Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-02-2024 01:12

General

  • Target

    ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe

  • Size

    904KB

  • MD5

    63a2bef09fe9a858be78c14579915ca0

  • SHA1

    3fac6888fc1ad5dc7843c341c2c16211bb19d782

  • SHA256

    ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c

  • SHA512

    325ce35e42968cbcd306cd059f58c068eb2c83d4347bb7c682c6ec86a8e6775d5cbc412cfaa20eef518827f618a348c6d85c9714879dd1bd4f3ba36c3ef694b8

  • SSDEEP

    12288:N0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCWUxKItGKiHAepLIv3WZ7dG1lF6:aAi4MROxnFHHrrcI0AilFEvxHP8ooR

Malware Config

Extracted

Family

orcus

C2

31.220.90.137:10134

Mutex

46a4e813576e402891eceb0a8304c8b1

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %temp%\Desktop Window Manager.exe

  • reconnect_delay

    10000

  • registry_keyname

    Update

  • taskscheduler_taskname

    WindowsServices

  • watchdog_path

    Temp\Windows Logon .exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe
    "C:\Users\Admin\AppData\Local\Temp\ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2764

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2764-0-0x0000000000840000-0x0000000000928000-memory.dmp

    Filesize

    928KB

  • memory/2764-1-0x00000000743A0000-0x0000000074A8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2764-2-0x0000000004600000-0x0000000004640000-memory.dmp

    Filesize

    256KB

  • memory/2764-3-0x0000000000480000-0x000000000048E000-memory.dmp

    Filesize

    56KB

  • memory/2764-4-0x00000000007E0000-0x000000000083C000-memory.dmp

    Filesize

    368KB

  • memory/2764-5-0x00000000005C0000-0x00000000005D2000-memory.dmp

    Filesize

    72KB

  • memory/2764-6-0x00000000005E0000-0x00000000005F8000-memory.dmp

    Filesize

    96KB

  • memory/2764-7-0x0000000001EE0000-0x0000000001EF0000-memory.dmp

    Filesize

    64KB

  • memory/2764-8-0x00000000743A0000-0x0000000074A8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2764-9-0x0000000004600000-0x0000000004640000-memory.dmp

    Filesize

    256KB