Malware Analysis Report

2025-01-22 15:04

Sample ID 240212-bm61fsgb52
Target 04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f
SHA256 04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f
Tags
orcus rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f

Threat Level: Known bad

The file 04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f was found to be: Known bad.

Malicious Activity Summary

orcus rat spyware stealer

Orcus main payload

Orcurs Rat Executable

Orcus family

Orcus

Orcurs Rat Executable

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Drops file in Program Files directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-12 01:16

Signatures

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Orcus family

orcus

Orcus main payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-12 01:16

Reported

2024-02-12 01:19

Platform

win7-20231215-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcus main payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Orcus\Orcus.exe C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe N/A
File opened for modification C:\Program Files (x86)\Orcus\Orcus.exe C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe N/A
File created C:\Program Files (x86)\Orcus\Orcus.exe.config C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1708 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe C:\Program Files (x86)\Orcus\Orcus.exe
PID 1708 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe C:\Program Files (x86)\Orcus\Orcus.exe
PID 1708 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe C:\Program Files (x86)\Orcus\Orcus.exe
PID 1708 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe C:\Program Files (x86)\Orcus\Orcus.exe
PID 2784 wrote to memory of 2608 N/A C:\Windows\system32\taskeng.exe C:\Program Files (x86)\Orcus\Orcus.exe
PID 2784 wrote to memory of 2608 N/A C:\Windows\system32\taskeng.exe C:\Program Files (x86)\Orcus\Orcus.exe
PID 2784 wrote to memory of 2608 N/A C:\Windows\system32\taskeng.exe C:\Program Files (x86)\Orcus\Orcus.exe
PID 2784 wrote to memory of 2608 N/A C:\Windows\system32\taskeng.exe C:\Program Files (x86)\Orcus\Orcus.exe
PID 2732 wrote to memory of 2152 N/A C:\Program Files (x86)\Orcus\Orcus.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2732 wrote to memory of 2152 N/A C:\Program Files (x86)\Orcus\Orcus.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2732 wrote to memory of 2152 N/A C:\Program Files (x86)\Orcus\Orcus.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2732 wrote to memory of 2152 N/A C:\Program Files (x86)\Orcus\Orcus.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2152 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2152 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2152 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
PID 2152 wrote to memory of 2952 N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

Processes

C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe

"C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe"

C:\Program Files (x86)\Orcus\Orcus.exe

"C:\Program Files (x86)\Orcus\Orcus.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {8E4A6A32-A320-4981-813B-2FC6B6984D22} S-1-5-21-1603059206-2004189698-4139800220-1000:AILVMYUM\Admin:Interactive:[1]

C:\Program Files (x86)\Orcus\Orcus.exe

"C:\Program Files (x86)\Orcus\Orcus.exe"

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchSelfAndExit "C:\Program Files (x86)\Orcus\Orcus.exe" 2732

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /watchProcess "C:\Program Files (x86)\Orcus\Orcus.exe" 2732

Network

Country Destination Domain Proto
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp

Files

memory/1708-0-0x00000000012C0000-0x00000000013AA000-memory.dmp

memory/1708-1-0x00000000746A0000-0x0000000074D8E000-memory.dmp

memory/1708-2-0x0000000004BD0000-0x0000000004C10000-memory.dmp

memory/1708-3-0x0000000000370000-0x000000000037E000-memory.dmp

memory/1708-4-0x0000000000A20000-0x0000000000A7C000-memory.dmp

memory/1708-5-0x00000000004C0000-0x00000000004D2000-memory.dmp

memory/1708-6-0x00000000004E0000-0x00000000004E8000-memory.dmp

memory/1708-7-0x0000000000530000-0x0000000000538000-memory.dmp

\Program Files (x86)\Orcus\Orcus.exe

MD5 ba17586b1ed01ca8e65d734060d9ea0e
SHA1 952e46759574e77217410fca0302a37bb76dd509
SHA256 04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f
SHA512 b8a4c103abd7c43807f34d5274bbeeffcfdd8968ddff35c1195cbe19c3831e405e75f0f5ac8c132d6bbef794d45ae3bb6de36fdb1172b199f7424b56bc6e8b34

C:\Program Files (x86)\Orcus\Orcus.exe

MD5 0c2443e08dfb5fdf416dfc77de6c539e
SHA1 b245d35d4158e65c9f9a8a31e84ca787a9d3aed6
SHA256 9781b1244416de8dd2a343a1e8eb9b9d9f4c51c8aa868a9302a9589d4297408b
SHA512 1b92f5c0439b5928e4e2b2eb0ca5d159636cf202d60b52e141bc5d2635d124b5a2386b54767c8fffcb5ec6967824a4fda73ce6a03503452a444ed02a3ba7121a

C:\Program Files (x86)\Orcus\Orcus.exe.config

MD5 a2b76cea3a59fa9af5ea21ff68139c98
SHA1 35d76475e6a54c168f536e30206578babff58274
SHA256 f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512 b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

memory/2732-18-0x00000000746A0000-0x0000000074D8E000-memory.dmp

memory/1708-17-0x00000000746A0000-0x0000000074D8E000-memory.dmp

memory/2732-20-0x0000000001110000-0x00000000011FA000-memory.dmp

memory/2732-21-0x0000000004960000-0x00000000049A0000-memory.dmp

C:\Users\Admin\AppData\Roaming\Orcus\err_6ae3b1fbe2324f35ae733bf37bdd3f69.dat

MD5 30f8875a7faf39b6e2b31ede94c4f1f4
SHA1 92275f2450cd58e4372e2cba0fdd2150a3b11645
SHA256 21f43a576461bd6ec240df4b67dd55ed1c1c43cf0f1f676adbe9798146ec3ed5
SHA512 d74aef099aa240b4bf1aadddcb38d79a8ddf7840d19700514e8c654f0f5a7dff22d0af55ca8ffa26aac35834d1c2a29f6be77f75549fc7ba364cfda6e9f28ede

memory/2732-24-0x0000000000BF0000-0x0000000000C3E000-memory.dmp

memory/2732-25-0x0000000000D60000-0x0000000000D78000-memory.dmp

memory/2732-26-0x00000000010E0000-0x00000000010F0000-memory.dmp

C:\Program Files (x86)\Orcus\Orcus.exe

MD5 31a43dc279e8aa74df8f62e94b6ca6ba
SHA1 266feb14f676ff5a30132ea1a966f2895fe05955
SHA256 b585b9958e97502d3ce223e2b5db25a2cf72dd944d11957e490ffb7508a28317
SHA512 9e80d5a6c0e60bf36b1f92403394a86984dfd48507708f93eb61ee8c8a808859fed58f3779e13356523447854f29d8574607fc907adbec288352e8852b676fc2

memory/2608-28-0x00000000746A0000-0x0000000074D8E000-memory.dmp

memory/2608-32-0x0000000004CA0000-0x0000000004CE0000-memory.dmp

memory/2732-31-0x00000000746A0000-0x0000000074D8E000-memory.dmp

\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

MD5 913967b216326e36a08010fb70f9dba3
SHA1 7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA256 8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512 c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

memory/2152-41-0x00000000746A0000-0x0000000074D8E000-memory.dmp

memory/2152-40-0x0000000000AB0000-0x0000000000AB8000-memory.dmp

memory/2952-43-0x00000000746A0000-0x0000000074D8E000-memory.dmp

memory/2152-44-0x00000000746A0000-0x0000000074D8E000-memory.dmp

memory/2608-45-0x00000000746A0000-0x0000000074D8E000-memory.dmp

memory/2952-46-0x00000000746A0000-0x0000000074D8E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-12 01:16

Reported

2024-02-12 01:19

Platform

win10v2004-20231222-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcus main payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation C:\Program Files (x86)\Orcus\Orcus.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Orcus\Orcus.exe C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe N/A
File created C:\Program Files (x86)\Orcus\Orcus.exe.config C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe N/A
File created C:\Program Files (x86)\Orcus\Orcus.exe C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Orcus\Orcus.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe

"C:\Users\Admin\AppData\Local\Temp\04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f.exe"

C:\Program Files (x86)\Orcus\Orcus.exe

"C:\Program Files (x86)\Orcus\Orcus.exe"

C:\Program Files (x86)\Orcus\Orcus.exe

"C:\Program Files (x86)\Orcus\Orcus.exe"

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchSelfAndExit "C:\Program Files (x86)\Orcus\Orcus.exe" 3968

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /watchProcess "C:\Program Files (x86)\Orcus\Orcus.exe" 3968

Network

Country Destination Domain Proto
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
N/A 192.168.1.10:10134 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 28.160.77.104.in-addr.arpa udp
US 20.231.121.79:80 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp
N/A 192.168.1.10:10134 tcp

Files

memory/4760-1-0x00000000753D0000-0x0000000075B80000-memory.dmp

memory/4760-0-0x0000000000EC0000-0x0000000000FAA000-memory.dmp

memory/4760-2-0x0000000005960000-0x0000000005970000-memory.dmp

memory/4760-3-0x0000000005900000-0x000000000590E000-memory.dmp

memory/4760-4-0x0000000005970000-0x00000000059CC000-memory.dmp

memory/4760-5-0x0000000005FD0000-0x0000000006574000-memory.dmp

memory/4760-6-0x0000000005AC0000-0x0000000005B52000-memory.dmp

memory/4760-8-0x0000000005AB0000-0x0000000005AB8000-memory.dmp

memory/4760-9-0x0000000005EE0000-0x0000000005EE8000-memory.dmp

memory/4760-7-0x0000000005AA0000-0x0000000005AB2000-memory.dmp

memory/4760-10-0x0000000006680000-0x00000000066E6000-memory.dmp

memory/4760-11-0x0000000006D10000-0x0000000007328000-memory.dmp

memory/4760-12-0x00000000066F0000-0x0000000006702000-memory.dmp

memory/4760-13-0x0000000006750000-0x000000000678C000-memory.dmp

memory/4760-14-0x0000000006790000-0x00000000067DC000-memory.dmp

memory/4760-15-0x0000000006910000-0x0000000006A1A000-memory.dmp

C:\Program Files (x86)\Orcus\Orcus.exe

MD5 ba17586b1ed01ca8e65d734060d9ea0e
SHA1 952e46759574e77217410fca0302a37bb76dd509
SHA256 04edf9a88e1bdb8c38aaede7b19fab8092c4bb5490a30b4393c9019dc61ac52f
SHA512 b8a4c103abd7c43807f34d5274bbeeffcfdd8968ddff35c1195cbe19c3831e405e75f0f5ac8c132d6bbef794d45ae3bb6de36fdb1172b199f7424b56bc6e8b34

C:\Program Files (x86)\Orcus\Orcus.exe

MD5 36c909575092a8c32d88d325d1660319
SHA1 7dc187fe28e5ea4f521300eb9f36daed075f9e3b
SHA256 32afc3a0c5cf0a26b004a9938810a77b58bf2e14013953824d2a832c32a44628
SHA512 7a9d5e220f475771e9a7cd9a5bd7e656456c1acf36ab945c5fff2e1d309bff793232e73f5018b04bb01dc58c1a9252be6f548c1ce3442ed6614766b3eff254b8

C:\Program Files (x86)\Orcus\Orcus.exe.config

MD5 a2b76cea3a59fa9af5ea21ff68139c98
SHA1 35d76475e6a54c168f536e30206578babff58274
SHA256 f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512 b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

C:\Program Files (x86)\Orcus\Orcus.exe

MD5 0ef2918e862d74840cd2cfd9d4ccea96
SHA1 03aba7811ab7b01e4aba03f17c8d8fb4d98325c4
SHA256 935ec66fbfbcd6fe78e1b701bbcb64b20f3e4dec783aec62238c80f5ab58b71b
SHA512 c176d33a7aa8aea7c47278213533999b168f5513a62f1db7355e1d8faf0b62609a79589affa3d657f51e60a0e3a7c972755b27495954f7e4aa8c7b2cd46852f9

memory/4760-31-0x00000000753D0000-0x0000000075B80000-memory.dmp

memory/3968-32-0x0000000004DF0000-0x0000000004E00000-memory.dmp

memory/3968-33-0x00000000753D0000-0x0000000075B80000-memory.dmp

C:\Users\Admin\AppData\Roaming\Orcus\err_6ae3b1fbe2324f35ae733bf37bdd3f69.dat

MD5 a5842b71c8124f775108cb68ecb0f3e3
SHA1 85ebccb12923a2191bdc6bcc25f4516dbc590d2d
SHA256 739215beadb202eaafb5f63145547144866289b071567748f62ef4e6899f031a
SHA512 84426ebfe67d8d370e21f308ec5f3fb85f5599783d8203345efb492ce0a86e90f3eaa3e0051efb57cd834e58109e225c744359fa5aaf6cf19ba0cbcce1ca6817

memory/3968-36-0x0000000005FA0000-0x0000000005FEE000-memory.dmp

memory/3968-37-0x00000000068A0000-0x00000000068B8000-memory.dmp

C:\Program Files (x86)\Orcus\Orcus.exe

MD5 93fbbd1d4f29ea34ac5a7e8f7df6d080
SHA1 c267c645b51a55bcdf19f2363e96f0c1033e3d16
SHA256 deb65cce3e70a55454dccd29efecc67e6d4e5c3136a44910bbb1d40d63b46a08
SHA512 2655932282739a566ff70b4aff92796e9028c3fd823fa294e526c7029731175e8ace116283e492742f7a3d01217e61e877f7dae2b2fb62da3feb46f882e9976e

memory/4576-40-0x00000000753D0000-0x0000000075B80000-memory.dmp

memory/3968-39-0x0000000006C30000-0x0000000006DF2000-memory.dmp

memory/3968-41-0x0000000006A80000-0x0000000006A90000-memory.dmp

memory/3968-42-0x0000000006AB0000-0x0000000006ABA000-memory.dmp

C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

MD5 913967b216326e36a08010fb70f9dba3
SHA1 7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA256 8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512 c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

memory/3316-56-0x0000000000B70000-0x0000000000B78000-memory.dmp

memory/3316-57-0x00000000753D0000-0x0000000075B80000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OrcusWatchdog.exe.log

MD5 4eaca4566b22b01cd3bc115b9b0b2196
SHA1 e743e0792c19f71740416e7b3c061d9f1336bf94
SHA256 34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512 bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

memory/3316-61-0x00000000753D0000-0x0000000075B80000-memory.dmp

memory/3076-62-0x00000000753D0000-0x0000000075B80000-memory.dmp

memory/4576-64-0x00000000753D0000-0x0000000075B80000-memory.dmp

memory/3968-65-0x0000000004DF0000-0x0000000004E00000-memory.dmp

memory/3968-66-0x00000000753D0000-0x0000000075B80000-memory.dmp

memory/3076-67-0x00000000753D0000-0x0000000075B80000-memory.dmp