Analysis Overview
SHA256
ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74
Threat Level: Known bad
The file ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74 was found to be: Known bad.
Malicious Activity Summary
Orcus
Orcus main payload
Orcurs Rat Executable
Executes dropped EXE
Loads dropped DLL
Unsigned PE
Enumerates physical storage devices
NTFS ADS
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-06 01:11
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-06 01:11
Reported
2024-01-06 01:13
Platform
win10v2004-20231222-en
Max time kernel
7s
Max time network
103s
Command Line
Signatures
Orcus
Orcus main payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Processes
C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe
"C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe"
C:\Users\Admin\AppData\Local\Temp\menu.exe.exe
"C:\Users\Admin\AppData\Local\Temp\menu.exe.exe"
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C28.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6C27.tmp"
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kxntiiyf.cmdline"
C:\Windows\SysWOW64\WindowsInput.exe
"C:\Windows\SysWOW64\WindowsInput.exe"
C:\Windows\SysWOW64\WindowsInput.exe
"C:\Windows\SysWOW64\WindowsInput.exe" --install
C:\Program Files\Orcus\Orcus.exe
"C:\Program Files\Orcus\Orcus.exe"
C:\Users\Admin\AppData\Roaming\java.exe
"C:\Users\Admin\AppData\Roaming\java.exe" /watchProcess "C:\Program Files\Orcus\Orcus.exe" 2320 "/protectFile"
C:\Users\Admin\AppData\Roaming\java.exe
"C:\Users\Admin\AppData\Roaming\java.exe" /launchSelfAndExit "C:\Program Files\Orcus\Orcus.exe" 2320 /protectFile
C:\Program Files\Orcus\Orcus.exe
"C:\Program Files\Orcus\Orcus.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| N/A | 10.0.2.15:4444 | tcp | |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| N/A | 10.0.2.15:4444 | tcp | |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| N/A | 10.0.2.15:4444 | tcp | |
| US | 8.8.8.8:53 | 104.241.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| GB | 96.17.178.176:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 96.17.178.176:80 | tcp | |
| GB | 96.17.178.176:80 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| GB | 96.17.178.176:80 | tcp | |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| GB | 96.17.178.176:80 | tcp | |
| NL | 52.111.243.31:443 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\menu.exe.exe
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
memory/2960-14-0x000000001B3C0000-0x000000001B41C000-memory.dmp
memory/2960-17-0x000000001B580000-0x000000001B58E000-memory.dmp
memory/2960-18-0x00007FFA582E0000-0x00007FFA58C81000-memory.dmp
memory/2960-20-0x000000001BFF0000-0x000000001C08C000-memory.dmp
memory/2960-19-0x000000001BA80000-0x000000001BF4E000-memory.dmp
memory/2960-13-0x0000000000B30000-0x0000000000B40000-memory.dmp
memory/2960-12-0x00007FFA582E0000-0x00007FFA58C81000-memory.dmp
memory/2960-34-0x000000001C6A0000-0x000000001C6B6000-memory.dmp
memory/2960-39-0x000000001CA90000-0x000000001CAF2000-memory.dmp
memory/2960-38-0x0000000000EB0000-0x0000000000EB8000-memory.dmp
memory/2960-42-0x000000001CBF0000-0x000000001CC0E000-memory.dmp
memory/2960-41-0x000000001D9B0000-0x000000001DAA0000-memory.dmp
memory/2960-43-0x000000001DAB0000-0x000000001DAF9000-memory.dmp
memory/2960-40-0x000000001D3F0000-0x000000001D9AA000-memory.dmp
memory/2960-37-0x0000000000B90000-0x0000000000B98000-memory.dmp
memory/2960-36-0x0000000000E20000-0x0000000000E32000-memory.dmp
memory/2960-44-0x0000000000B30000-0x0000000000B40000-memory.dmp
memory/2960-45-0x000000001DB90000-0x000000001DC00000-memory.dmp
memory/3232-26-0x00000000022D0000-0x00000000022E0000-memory.dmp
memory/2960-46-0x0000000000B30000-0x0000000000B40000-memory.dmp
memory/400-62-0x00000000007A0000-0x00000000007AC000-memory.dmp
memory/400-64-0x0000000001080000-0x0000000001092000-memory.dmp
memory/400-66-0x000000001B3F0000-0x000000001B42C000-memory.dmp
memory/400-65-0x00000000029B0000-0x00000000029C0000-memory.dmp
memory/400-63-0x00007FFA547C0000-0x00007FFA55281000-memory.dmp
memory/400-70-0x00007FFA547C0000-0x00007FFA55281000-memory.dmp
memory/3752-72-0x00007FFA547C0000-0x00007FFA55281000-memory.dmp
memory/3752-73-0x000000001A920000-0x000000001AA2A000-memory.dmp
memory/2960-48-0x000000001DE60000-0x000000001DE80000-memory.dmp
memory/2960-90-0x00007FFA582E0000-0x00007FFA58C81000-memory.dmp
memory/2320-92-0x00007FFA547C0000-0x00007FFA55281000-memory.dmp
memory/2320-93-0x000000001BCA0000-0x000000001BCB0000-memory.dmp
memory/2320-91-0x0000000000EA0000-0x0000000000F8E000-memory.dmp
memory/2320-94-0x00000000032C0000-0x00000000032D2000-memory.dmp
memory/2960-89-0x00007FFA582E0000-0x00007FFA58C81000-memory.dmp
memory/2320-97-0x000000001C310000-0x000000001C35E000-memory.dmp
memory/2320-99-0x000000001C6A0000-0x000000001C6B8000-memory.dmp
memory/2320-100-0x000000001C9F0000-0x000000001CBB2000-memory.dmp
memory/2320-102-0x000000001C0F0000-0x000000001C100000-memory.dmp
memory/1200-118-0x00000000004B0000-0x00000000004B8000-memory.dmp
memory/1200-119-0x0000000074440000-0x0000000074BF0000-memory.dmp
memory/1200-123-0x0000000074440000-0x0000000074BF0000-memory.dmp
memory/2592-124-0x0000000074440000-0x0000000074BF0000-memory.dmp
memory/3136-113-0x000000001B830000-0x000000001B840000-memory.dmp
memory/2320-105-0x000000001BCA0000-0x000000001BCB0000-memory.dmp
memory/3136-101-0x00007FFA547C0000-0x00007FFA55281000-memory.dmp
memory/3752-125-0x00007FFA547C0000-0x00007FFA55281000-memory.dmp
memory/3136-127-0x00007FFA547C0000-0x00007FFA55281000-memory.dmp
memory/2320-128-0x00007FFA547C0000-0x00007FFA55281000-memory.dmp
memory/2320-129-0x000000001BCA0000-0x000000001BCB0000-memory.dmp
memory/2320-130-0x000000001BCA0000-0x000000001BCB0000-memory.dmp
memory/2592-131-0x0000000074440000-0x0000000074BF0000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-06 01:11
Reported
2024-01-06 01:13
Platform
win7-20231129-en
Max time kernel
7s
Max time network
146s
Command Line
Signatures
Orcus
Orcus main payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Orcurs Rat Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\menu.exe.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe | N/A |
Enumerates physical storage devices
NTFS ADS
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Local\Temp\>2K9 B5:AB>2K9 4>:C<5=B.bat | C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Local\Temp\>2K9 B5:AB>2K9 4>:C<5=B.bat | C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2332 wrote to memory of 2564 | N/A | C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe | C:\Users\Admin\AppData\Local\Temp\menu.exe.exe |
| PID 2332 wrote to memory of 2564 | N/A | C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe | C:\Users\Admin\AppData\Local\Temp\menu.exe.exe |
| PID 2332 wrote to memory of 2564 | N/A | C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe | C:\Users\Admin\AppData\Local\Temp\menu.exe.exe |
| PID 2332 wrote to memory of 2564 | N/A | C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe | C:\Users\Admin\AppData\Local\Temp\menu.exe.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe
"C:\Users\Admin\AppData\Local\Temp\ac9b33b420e2e43dd32353bfdbd518be729cd01f94e6c554acc806c53bbf9d74.exe"
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2CCC.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC2CCB.tmp"
C:\Windows\SysWOW64\WindowsInput.exe
"C:\Windows\SysWOW64\WindowsInput.exe" --install
C:\Windows\SysWOW64\WindowsInput.exe
"C:\Windows\SysWOW64\WindowsInput.exe"
C:\Program Files\Orcus\Orcus.exe
"C:\Program Files\Orcus\Orcus.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {EC781C57-DFF9-4334-9E6A-80EE56003F5F} S-1-5-21-3470981204-343661084-3367201002-1000:GLTGRJAG\Admin:Interactive:[1]
C:\Users\Admin\AppData\Roaming\java.exe
"C:\Users\Admin\AppData\Roaming\java.exe" /watchProcess "C:\Program Files\Orcus\Orcus.exe" 1084 "/protectFile"
C:\Users\Admin\AppData\Roaming\java.exe
"C:\Users\Admin\AppData\Roaming\java.exe" /launchSelfAndExit "C:\Program Files\Orcus\Orcus.exe" 1084 /protectFile
C:\Program Files\Orcus\Orcus.exe
"C:\Program Files\Orcus\Orcus.exe"
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\apivk0qh.cmdline"
C:\Users\Admin\AppData\Local\Temp\menu.exe.exe
"C:\Users\Admin\AppData\Local\Temp\menu.exe.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp | |
| N/A | 10.0.2.15:4444 | tcp |
Files
memory/2564-8-0x0000000000280000-0x000000000028E000-memory.dmp
memory/2564-7-0x0000000000AF0000-0x0000000000B4C000-memory.dmp
memory/2564-10-0x0000000002130000-0x00000000021B0000-memory.dmp
memory/2564-15-0x000007FEF5340000-0x000007FEF5CDD000-memory.dmp
memory/2564-24-0x0000000000B70000-0x0000000000B86000-memory.dmp
memory/2564-28-0x0000000000AE0000-0x0000000000AE8000-memory.dmp
memory/2564-27-0x0000000000540000-0x0000000000548000-memory.dmp
memory/2564-26-0x00000000002B0000-0x00000000002C2000-memory.dmp
memory/1748-38-0x00000000003E0000-0x00000000003EC000-memory.dmp
memory/1748-39-0x000007FEED140000-0x000007FEEDB2C000-memory.dmp
memory/2564-32-0x0000000002130000-0x00000000021B0000-memory.dmp
memory/2172-44-0x0000000000CD0000-0x0000000000CDC000-memory.dmp
memory/2172-46-0x0000000019510000-0x0000000019590000-memory.dmp
memory/2172-45-0x000007FEEC750000-0x000007FEED13C000-memory.dmp
memory/1748-42-0x000007FEED140000-0x000007FEEDB2C000-memory.dmp
memory/2564-57-0x000007FEF5340000-0x000007FEF5CDD000-memory.dmp
memory/1084-58-0x000000001AF70000-0x000000001AFF0000-memory.dmp
memory/1084-56-0x000007FEEC750000-0x000007FEED13C000-memory.dmp
memory/1084-55-0x0000000000D70000-0x0000000000E5E000-memory.dmp
memory/1084-61-0x0000000000D00000-0x0000000000D4E000-memory.dmp
memory/1084-62-0x0000000000D50000-0x0000000000D68000-memory.dmp
memory/1084-63-0x0000000002380000-0x0000000002390000-memory.dmp
memory/2720-74-0x000007FEEC750000-0x000007FEED13C000-memory.dmp
memory/956-75-0x0000000000130000-0x0000000000138000-memory.dmp
memory/2720-77-0x000000001B010000-0x000000001B090000-memory.dmp
memory/956-80-0x0000000074170000-0x000000007485E000-memory.dmp
memory/2972-81-0x0000000074170000-0x000000007485E000-memory.dmp
memory/956-76-0x0000000074170000-0x000000007485E000-memory.dmp
memory/1084-64-0x000000001AF70000-0x000000001AFF0000-memory.dmp
memory/2564-9-0x000007FEF5340000-0x000007FEF5CDD000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\menu.exe.exe
| MD5 | b0192788dc200e0fbb86387a2777fb7c |
| SHA1 | a72bb0981cbff3e34fcef2d59ed768c289d97679 |
| SHA256 | 06bcc57616dda2c242ef62c6c1ed600899205a84bf8b9f80559055d2632edbde |
| SHA512 | e6b444f41e31a694556cff5b5ec41e045952b2307bb87b3d95da3662ff622b096280dc0fb0ca55e0f7cec06b28b4efb097bb226b0a9e894b648d3d0c0202ebb4 |
\Users\Admin\AppData\Local\Temp\menu.exe.exe
| MD5 | 45c45ace2d5f711ba816261e9214a8c5 |
| SHA1 | 3fa04e651792277f0d4d1df40ba658dedf86938a |
| SHA256 | e7f858e5b433ee5e797ec9f5068898c2241f961a71a3e0337decec0ae6131ada |
| SHA512 | 0feaa2c2d4069c83503e6338a87be6d23ca70a3e16520ae53389c087ecc6ac2be607b7f5f1b3acad19b265946c36accf473fc75f3e0eb0ccb354e84a6cdd6186 |
memory/2720-82-0x000007FEEC750000-0x000007FEED13C000-memory.dmp
memory/2172-83-0x000007FEEC750000-0x000007FEED13C000-memory.dmp
memory/1084-84-0x000007FEEC750000-0x000007FEED13C000-memory.dmp
memory/1084-85-0x000000001AF70000-0x000000001AFF0000-memory.dmp
memory/1084-86-0x000000001AF70000-0x000000001AFF0000-memory.dmp
memory/2972-87-0x0000000074170000-0x000000007485E000-memory.dmp