Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 01:12
Behavioral task
behavioral1
Sample
ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe
Resource
win7-20240221-en
General
-
Target
ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe
-
Size
904KB
-
MD5
63a2bef09fe9a858be78c14579915ca0
-
SHA1
3fac6888fc1ad5dc7843c341c2c16211bb19d782
-
SHA256
ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c
-
SHA512
325ce35e42968cbcd306cd059f58c068eb2c83d4347bb7c682c6ec86a8e6775d5cbc412cfaa20eef518827f618a348c6d85c9714879dd1bd4f3ba36c3ef694b8
-
SSDEEP
12288:N0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCWUxKItGKiHAepLIv3WZ7dG1lF6:aAi4MROxnFHHrrcI0AilFEvxHP8ooR
Malware Config
Extracted
orcus
31.220.90.137:10134
46a4e813576e402891eceb0a8304c8b1
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%temp%\Desktop Window Manager.exe
-
reconnect_delay
10000
-
registry_keyname
Update
-
taskscheduler_taskname
WindowsServices
-
watchdog_path
Temp\Windows Logon .exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral1/memory/2764-0-0x0000000000840000-0x0000000000928000-memory.dmp orcus -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2764 ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2764 ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe"C:\Users\Admin\AppData\Local\Temp\ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2764