Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 10:42
Behavioral task
behavioral1
Sample
LeonTap2-3-1.exe
Resource
win7-20230220-en
General
-
Target
LeonTap2-3-1.exe
-
Size
935KB
-
MD5
5791584fc3bfb6898050e73eb2bf984a
-
SHA1
4061fb087856ce6006f33d18b3cabd5cac27751b
-
SHA256
eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
-
SHA512
db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
SSDEEP
24576:o7x4MROxnFE3bO3errcI0AilFEvxHPJooK:oyMiuoerrcI0AilFEvxHP
Malware Config
Extracted
orcus
LeonTap
192.168.0.105:6969
42367967463b479388163871ade6a80d
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\LeonTap2-3-1-4\LeonTap2-3-1.exe
-
reconnect_delay
10000
-
registry_keyname
LeonTap
-
taskscheduler_taskname
LeonTap
-
watchdog_path
AppData\LeonTap2-3.1.4.exe
Signatures
-
Orcus main payload 4 IoCs
resource yara_rule behavioral2/files/0x00010000000230ee-171.dat family_orcus behavioral2/files/0x00010000000230ee-177.dat family_orcus behavioral2/files/0x00010000000230ee-181.dat family_orcus behavioral2/files/0x00010000000230ee-185.dat family_orcus -
Orcurs Rat Executable 5 IoCs
resource yara_rule behavioral2/memory/4052-133-0x0000000000940000-0x0000000000A30000-memory.dmp orcus behavioral2/files/0x00010000000230ee-171.dat orcus behavioral2/files/0x00010000000230ee-177.dat orcus behavioral2/files/0x00010000000230ee-181.dat orcus behavioral2/files/0x00010000000230ee-185.dat orcus -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation LeonTap2-3-1.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation LeonTap2-3-1.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation LeonTap2-3.1.4.exe -
Executes dropped EXE 7 IoCs
pid Process 4820 WindowsInput.exe 4900 WindowsInput.exe 1692 LeonTap2-3-1.exe 3080 LeonTap2-3-1.exe 4408 LeonTap2-3.1.4.exe 2300 LeonTap2-3.1.4.exe 4744 WindowsInput.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe LeonTap2-3-1.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config LeonTap2-3-1.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe LeonTap2-3-1.exe File opened for modification C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe LeonTap2-3-1.exe File created C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe.config LeonTap2-3-1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1692 LeonTap2-3-1.exe 1692 LeonTap2-3-1.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 2300 LeonTap2-3.1.4.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe 1692 LeonTap2-3-1.exe 2300 LeonTap2-3.1.4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1692 LeonTap2-3-1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1692 LeonTap2-3-1.exe Token: SeDebugPrivilege 4408 LeonTap2-3.1.4.exe Token: SeDebugPrivilege 2300 LeonTap2-3.1.4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1692 LeonTap2-3-1.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1692 LeonTap2-3-1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1692 LeonTap2-3-1.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4820 4052 LeonTap2-3-1.exe 87 PID 4052 wrote to memory of 4820 4052 LeonTap2-3-1.exe 87 PID 4052 wrote to memory of 1692 4052 LeonTap2-3-1.exe 89 PID 4052 wrote to memory of 1692 4052 LeonTap2-3-1.exe 89 PID 4052 wrote to memory of 1692 4052 LeonTap2-3-1.exe 89 PID 1692 wrote to memory of 4408 1692 LeonTap2-3-1.exe 92 PID 1692 wrote to memory of 4408 1692 LeonTap2-3-1.exe 92 PID 1692 wrote to memory of 4408 1692 LeonTap2-3-1.exe 92 PID 4408 wrote to memory of 2300 4408 LeonTap2-3.1.4.exe 95 PID 4408 wrote to memory of 2300 4408 LeonTap2-3.1.4.exe 95 PID 4408 wrote to memory of 2300 4408 LeonTap2-3.1.4.exe 95 PID 1692 wrote to memory of 4744 1692 LeonTap2-3-1.exe 98 PID 1692 wrote to memory of 4744 1692 LeonTap2-3-1.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\LeonTap2-3-1.exe"C:\Users\Admin\AppData\Local\Temp\LeonTap2-3-1.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4820
-
-
C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe"C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\LeonTap2-3.1.4.exe"C:\Users\Admin\AppData\Roaming\LeonTap2-3.1.4.exe" /launchSelfAndExit "C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe" 1692 /protectFile3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Roaming\LeonTap2-3.1.4.exe"C:\Users\Admin\AppData\Roaming\LeonTap2-3.1.4.exe" /watchProcess "C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe" 1692 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --uninstall3⤵
- Executes dropped EXE
PID:4744
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:4900
-
C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe"C:\Program Files (x86)\LeonTap2-3-1-4\LeonTap2-3-1.exe"1⤵
- Executes dropped EXE
PID:3080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
935KB
MD55791584fc3bfb6898050e73eb2bf984a
SHA14061fb087856ce6006f33d18b3cabd5cac27751b
SHA256eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
SHA512db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
Filesize
935KB
MD55791584fc3bfb6898050e73eb2bf984a
SHA14061fb087856ce6006f33d18b3cabd5cac27751b
SHA256eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
SHA512db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
Filesize
935KB
MD55791584fc3bfb6898050e73eb2bf984a
SHA14061fb087856ce6006f33d18b3cabd5cac27751b
SHA256eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
SHA512db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
Filesize
935KB
MD55791584fc3bfb6898050e73eb2bf984a
SHA14061fb087856ce6006f33d18b3cabd5cac27751b
SHA256eac3763edc051d25bf09155c08bc5654e4792aae33776d1fab431c32f391bf8f
SHA512db7e92ec96299ec33b7af24420aab44f4ab136a9a273705f4fc7e3b4276214bb452a34d64318f29a03fb3545649deb3942edc32886eab8cb6385ce77ae15e2b5
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
1KB
MD545775761fda1911d0778be6905f01020
SHA1494bbe686ecb5794080c44c0dd849fdeeb93c618
SHA256e655ce5a6a15df7f9e4fed2c6ddfbc4d3b4b140c249101e739d87a5b510b03e8
SHA512aa3231328ab5f433a7cddedcbb4c024d7301ed30f6c3fa69709f6a5858163ce163c6adfc47df10aaed0276f6ae917cbbd7d841e0d48ee2f9038e8f985d1b7fc5
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
1KB
MD50862068e07fbc20cf7ff8b2303b68a39
SHA1781f903c4bd26e007198ddc8aab8951565a43fbd
SHA256191c00104fbe0e83d09956dbb759623de846a8c3a5e35fb4e7c0a731c5796f60
SHA512fc20538554d8c8d7d9cd791fb438982b70da5e72651f679b3101615eda469e7ab110207cbc35317403dc9ef7fab9dc5f517e4c8422f7bea46313c7ebc9b8ae91
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad