Analysis

  • max time kernel
    300s
  • max time network
    305s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 10:31

General

  • Target

    c3301cb32b0dd03311590edc1472e64926b1a9bdc684928184892310c717ecec.exe

  • Size

    2.8MB

  • MD5

    38b806deb9a6bf562e66dc00926bc60c

  • SHA1

    142b40d61cd8789c47ea3d38580368ac18b23782

  • SHA256

    c3301cb32b0dd03311590edc1472e64926b1a9bdc684928184892310c717ecec

  • SHA512

    2ea20b7340f273a702833bdb70af9844f8e1b01946fb064717b530f8967b0776cec106077fd239cfeccf4d1919442ad9db5212d305ef4400524a91b91283b852

  • SSDEEP

    49152:FrNCxxbLFfslHQMAd2TcIm/7iEW33iInMVt2SzNv6BkMgQu7HqUYGOXwn:xNCxxbelH/4gcICdW3yInMThtrd7YXwn

Malware Config

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Orcurs Rat Executable 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3301cb32b0dd03311590edc1472e64926b1a9bdc684928184892310c717ecec.exe
    "C:\Users\Admin\AppData\Local\Temp\c3301cb32b0dd03311590edc1472e64926b1a9bdc684928184892310c717ecec.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cjm455p7.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF4AD.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF48D.tmp"
        3⤵
          PID:1832
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {ABD59F4A-C577-44C2-BA04-5F8EA1492E2A} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Local\Temp\c3301cb32b0dd03311590edc1472e64926b1a9bdc684928184892310c717ecec.exe
        C:\Users\Admin\AppData\Local\Temp\c3301cb32b0dd03311590edc1472e64926b1a9bdc684928184892310c717ecec.exe
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xqpj_hwu.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2BD3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC2BD2.tmp"
            4⤵
              PID:360

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        60KB

        MD5

        6c6a24456559f305308cb1fb6c5486b3

        SHA1

        3273ac27d78572f16c3316732b9756ebc22cb6ed

        SHA256

        efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

        SHA512

        587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CE

        Filesize

        1KB

        MD5

        56347a9b7f5b3c84a57dfb22674fb11f

        SHA1

        485c994b577efb64c239e0d6c3a4d511f6d8c532

        SHA256

        c107938f28fc5c57de10179997030c7efeee82f1ec66c4862dddf3776ca37d39

        SHA512

        f601c73a85bf6a3f92922d2794554ab899b57da592c4869cb50e7e82bdeae696915af6d0abc632a249f26d794051fbea78eed746b62d27dc4d34ddb21a39b9da

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EA618097E393409AFA316F0F87E2C202_5DD3F300494C43B67C28936A063C587B

        Filesize

        1KB

        MD5

        9b820c90b8066d4d2a35f2b1a4461c73

        SHA1

        30de3123bc1f9092fd8d5f6fcf179f42470f2113

        SHA256

        4afb5c455338aed5a9b1863f46edd25d99fd1f6879aeb845b728a8b174d90e2a

        SHA512

        a8f27bc055b52c442503d42bf922c1008d10e5de069c97dd8501e91ce22e879e5ec1557588f901ba5b847cc2b6b7a987a0d46ba0e6bda6e7eab84840d11454eb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        97a1153f167c382b89eb27f266102f14

        SHA1

        8fc1fbe2034314aac86172f5fdd61b34bddc494f

        SHA256

        d9fc04527113e8a17f95e17a1d5e7a87f8af3a8f33ded3c9ace9e45d8894f42a

        SHA512

        081db17077af43aa5bcd2ebf47f21a7b7881c9fd7bc475cfe175c812e44e89d6a21968fc5cec719cd4f25a711c7d17206e742e581fdfd487b2005b738765d8d9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CE

        Filesize

        398B

        MD5

        61f4fd87c7fb2d00271cecc21af4b040

        SHA1

        5ebf5b6113956e9fdbbc7a4c09915e9be37288c2

        SHA256

        5ef323455a7b73e1c57ef061a68cfd0b778f6787c7a78abe6aaa16ee54d94115

        SHA512

        e386e997b12663252ea157029f33e50e143164128c3783c630d0584bd2690ad6b6c8820f1c5038c7a929c954be92a800a34280faa3319a1ddd41e99b978ba465

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EA618097E393409AFA316F0F87E2C202_5DD3F300494C43B67C28936A063C587B

        Filesize

        402B

        MD5

        74df6b7157283860c5068945176e9cd0

        SHA1

        0f40da7437a24a83d398674509bbaff727dd516d

        SHA256

        082c846348f4f1e0d72a13120b6bd1706a6fecbea6ecb3d9af783b126b27ce91

        SHA512

        0e778c47611ab1ae3150bf9bfd00ef4f4a014bd12b87c7b792e23f8a9b84659c22d63c624bc7cffd772584f27a065e610e8ea0007dcbe1fc7c04e4888d96be3a

      • C:\Users\Admin\AppData\Local\Temp\RES2BD3.tmp

        Filesize

        1KB

        MD5

        2d4750de4ed97b92f91965e90467de01

        SHA1

        9507fd695d1ba27198d881e29b690ebd785c45bc

        SHA256

        74aed00b3689623730902a7d9e74184f1ed919452695fb2ed94a1aa2284c1441

        SHA512

        5b3ad8f0a0fdcb727bf305ae5bc4bd1d482eb87a2ed51997912787c904e1f0eb2110d92d684258a0907eea236e3a119d5334f6d5e3782f3294cdcf2fb70eca35

      • C:\Users\Admin\AppData\Local\Temp\RESF4AD.tmp

        Filesize

        1KB

        MD5

        1d995ad698c45165b7a7f6978e5cb610

        SHA1

        9df3324d627089223c8a7f7aec74346485a7c2d2

        SHA256

        bb4563402d46358456a192b35fcea13d9602c82bba7d1697b0d81ed76416a792

        SHA512

        7c155004c20cf665c2c036740962337948deb12603739a73d983f98b22a302e8a1534a981396fad20db8d1caf11dcca07debb0518295764472a9798275d36d6d

      • C:\Users\Admin\AppData\Local\Temp\cjm455p7.dll

        Filesize

        76KB

        MD5

        24471f41306b6f5d47360a065ec96c07

        SHA1

        4c9d587bb9b0b29ed6ee0496a0bd02b98947f894

        SHA256

        4e9494070e1e3eec48748b7b7c651813198fa4c8b947b1548f5764d4a39ff9fd

        SHA512

        2e7c2c230cb91ab5179efe4d9f7094f16f25ffcb39641ba1908a131b18d5727e34c09c80758d8ae6ba6dfb258dc586aa5be52e5c128de31934e240717e5eaf1b

      • C:\Users\Admin\AppData\Local\Temp\xqpj_hwu.dll

        Filesize

        76KB

        MD5

        6fddd02c4cb67ab5ed4a6365148cc407

        SHA1

        35c48033a9e1d9cce3384d56a0bc29ec30c223d5

        SHA256

        c1fcfa323b45a1064938342e5764c7e1ada5f55f8531c37bb8d33f0142a68208

        SHA512

        37335d53a2b2667a26e926b3dcbd34491ac4f458393be8bb4e70cf4c63a67c1da468a54059dbfa5c680ba0586d727824234a2f58ee21b267670196d7462b8cd5

      • \??\c:\Users\Admin\AppData\Local\Temp\CSC2BD2.tmp

        Filesize

        676B

        MD5

        0d654b101bac8f7e28082b41ec30232a

        SHA1

        681cbf52f08b6d44060a37c069234665f73886c8

        SHA256

        8b58f30fe5684464793c3cf5bfd263b2fd0beb23063b76a394a099bdc1e11f3d

        SHA512

        9cb3ebdab2e73adb1c8ae98244528dce56e54729ba9a613eb9e33b55b0e8fb16b5476fa53baee2a9d8b2daada3f2b715901863102d41bcc27c5bb9f84992d2ab

      • \??\c:\Users\Admin\AppData\Local\Temp\CSCF48D.tmp

        Filesize

        676B

        MD5

        1b77d178e672e65abffe910394548de4

        SHA1

        f8e09cf1833a904742dc2b6a0d31a5a786f5a024

        SHA256

        5dc88e66848a574e6c883ffaab2168e17eb9d147fefaada5acfa417bbf887d30

        SHA512

        8eeeea14c7edb2b994037e6256444bf4133cf2026ecea38b2158745a8bd5b017649d9a6121e858a77507aed7273118b509ece247422fc225086b2ea0c93ec286

      • \??\c:\Users\Admin\AppData\Local\Temp\cjm455p7.0.cs

        Filesize

        208KB

        MD5

        45f4c9c04b0f0bb2416d11620219ad62

        SHA1

        19ed5ec09842e07fc49315d9fffad3497793427c

        SHA256

        3fff663274815f74c387dc090d28d5afd69e7ad245efb29c79175652768e497c

        SHA512

        d3ed2e3d2824daa79717abc34db440099d35429f22a203ed92fbd2ab841755bc6d18886a21b2faf48aec4ef42187cae7470abdebb1788f3d64256d96ba67be8e

      • \??\c:\Users\Admin\AppData\Local\Temp\cjm455p7.cmdline

        Filesize

        347B

        MD5

        ecfc13c6ddb9edc0259ebefd361caf85

        SHA1

        56639edb6c990dffb81ed3fbd31b68f0c37c7ea4

        SHA256

        41c8e69c692df2a6d5292cedf73e217035771b626c8d23e776013edbaac21567

        SHA512

        8dcbb8ce09803631ed3c2a4148ffbfe550b09ece8016b2347d224c7e226422c4f3c74efbc3875a867e2cae60a4abadfc4a4f409d9f07453d447edd9d0209ede7

      • \??\c:\Users\Admin\AppData\Local\Temp\xqpj_hwu.0.cs

        Filesize

        208KB

        MD5

        1a3b6db738b288eafad1fc03bfa23456

        SHA1

        aa716904b60d109cb1024312114feb510449ccc6

        SHA256

        013e0c4a9b160da554835caeac32c392036dab927dc73d5f83ea6034e5f73a27

        SHA512

        178c018799a565bff5b48515be7282753c41ffb1417a170fabbc727fdc5e7e7f7c14e322f6bf507d7c568d20b1964d7c3105e9a5a8a4ab58c16706e18c6ff062

      • \??\c:\Users\Admin\AppData\Local\Temp\xqpj_hwu.cmdline

        Filesize

        347B

        MD5

        98e8f3f8223fcdc3eb01006814d2be92

        SHA1

        a01851544bd4d8f2ba9b6f38593ff3c28f5cb983

        SHA256

        53be26bd5d87649872fd806d59a48fa89611518c1783af97f160d2e6e243a240

        SHA512

        49d46cfa5d529d4e795ba7b52c7518ba07ca66af37f0c3a28a2a90860ce82b54e406f255f618fb89d16ad4da8f5fd71ebe5544220488990e62a6cec5d5553bfe

      • memory/360-79-0x0000000000000000-mapping.dmp

      • memory/960-86-0x00000000741F0000-0x000000007479B000-memory.dmp

        Filesize

        5.7MB

      • memory/960-85-0x0000000077270000-0x00000000773F0000-memory.dmp

        Filesize

        1.5MB

      • memory/960-84-0x00000000009E0000-0x00000000010A0000-memory.dmp

        Filesize

        6.8MB

      • memory/960-83-0x00000000741F0000-0x000000007479B000-memory.dmp

        Filesize

        5.7MB

      • memory/960-67-0x0000000000000000-mapping.dmp

      • memory/1536-76-0x0000000000000000-mapping.dmp

      • memory/1748-60-0x0000000000000000-mapping.dmp

      • memory/1832-63-0x0000000000000000-mapping.dmp

      • memory/2020-58-0x00000000009E0000-0x00000000010A0000-memory.dmp

        Filesize

        6.8MB

      • memory/2020-59-0x0000000077270000-0x00000000773F0000-memory.dmp

        Filesize

        1.5MB

      • memory/2020-57-0x00000000741F0000-0x000000007479B000-memory.dmp

        Filesize

        5.7MB

      • memory/2020-56-0x0000000077270000-0x00000000773F0000-memory.dmp

        Filesize

        1.5MB

      • memory/2020-55-0x0000000075451000-0x0000000075453000-memory.dmp

        Filesize

        8KB

      • memory/2020-54-0x00000000009E0000-0x00000000010A0000-memory.dmp

        Filesize

        6.8MB

      • memory/2020-69-0x00000000741F0000-0x000000007479B000-memory.dmp

        Filesize

        5.7MB