Malware Analysis Report

2025-03-15 06:49

Sample ID 240109-w3xf6sgfd2
Target eb96f321bac830019d44e74dc71e7d5e.exe
SHA256 3ba4240f334de3b93655a053fc2574c0228757a9948354d3e97637ab36be7700
Tags
orcus rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3ba4240f334de3b93655a053fc2574c0228757a9948354d3e97637ab36be7700

Threat Level: Known bad

The file eb96f321bac830019d44e74dc71e7d5e.exe was found to be: Known bad.

Malicious Activity Summary

orcus rat spyware stealer

Orcus

Orcurs Rat Executable

Loads dropped DLL

Executes dropped EXE

Suspicious use of NtSetInformationThreadHideFromDebugger

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious use of SendNotifyMessage

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-01-09 18:27

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-09 18:27

Reported

2024-01-09 18:30

Platform

win7-20231215-en

Max time kernel

150s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2756 wrote to memory of 2924 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2756 wrote to memory of 2924 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2756 wrote to memory of 2924 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2756 wrote to memory of 2924 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2084 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2084 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2084 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2084 wrote to memory of 2824 N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2824 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2824 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2824 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2824 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 932 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 932 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 932 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 932 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 932 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 932 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 932 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 932 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2924 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe
PID 2924 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe
PID 2924 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe
PID 2924 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe
PID 1484 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe
PID 1484 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe
PID 1484 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe
PID 1484 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe
PID 2652 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2516 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2516 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2516 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2516 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2652 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2180 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2180 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2180 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2180 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2652 wrote to memory of 1548 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 1548 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 1548 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 1548 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 1548 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 1548 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 1548 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 1548 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2652 wrote to memory of 1260 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 1260 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 1260 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 1260 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 1260 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 1260 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 1260 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 1260 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe
PID 2652 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2652 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

Processes

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {6A31A45B-3D97-44CF-92FD-13EB43DE9357} S-1-5-21-3427588347-1492276948-3422228430-1000:QVMRJQQO\Admin:Interactive:[1]

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2084

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /watchProcess "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2084

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe" /launchSelfAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2924

C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog (1).exe" /watchProcess "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2924

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchClientAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 2652

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" /keepAlive 2652

Network

Country Destination Domain Proto
N/A 127.0.0.1:10134 tcp
N/A 127.0.0.1:10134 tcp
N/A 192.168.0.9:10134 tcp
N/A 127.0.0.1:10134 tcp
N/A 192.168.0.9:10134 tcp
N/A 127.0.0.1:10134 tcp
N/A 192.168.0.9:10134 tcp
N/A 127.0.0.1:10134 tcp
N/A 192.168.0.9:10134 tcp
N/A 127.0.0.1:10134 tcp
N/A 192.168.0.9:10134 tcp
N/A 127.0.0.1:10134 tcp
N/A 192.168.0.9:10134 tcp

Files

memory/2084-0-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2084-1-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2084-2-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/2084-3-0x0000000005540000-0x0000000005580000-memory.dmp

memory/2084-4-0x00000000007F0000-0x00000000007FE000-memory.dmp

memory/2084-5-0x0000000002DE0000-0x0000000002E3C000-memory.dmp

memory/2084-6-0x0000000000870000-0x0000000000882000-memory.dmp

memory/2084-7-0x00000000053D0000-0x000000000541E000-memory.dmp

memory/2084-8-0x0000000000EC0000-0x0000000000ED8000-memory.dmp

memory/2084-9-0x0000000000E20000-0x0000000000E30000-memory.dmp

memory/2924-12-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2924-13-0x0000000074800000-0x0000000074EEE000-memory.dmp

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

MD5 913967b216326e36a08010fb70f9dba3
SHA1 7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA256 8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512 c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe.config

MD5 a2b76cea3a59fa9af5ea21ff68139c98
SHA1 35d76475e6a54c168f536e30206578babff58274
SHA256 f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512 b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

memory/2824-22-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/2824-21-0x0000000000040000-0x0000000000048000-memory.dmp

memory/2924-24-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2924-26-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2652-27-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/2924-28-0x0000000005500000-0x0000000005540000-memory.dmp

memory/2824-29-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/2084-31-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2084-33-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/932-34-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/932-35-0x0000000004B00000-0x0000000004F4E000-memory.dmp

memory/1640-36-0x0000000001120000-0x000000000156E000-memory.dmp

memory/932-37-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1640-38-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1640-39-0x0000000001120000-0x000000000156E000-memory.dmp

memory/1640-40-0x0000000001120000-0x000000000156E000-memory.dmp

memory/1640-41-0x0000000005090000-0x00000000050D0000-memory.dmp

memory/2924-42-0x00000000009C0000-0x00000000009D2000-memory.dmp

memory/2924-43-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2924-54-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1484-53-0x0000000001060000-0x0000000001068000-memory.dmp

memory/1484-55-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1484-57-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1976-59-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1640-61-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1640-62-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2516-64-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/2652-65-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1776-66-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2516-67-0x0000000004AD0000-0x0000000004F1E000-memory.dmp

memory/2516-68-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1776-69-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1776-70-0x0000000001120000-0x000000000156E000-memory.dmp

memory/1776-71-0x0000000001120000-0x000000000156E000-memory.dmp

memory/1776-72-0x0000000005570000-0x00000000055B0000-memory.dmp

memory/1776-74-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1776-75-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2180-77-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/2180-78-0x0000000004A20000-0x0000000004E6E000-memory.dmp

memory/2952-79-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2180-80-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/2952-82-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2952-81-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1976-83-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/2952-84-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2952-86-0x0000000000A50000-0x0000000000A90000-memory.dmp

memory/2952-88-0x0000000001120000-0x000000000156E000-memory.dmp

memory/2952-89-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1548-91-0x0000000074800000-0x0000000074EEE000-memory.dmp

memory/1548-92-0x0000000004EC0000-0x000000000530E000-memory.dmp

memory/2192-93-0x0000000001120000-0x000000000156E000-memory.dmp

memory/1548-94-0x0000000074800000-0x0000000074EEE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-09 18:27

Reported

2024-01-09 18:30

Platform

win10v2004-20231215-en

Max time kernel

1s

Max time network

113s

Command Line

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

"C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe"

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 3644

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /watchProcess "C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe" 3644

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

C:\Users\Admin\AppData\Local\Temp\eb96f321bac830019d44e74dc71e7d5e.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 83.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
N/A 192.168.0.9:10134 tcp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
N/A 127.0.0.1:10134 tcp
US 8.8.8.8:53 100.5.17.2.in-addr.arpa udp
GB 96.17.179.50:80 tcp
GB 96.17.179.50:80 tcp
GB 96.17.178.202:80 tcp
GB 96.17.178.202:80 tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 202.178.17.96.in-addr.arpa udp
N/A 192.168.0.9:10134 tcp
GB 96.17.178.202:80 tcp
GB 96.17.178.202:80 tcp
N/A 192.168.0.9:10134 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/3644-0-0x00000000007D0000-0x0000000000C1E000-memory.dmp

memory/3644-2-0x0000000074260000-0x0000000074A10000-memory.dmp

memory/3644-5-0x0000000005C20000-0x0000000005C7C000-memory.dmp

memory/3644-7-0x0000000005DB0000-0x0000000005E42000-memory.dmp

memory/3644-6-0x0000000006240000-0x00000000067E4000-memory.dmp

memory/3644-4-0x0000000005C10000-0x0000000005C1E000-memory.dmp

memory/3644-3-0x0000000005C00000-0x0000000005C10000-memory.dmp

memory/3644-9-0x00000000061B0000-0x00000000061FE000-memory.dmp

memory/3644-8-0x00000000061A0000-0x00000000061B2000-memory.dmp

memory/3644-1-0x00000000007D0000-0x0000000000C1E000-memory.dmp

memory/3644-10-0x0000000006A90000-0x0000000006AA8000-memory.dmp

memory/3644-12-0x0000000006C20000-0x0000000006C30000-memory.dmp

memory/3180-11-0x00000000007D0000-0x0000000000C1E000-memory.dmp

memory/3644-13-0x0000000006E30000-0x0000000006E3A000-memory.dmp

memory/3180-16-0x0000000074260000-0x0000000074A10000-memory.dmp

memory/3180-17-0x00000000007D0000-0x0000000000C1E000-memory.dmp

memory/3180-26-0x0000000005590000-0x00000000055A0000-memory.dmp

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe.config

MD5 a2b76cea3a59fa9af5ea21ff68139c98
SHA1 35d76475e6a54c168f536e30206578babff58274
SHA256 f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512 b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

memory/3776-32-0x0000000074260000-0x0000000074A10000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OrcusWatchdog.exe.log

MD5 4eaca4566b22b01cd3bc115b9b0b2196
SHA1 e743e0792c19f71740416e7b3c061d9f1336bf94
SHA256 34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512 bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

memory/1160-37-0x0000000074260000-0x0000000074A10000-memory.dmp

memory/3776-36-0x0000000074260000-0x0000000074A10000-memory.dmp

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

MD5 913967b216326e36a08010fb70f9dba3
SHA1 7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA256 8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512 c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

memory/3776-31-0x0000000000EB0000-0x0000000000EB8000-memory.dmp

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

MD5 d3ea3f306e737d3521d6cd2dd54d9c9b
SHA1 bf540ec262dd83f3f395f46491eac985eadad803
SHA256 dd96b05a11e229ee3242494be672add8dc8439fa6a2e8a905292770d15c1c58e
SHA512 eccd37500a829591e3114b7099053301804dc860ae115673fbfc9b3b608b61b23d1892c63b4007aaa8608a0fb2009eb61a2f4466edcf78afdda013da642007e1

memory/3180-19-0x00000000007D0000-0x0000000000C1E000-memory.dmp

memory/3180-40-0x00000000007D0000-0x0000000000C1E000-memory.dmp

memory/3180-41-0x0000000074260000-0x0000000074A10000-memory.dmp

memory/3644-42-0x00000000007D0000-0x0000000000C1E000-memory.dmp

memory/3644-44-0x0000000074260000-0x0000000074A10000-memory.dmp

memory/3644-45-0x0000000005C00000-0x0000000005C10000-memory.dmp

memory/1160-47-0x0000000074260000-0x0000000074A10000-memory.dmp