Analysis
-
max time kernel
62s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2024 13:36
Behavioral task
behavioral1
Sample
rat.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
rat.exe
Resource
win10v2004-20231222-en
General
-
Target
rat.exe
-
Size
1.8MB
-
MD5
8ad0919a0ee7cba7298d009d4b58e3ff
-
SHA1
f75c3c9f06aa11b72db556d259b40a11d685ac11
-
SHA256
798159895032344c910b1d937ebda40fafeb2c657e3039c49c0999d77a73f75f
-
SHA512
23d50fc6006cb610a35cacdf29fee5a074993eb3b3e3f3746d78e9c621fb41c7ac0dda24fd4be4412b3a9915fd93cd1f46fa6f7a476bf53a8cee370939a2a064
-
SSDEEP
49152:kJuHrhm4SEHZF6qXyoU7Ej44FoGl3RRZr7NoazWVgUIRFSO1SSQ:CMrh3JHZF6VoUoj4+7fNo
Malware Config
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x00060000000231f4-42.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/memory/3532-0-0x0000000000BF0000-0x0000000000F48000-memory.dmp orcus behavioral2/files/0x00060000000231f4-42.dat orcus -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Orcus.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Sys322.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation rat.exe -
Executes dropped EXE 7 IoCs
pid Process 1584 WindowsInput.exe 1940 WindowsInput.exe 4492 Orcus.exe 4108 Orcus.exe 316 Sys322.exe 3480 Sys322.exe 968 WindowsInput.exe -
Loads dropped DLL 11 IoCs
pid Process 4492 Orcus.exe 4492 Orcus.exe 4492 Orcus.exe 4492 Orcus.exe 4492 Orcus.exe 4492 Orcus.exe 4492 Orcus.exe 4492 Orcus.exe 4492 Orcus.exe 4492 Orcus.exe 4492 Orcus.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System3222 = "\"C:\\Program Files (x86)\\Orcus\\Orcus.exe\"" Orcus.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 13 4.tcp.eu.ngrok.io -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe rat.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config rat.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WindowsInput.exe.log WindowsInput.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3532 rat.exe 3532 rat.exe 4492 Orcus.exe 4492 Orcus.exe 4108 Orcus.exe 4108 Orcus.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Orcus\Orcus.exe rat.exe File opened for modification C:\Program Files (x86)\Orcus\Orcus.exe rat.exe File created C:\Program Files (x86)\Orcus\Orcus.exe.config rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3480 Sys322.exe 3480 Sys322.exe 4492 Orcus.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 4492 Orcus.exe 3480 Sys322.exe 3480 Sys322.exe 4492 Orcus.exe 4492 Orcus.exe 3480 Sys322.exe 3480 Sys322.exe 4492 Orcus.exe 4492 Orcus.exe 3480 Sys322.exe 3480 Sys322.exe 4492 Orcus.exe 4492 Orcus.exe 3480 Sys322.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe 3480 Sys322.exe 4492 Orcus.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4492 Orcus.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4492 Orcus.exe Token: SeDebugPrivilege 316 Sys322.exe Token: SeDebugPrivilege 3480 Sys322.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4492 Orcus.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4492 Orcus.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4492 Orcus.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3532 wrote to memory of 1584 3532 rat.exe 84 PID 3532 wrote to memory of 1584 3532 rat.exe 84 PID 3532 wrote to memory of 4492 3532 rat.exe 88 PID 3532 wrote to memory of 4492 3532 rat.exe 88 PID 3532 wrote to memory of 4492 3532 rat.exe 88 PID 4492 wrote to memory of 316 4492 Orcus.exe 92 PID 4492 wrote to memory of 316 4492 Orcus.exe 92 PID 4492 wrote to memory of 316 4492 Orcus.exe 92 PID 316 wrote to memory of 3480 316 Sys322.exe 93 PID 316 wrote to memory of 3480 316 Sys322.exe 93 PID 316 wrote to memory of 3480 316 Sys322.exe 93 PID 4492 wrote to memory of 968 4492 Orcus.exe 98 PID 4492 wrote to memory of 968 4492 Orcus.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\rat.exe"C:\Users\Admin\AppData\Local\Temp\rat.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1584
-
-
C:\Program Files (x86)\Orcus\Orcus.exe"C:\Program Files (x86)\Orcus\Orcus.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Roaming\Sys322.exe"C:\Users\Admin\AppData\Roaming\Sys322.exe" /launchSelfAndExit "C:\Program Files (x86)\Orcus\Orcus.exe" 4492 /protectFile3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Roaming\Sys322.exe"C:\Users\Admin\AppData\Roaming\Sys322.exe" /watchProcess "C:\Program Files (x86)\Orcus\Orcus.exe" 4492 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --uninstall3⤵
- Executes dropped EXE
PID:968
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1940
-
C:\Program Files (x86)\Orcus\Orcus.exe"C:\Program Files (x86)\Orcus\Orcus.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD58ad0919a0ee7cba7298d009d4b58e3ff
SHA1f75c3c9f06aa11b72db556d259b40a11d685ac11
SHA256798159895032344c910b1d937ebda40fafeb2c657e3039c49c0999d77a73f75f
SHA51223d50fc6006cb610a35cacdf29fee5a074993eb3b3e3f3746d78e9c621fb41c7ac0dda24fd4be4412b3a9915fd93cd1f46fa6f7a476bf53a8cee370939a2a064
-
Filesize
2KB
MD578ffbfd38b4ab75e03596bbb2d321e25
SHA11b99ba3cfa6389b8483b36b28836aca4773845e4
SHA2566a6a889f671eea1112a70756ae849bc1c32357ac2818bfa79db84bbbb9813a5d
SHA512e18ff531f792282d0efa0d4264daa36e2d0112ac6d06eabfeb98ffd78570583a602defe3e71332d8801294dc90a2af9a8cdc1e1d0b9c5d0264c584d775cf0243
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
125KB
MD52b44c70c49b70d797fbb748158b5d9bb
SHA193e00e6527e461c45c7868d14cf05c007e478081
SHA2563762d43c83af69cd38c9341a927ca6bd00f6bae8217c874d693047d6df4705bf
SHA512faced62f6ecbfa2ee0d7a47e300302d23030d1f28758cbe9c442e9d8d4f8359c59088aa6237a28103e43d248c8efc7eeaf2c184028701b752df6cce92d6854d0
-
Filesize
271KB
MD598eb5ba5871acdeaebf3a3b0f64be449
SHA1c965284f60ef789b00b10b3df60ee682b4497de3
SHA256d7617d926648849cbfef450b8f48e458ee52e2793fb2251a30094b778aa8848c
SHA512a60025e304713d333e4b82b2d0be28087950688b049c98d2db5910c00b8d45b92e16d25ac8a58ff1318de019de3a9a00c7cbf8a6ad4b5bb1cb175dafa1b9bea2
-
Filesize
338KB
MD5934da0e49208d0881c44fe19d5033840
SHA1a19c5a822e82e41752a08d3bd9110db19a8a5016
SHA25602da4af8cd4a8de19d816000caaae885e676b9e52f136ff071a279c2b8ad34c7
SHA512de62f629c2299b50af62893244a28895d63b78138c8632449984306f45de16bd01076eadbb0d75a700215e970c1df731e202ea640236c0f0da6ed15146193b59
-
Filesize
247KB
MD5ffb4b61cc11bec6d48226027c2c26704
SHA1fa8b9e344accbdc4dffa9b5d821d23f0716da29e
SHA256061542ff3fb36039b7bbffdf3e07b66176b264c1dfd834a14b09c08620717303
SHA51248aa6130bf1f5bd6de19256bbdf754c0158b43dd122cec47bb801a7a7b56f2da268bfdec24d135621764a23278ead3dcc35911a057e2dfa55a348bae8ef7b8a9
-
Filesize
1.3MB
MD5ac6acc235ebef6374bed71b37e322874
SHA1a267baad59cd7352167636836bad4b971fcd6b6b
SHA256047b042cebf4c851f0d14f85f16ce952f03e48c20362d4ed9390875d4900fe96
SHA51272ac8b8c8f27264cc261297c325d14a0be2084d007c6132ab8402d87f912fe9189cb074db11625d9f86d29a6188f22a89e58ae45c9131fac4522473567017081
-
Filesize
646KB
MD582898ed19da89d7d44e280a3ced95e9b
SHA1eec0af5733c642eac8c5e08479f462d1ec1ed4db
SHA2565f4b9f8360764d75c9faaecd94f6d200c54611b33064cd216e363d973dae7c29
SHA512ee7b884ce7d7366ee28fb17721b6c89bd4eba8fb373cdbb483e26a4ed7a74ab5db847513c54704d753d77a7e18b1fb9fee90ed6bbc0540bff702273fda36b682
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
7KB
MD5362ce475f5d1e84641bad999c16727a0
SHA16b613c73acb58d259c6379bd820cca6f785cc812
SHA2561f78f1056761c6ebd8965ed2c06295bafa704b253aff56c492b93151ab642899
SHA5127630e1629cf4abecd9d3ddea58227b232d5c775cb480967762a6a6466be872e1d57123b08a6179fe1cfbc09403117d0f81bc13724f259a1d25c1325f1eac645b
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad