Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-02-2024 01:12

General

  • Target

    ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe

  • Size

    904KB

  • MD5

    63a2bef09fe9a858be78c14579915ca0

  • SHA1

    3fac6888fc1ad5dc7843c341c2c16211bb19d782

  • SHA256

    ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c

  • SHA512

    325ce35e42968cbcd306cd059f58c068eb2c83d4347bb7c682c6ec86a8e6775d5cbc412cfaa20eef518827f618a348c6d85c9714879dd1bd4f3ba36c3ef694b8

  • SSDEEP

    12288:N0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCWUxKItGKiHAepLIv3WZ7dG1lF6:aAi4MROxnFHHrrcI0AilFEvxHP8ooR

Malware Config

Extracted

Family

orcus

C2

31.220.90.137:10134

Mutex

46a4e813576e402891eceb0a8304c8b1

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %temp%\Desktop Window Manager.exe

  • reconnect_delay

    10000

  • registry_keyname

    Update

  • taskscheduler_taskname

    WindowsServices

  • watchdog_path

    Temp\Windows Logon .exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe
    "C:\Users\Admin\AppData\Local\Temp\ab64d9f42b9e764fe4f7a61f6a378bb79cf7f1d05e2c431bdc1d6c6f337bd22c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/908-0-0x0000000000660000-0x0000000000748000-memory.dmp

    Filesize

    928KB

  • memory/908-1-0x00000000747F0000-0x0000000074FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/908-2-0x0000000005340000-0x0000000005350000-memory.dmp

    Filesize

    64KB

  • memory/908-3-0x00000000050A0000-0x00000000050AE000-memory.dmp

    Filesize

    56KB

  • memory/908-4-0x00000000050B0000-0x000000000510C000-memory.dmp

    Filesize

    368KB

  • memory/908-5-0x0000000005900000-0x0000000005EA4000-memory.dmp

    Filesize

    5.6MB

  • memory/908-6-0x0000000005260000-0x00000000052F2000-memory.dmp

    Filesize

    584KB

  • memory/908-7-0x0000000005760000-0x0000000005772000-memory.dmp

    Filesize

    72KB

  • memory/908-8-0x0000000005770000-0x0000000005788000-memory.dmp

    Filesize

    96KB

  • memory/908-10-0x0000000005EB0000-0x0000000005EC0000-memory.dmp

    Filesize

    64KB

  • memory/908-9-0x0000000006090000-0x0000000006252000-memory.dmp

    Filesize

    1.8MB

  • memory/908-11-0x0000000005FD0000-0x0000000005FDA000-memory.dmp

    Filesize

    40KB

  • memory/908-12-0x00000000747F0000-0x0000000074FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/908-13-0x0000000005340000-0x0000000005350000-memory.dmp

    Filesize

    64KB