Analysis
-
max time kernel
2s -
max time network
295s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
Calculator14VGA.exe
Resource
win7-20231215-en
General
-
Target
Calculator14VGA.exe
-
Size
1.7MB
-
MD5
4c969f76c5c1150669e1a54cfa20ed1c
-
SHA1
037f9b972c732222ba259754f75868caaefd03a3
-
SHA256
be235c670fa83853dfdd3c668df58da88289d2a8ef44e734fbc646f27cba9588
-
SHA512
5246dd5f6ee9c747360431bc140779a4d316af51186c6bcc0d6d0f3bb20e633cbdee2296432fd08e4f9234089bbcb5c868e8c9d75b05b523af53c5d34cc3ea15
-
SSDEEP
49152:ODQxkKWUoI8cQFrqxevo2NdQNBwLPVhF6WT:j2KWUoILC3nQDwrVn6WT
Malware Config
Extracted
orcus
tg
10.0.2.15:6969
a867e8d19abf423285769fa6d8e47601
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Java8update\updaterjava9.exe
-
reconnect_delay
10000
-
registry_keyname
RobloxJavaMaster
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\RobloxUpdater04.exe
Signatures
-
Orcurs Rat Executable 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1384-1-0x00000000008E0000-0x0000000000D54000-memory.dmp orcus behavioral1/memory/2796-43-0x0000000001100000-0x0000000001574000-memory.dmp orcus behavioral1/memory/1384-42-0x00000000008E0000-0x0000000000D54000-memory.dmp orcus behavioral1/memory/2796-40-0x0000000001100000-0x0000000001574000-memory.dmp orcus behavioral1/memory/2580-64-0x0000000001100000-0x0000000001574000-memory.dmp orcus behavioral1/memory/2580-76-0x0000000001100000-0x0000000001574000-memory.dmp orcus -
Executes dropped EXE 3 IoCs
Processes:
WindowsInput.exeWindowsInput.exeupdaterjava9.exepid process 1424 WindowsInput.exe 2288 WindowsInput.exe 2796 updaterjava9.exe -
Loads dropped DLL 2 IoCs
Processes:
Calculator14VGA.exepid process 1384 Calculator14VGA.exe 1384 Calculator14VGA.exe -
Drops file in System32 directory 3 IoCs
Processes:
WindowsInput.exeCalculator14VGA.exedescription ioc process File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe Calculator14VGA.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config Calculator14VGA.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Calculator14VGA.exeupdaterjava9.exepid process 1384 Calculator14VGA.exe 2796 updaterjava9.exe 2796 updaterjava9.exe -
Drops file in Program Files directory 3 IoCs
Processes:
Calculator14VGA.exedescription ioc process File created C:\Program Files (x86)\Java8update\updaterjava9.exe.config Calculator14VGA.exe File created C:\Program Files (x86)\Java8update\updaterjava9.exe Calculator14VGA.exe File opened for modification C:\Program Files (x86)\Java8update\updaterjava9.exe Calculator14VGA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Calculator14VGA.exeupdaterjava9.exepid process 1384 Calculator14VGA.exe 2796 updaterjava9.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Calculator14VGA.exedescription pid process target process PID 1384 wrote to memory of 1424 1384 Calculator14VGA.exe WindowsInput.exe PID 1384 wrote to memory of 1424 1384 Calculator14VGA.exe WindowsInput.exe PID 1384 wrote to memory of 1424 1384 Calculator14VGA.exe WindowsInput.exe PID 1384 wrote to memory of 1424 1384 Calculator14VGA.exe WindowsInput.exe PID 1384 wrote to memory of 2796 1384 Calculator14VGA.exe updaterjava9.exe PID 1384 wrote to memory of 2796 1384 Calculator14VGA.exe updaterjava9.exe PID 1384 wrote to memory of 2796 1384 Calculator14VGA.exe updaterjava9.exe PID 1384 wrote to memory of 2796 1384 Calculator14VGA.exe updaterjava9.exe PID 1384 wrote to memory of 2796 1384 Calculator14VGA.exe updaterjava9.exe PID 1384 wrote to memory of 2796 1384 Calculator14VGA.exe updaterjava9.exe PID 1384 wrote to memory of 2796 1384 Calculator14VGA.exe updaterjava9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Calculator14VGA.exe"C:\Users\Admin\AppData\Local\Temp\Calculator14VGA.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Program Files (x86)\Java8update\updaterjava9.exe"C:\Program Files (x86)\Java8update\updaterjava9.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\RobloxUpdater04.exe"C:\Users\Admin\AppData\Roaming\RobloxUpdater04.exe" /watchProcess "C:\Program Files (x86)\Java8update\updaterjava9.exe" 2796 "/protectFile"1⤵
-
C:\Users\Admin\AppData\Roaming\RobloxUpdater04.exe"C:\Users\Admin\AppData\Roaming\RobloxUpdater04.exe" /launchSelfAndExit "C:\Program Files (x86)\Java8update\updaterjava9.exe" 2796 /protectFile1⤵
-
C:\Program Files (x86)\Java8update\updaterjava9.exe"C:\Program Files (x86)\Java8update\updaterjava9.exe"1⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {2D4974E8-121E-4E7A-B72E-FB6B9273ED61} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1384-44-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/1384-1-0x00000000008E0000-0x0000000000D54000-memory.dmpFilesize
4.5MB
-
memory/1384-0-0x00000000008E0000-0x0000000000D54000-memory.dmpFilesize
4.5MB
-
memory/1384-3-0x0000000005870000-0x00000000058B0000-memory.dmpFilesize
256KB
-
memory/1384-42-0x00000000008E0000-0x0000000000D54000-memory.dmpFilesize
4.5MB
-
memory/1384-4-0x0000000000700000-0x000000000070E000-memory.dmpFilesize
56KB
-
memory/1384-8-0x0000000002540000-0x0000000002548000-memory.dmpFilesize
32KB
-
memory/1384-2-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/1384-6-0x00000000008D0000-0x00000000008E2000-memory.dmpFilesize
72KB
-
memory/1384-35-0x0000000006B50000-0x0000000006FC4000-memory.dmpFilesize
4.5MB
-
memory/1384-7-0x0000000002530000-0x0000000002538000-memory.dmpFilesize
32KB
-
memory/1384-5-0x00000000053C0000-0x000000000541C000-memory.dmpFilesize
368KB
-
memory/1424-23-0x000007FEF5270000-0x000007FEF5C5C000-memory.dmpFilesize
9.9MB
-
memory/1424-20-0x000000001B2C0000-0x000000001B340000-memory.dmpFilesize
512KB
-
memory/1424-19-0x000007FEF5270000-0x000007FEF5C5C000-memory.dmpFilesize
9.9MB
-
memory/1424-18-0x00000000008E0000-0x00000000008EC000-memory.dmpFilesize
48KB
-
memory/1536-83-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/1536-72-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/1576-68-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/1576-67-0x0000000000F50000-0x0000000000F58000-memory.dmpFilesize
32KB
-
memory/1576-73-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/2288-74-0x0000000000E70000-0x0000000000EF0000-memory.dmpFilesize
512KB
-
memory/2288-65-0x000007FEF4880000-0x000007FEF526C000-memory.dmpFilesize
9.9MB
-
memory/2288-25-0x0000000000F00000-0x0000000000F0C000-memory.dmpFilesize
48KB
-
memory/2288-26-0x000007FEF4880000-0x000007FEF526C000-memory.dmpFilesize
9.9MB
-
memory/2580-69-0x0000000005B10000-0x0000000005B50000-memory.dmpFilesize
256KB
-
memory/2580-77-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/2580-55-0x0000000001100000-0x0000000001574000-memory.dmpFilesize
4.5MB
-
memory/2580-64-0x0000000001100000-0x0000000001574000-memory.dmpFilesize
4.5MB
-
memory/2580-66-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/2580-76-0x0000000001100000-0x0000000001574000-memory.dmpFilesize
4.5MB
-
memory/2796-51-0x00000000033E0000-0x00000000033F0000-memory.dmpFilesize
64KB
-
memory/2796-49-0x00000000032E0000-0x000000000332E000-memory.dmpFilesize
312KB
-
memory/2796-40-0x0000000001100000-0x0000000001574000-memory.dmpFilesize
4.5MB
-
memory/2796-41-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/2796-46-0x0000000002DD0000-0x0000000002DE2000-memory.dmpFilesize
72KB
-
memory/2796-45-0x0000000005780000-0x00000000057C0000-memory.dmpFilesize
256KB
-
memory/2796-43-0x0000000001100000-0x0000000001574000-memory.dmpFilesize
4.5MB
-
memory/2796-50-0x0000000003380000-0x0000000003398000-memory.dmpFilesize
96KB
-
memory/2796-56-0x0000000005780000-0x00000000057C0000-memory.dmpFilesize
256KB
-
memory/2796-79-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/2796-80-0x0000000005780000-0x00000000057C0000-memory.dmpFilesize
256KB
-
memory/2796-81-0x0000000005780000-0x00000000057C0000-memory.dmpFilesize
256KB
-
memory/2796-37-0x0000000001100000-0x0000000001574000-memory.dmpFilesize
4.5MB