98d79906deb
-
SHA256
9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2
-
SHA512
062a3de317f9515da294e54b82d0b039959784e12cbdb20553e62ab455c63821105342f3455dc7df42dbabae8c5a9a6b2e426784b6f67af07be3822bcb222063
-
SSDEEP
24576:Wqd4MROxnFj30xXFHXRrZlI0AilFEvxHiln:WqqMi1sRhrZlI0AilFEvxHi
Malware Config
Extracted
orcus
78.198.121.158:5555
e37b97020fdb47e0a5bc491e6c25e4bc
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\proxy\svchost.exe
-
reconnect_delay
10000
-
registry_keyname
windows proxy
-
taskscheduler_taskname
Orcus
-
watchdog_path
Temp\svchost32.exe
Signatures
-
Orcus main payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000022e39-141.dat family_orcus behavioral2/files/0x0007000000022e39-143.dat family_orcus behavioral2/files/0x0007000000022e39-145.dat family_orcus -
Orcurs Rat Executable 4 IoCs
resource yara_rule behavioral2/files/0x0007000000022e39-141.dat orcus behavioral2/files/0x0007000000022e39-143.dat orcus behavioral2/memory/1540-144-0x00000000006F0000-0x00000000007D8000-memory.dmp orcus behavioral2/files/0x0007000000022e39-145.dat orcus -
Executes dropped EXE 4 IoCs
pid Process 1540 svchost.exe 4132 svchost.exe 4224 svchost32.exe 4244 svchost32.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation svchost32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows proxy = "\"C:\\Program Files\\proxy\\svchost.exe\"" svchost.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe File opened for modification C:\Windows\assembly\Desktop.ini HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\proxy\svchost.exe HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe File opened for modification C:\Program Files\proxy\svchost.exe HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe File created C:\Program Files\proxy\svchost.exe.config HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe File created C:\Windows\assembly\Desktop.ini HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe File opened for modification C:\Windows\assembly\Desktop.ini HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 4244 svchost32.exe 4244 svchost32.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe 1540 svchost.exe 4244 svchost32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4224 svchost32.exe Token: SeDebugPrivilege 1540 svchost.exe Token: SeDebugPrivilege 4244 svchost32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 svchost.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1540 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4964 wrote to memory of 3608 4964 HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe 79 PID 4964 wrote to memory of 3608 4964 HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe 79 PID 3608 wrote to memory of 4456 3608 csc.exe 81 PID 3608 wrote to memory of 4456 3608 csc.exe 81 PID 4964 wrote to memory of 1540 4964 HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe 82 PID 4964 wrote to memory of 1540 4964 HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe 82 PID 1540 wrote to memory of 4224 1540 svchost.exe 84 PID 1540 wrote to memory of 4224 1540 svchost.exe 84 PID 1540 wrote to memory of 4224 1540 svchost.exe 84 PID 4224 wrote to memory of 4244 4224 svchost32.exe 85 PID 4224 wrote to memory of 4244 4224 svchost32.exe 85 PID 4224 wrote to memory of 4244 4224 svchost32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-Spy.MSIL.Generic-9162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\6yrzpqs3.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7536.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7535.tmp"3⤵PID:4456
-
-
-
C:\Program Files\proxy\svchost.exe"C:\Program Files\proxy\svchost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\svchost32.exe"C:\Users\Admin\AppData\Local\Temp\svchost32.exe" /launchSelfAndExit "C:\Program Files\proxy\svchost.exe" 15403⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\svchost32.exe"C:\Users\Admin\AppData\Local\Temp\svchost32.exe" /watchProcess "C:\Program Files\proxy\svchost.exe" 15404⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
-
-
C:\Program Files\proxy\svchost.exe"C:\Program Files\proxy\svchost.exe"1⤵
- Executes dropped EXE
PID:4132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
908KB
MD5f1e4a04ced6ac22acfbe73b93cfa55a0
SHA1ef35307d8850052c45827d4873abd98d79906deb
SHA2569162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2
SHA512062a3de317f9515da294e54b82d0b039959784e12cbdb20553e62ab455c63821105342f3455dc7df42dbabae8c5a9a6b2e426784b6f67af07be3822bcb222063
-
Filesize
908KB
MD5f1e4a04ced6ac22acfbe73b93cfa55a0
SHA1ef35307d8850052c45827d4873abd98d79906deb
SHA2569162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2
SHA512062a3de317f9515da294e54b82d0b039959784e12cbdb20553e62ab455c63821105342f3455dc7df42dbabae8c5a9a6b2e426784b6f67af07be3822bcb222063
-
Filesize
908KB
MD5f1e4a04ced6ac22acfbe73b93cfa55a0
SHA1ef35307d8850052c45827d4873abd98d79906deb
SHA2569162035bdf58571f4addb781f7501a55337a2437c0022e0cb5cf9f0162bcf8f2
SHA512062a3de317f9515da294e54b82d0b039959784e12cbdb20553e62ab455c63821105342f3455dc7df42dbabae8c5a9a6b2e426784b6f67af07be3822bcb222063
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
76KB
MD55ba39ebc4be5e92f56c0421991cd8bcb
SHA1acc2d7185ae0fa0de10b2285146f2bb118f255b4
SHA25652757a6a1ee8406e43df4cc7a332a4ad31dc0f5be6ec0e8a713d6100525fb50e
SHA51244b162a7335a9ba25efa2e603b25ea24f65f9db7abb8677393c2a3872a8f37824355807a3b8859dd604e8cff33cb54d38e7d82e72115fd6a80feed60a6b08ad0
-
Filesize
1KB
MD57a7fd653576cfc49fa7fa82c74002665
SHA1875bf46a57875232f739a733ef4a38ed4389bc4c
SHA256d7bba2359d08512adbcaa596ab0e0177128b6604a47957866e785b294e110db4
SHA512843673f0705c256c9fb640f5b3fef201e865434e0d468b6d81d8a7d07f5f54d3a607a91baa45a3c8f4fcec5aedc08d50f9e6fd29de83d28610cd96bd70f84569
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
208KB
MD5777984169b6a2a4c74a9aa31feeefc5a
SHA10bafec2cd993fda70f5dd97fc428d1380893f0c0
SHA2569acdaa1560635145e16cadf94653866bdc0b5dbd3810c04986ede96773f12a52
SHA512046a58105b14afa2c63cf1f675e4aac929561bfcd998ce25b86c5f27b85f3236b6bc6e751d0b675d4f6527950edc859bf9c6378250e43133db82bfdcb9b37f43
-
Filesize
349B
MD55d9242aa23644df67baa5b373dae7a91
SHA16a54d8489adef692d8b08a697f93132d0eb7560f
SHA256def71b8eb560c424efd6d36cfc89f26bf18af96aa347b07221e0c6a54a2acdb3
SHA51262fc471451752c10bc6ceb6ced66ee29744bffd736dcce3738d9916f9c0c686f0980ac7781c10d341d1070c523c38489d9fab7cf83702f90f139c0355b271670
-
Filesize
676B
MD5fb6ec945702156ac00511b824b398184
SHA18570d6a428cd54525c5fd17f7269178e88b96379
SHA2569e1927958edd25f5511b5468c3bc2e65a847c0d2f429d1b1595546a4d9ac5461
SHA5122333e6d4657f8e7909645ecb66a3860365ac526f1aecdc35c5aeda701caa0b5bbd9648337813baf0dbfa8ca03deab7905b02affff6891276e38ed0ebd9e01740