Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 02:31

General

  • Target

    d4205c32a32976e3ff2cf981e2959ed4a8df9689a4c17bfc5b6d860666912417.exe

  • Size

    2.6MB

  • MD5

    a1de47f3e2c2d8384e730f62414b45e9

  • SHA1

    5f886112de96a5d414c34a9b48ddbdb8dba9a419

  • SHA256

    d4205c32a32976e3ff2cf981e2959ed4a8df9689a4c17bfc5b6d860666912417

  • SHA512

    10abb7c01414f773b61ec2abd23eb36f04d9b5e6c8cefe8ab7806df9721787531535c6b2064bb4c4a18c867a5c92a8886a2c1728dbdf099968bee07e6c124996

  • SSDEEP

    24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxx3:Hh+ZkldoPKiYdqd6P

Malware Config

Extracted

Family

orcus

Botnet

ligeon

C2

ligeon.ddns.net:1606

Mutex

b98fb09a59c24a81b9d17a55ccf2c036

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 6 IoCs
  • Executes dropped EXE 3 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4205c32a32976e3ff2cf981e2959ed4a8df9689a4c17bfc5b6d860666912417.exe
    "C:\Users\Admin\AppData\Local\Temp\d4205c32a32976e3ff2cf981e2959ed4a8df9689a4c17bfc5b6d860666912417.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2072
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
      2⤵
      • Creates scheduled task(s)
      PID:3040
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {E7041465-7AA9-4773-9B16-2A2AB38B6DF8} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
      C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:3064
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
          3⤵
          • Creates scheduled task(s)
          PID:2708
      • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
        C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:2008
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
            3⤵
            • Creates scheduled task(s)
            PID:268
        • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
          C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            3⤵
              PID:1292
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
              3⤵
              • Creates scheduled task(s)
              PID:912

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe

          Filesize

          2.6MB

          MD5

          2d0d0d1df18287e9ac2185304a112487

          SHA1

          fd81b2775ff49d28ae667ced0be2f0d82423f8ea

          SHA256

          2839fdb2aaa6ae7e8188a2daa60236fc559827bb80f3ce90986cdebc84a15072

          SHA512

          3a0a8e1d0f580a91f211fa11e0d459c52f5c7f5488d194f71906f68897d759bdf9160211c309f7d5a4a40d05ae3153ad199486cfd1b5a4895cfaba44315bdee0

        • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe

          Filesize

          1005KB

          MD5

          e332509219d61e7f38a150097dd39ee0

          SHA1

          a068759ba13f96d8a6c554dfcb6fee1a12f3ead0

          SHA256

          c96e8a946fab382b6173a070ed713d7129290a04018c269b59d16197956571a3

          SHA512

          5c424a01653d0290f063c4a5a4503703a5086b9c738974fad48ecb2f8bba11e3f41d844e7ec402f745d12308527bdf2afc221e795d0e058e5404747b6ef26367

        • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe

          Filesize

          581KB

          MD5

          1ad64bf55ca92c40047442ce4305f5e6

          SHA1

          3b1000b8b1b9457faa64d433e303f2e54260de42

          SHA256

          86c0f4f6beb6732b7e374e41b8c03f7f38a3b80385e140bc039df4077b6c47fc

          SHA512

          c977bfbefa080aa9f96f5dec8723763c4b5082c459446accb48d90385d28091fe462022589c63de9860a6692dae00d04711f14d9877c80c1dbe2420670563cb4

        • memory/1216-55-0x00000000009B0000-0x0000000000C5A000-memory.dmp

          Filesize

          2.7MB

        • memory/1292-65-0x0000000074880000-0x0000000074F6E000-memory.dmp

          Filesize

          6.9MB

        • memory/2008-53-0x0000000074880000-0x0000000074F6E000-memory.dmp

          Filesize

          6.9MB

        • memory/2008-52-0x0000000000220000-0x0000000000260000-memory.dmp

          Filesize

          256KB

        • memory/2008-51-0x0000000074880000-0x0000000074F6E000-memory.dmp

          Filesize

          6.9MB

        • memory/2072-23-0x0000000004840000-0x0000000004880000-memory.dmp

          Filesize

          256KB

        • memory/2072-11-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/2072-17-0x0000000000790000-0x00000000007EC000-memory.dmp

          Filesize

          368KB

        • memory/2072-18-0x00000000007F0000-0x0000000000802000-memory.dmp

          Filesize

          72KB

        • memory/2072-20-0x0000000000AC0000-0x0000000000AD8000-memory.dmp

          Filesize

          96KB

        • memory/2072-19-0x0000000000810000-0x0000000000818000-memory.dmp

          Filesize

          32KB

        • memory/2072-21-0x0000000000B40000-0x0000000000B50000-memory.dmp

          Filesize

          64KB

        • memory/2072-22-0x0000000074880000-0x0000000074F6E000-memory.dmp

          Filesize

          6.9MB

        • memory/2072-2-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/2072-15-0x0000000004840000-0x0000000004880000-memory.dmp

          Filesize

          256KB

        • memory/2072-4-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/2072-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2072-10-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/2072-16-0x0000000000290000-0x000000000029E000-memory.dmp

          Filesize

          56KB

        • memory/2072-14-0x0000000074880000-0x0000000074F6E000-memory.dmp

          Filesize

          6.9MB

        • memory/2448-26-0x0000000000DF0000-0x000000000109A000-memory.dmp

          Filesize

          2.7MB

        • memory/2836-0-0x0000000000020000-0x00000000002CA000-memory.dmp

          Filesize

          2.7MB

        • memory/2836-1-0x0000000000420000-0x0000000000421000-memory.dmp

          Filesize

          4KB

        • memory/2892-40-0x0000000000260000-0x000000000050A000-memory.dmp

          Filesize

          2.7MB

        • memory/3064-36-0x0000000074880000-0x0000000074F6E000-memory.dmp

          Filesize

          6.9MB

        • memory/3064-38-0x0000000074880000-0x0000000074F6E000-memory.dmp

          Filesize

          6.9MB

        • memory/3064-37-0x00000000041B0000-0x00000000041F0000-memory.dmp

          Filesize

          256KB

        • memory/3064-35-0x0000000000170000-0x000000000025A000-memory.dmp

          Filesize

          936KB

        • memory/3064-34-0x0000000000170000-0x000000000025A000-memory.dmp

          Filesize

          936KB

        • memory/3064-28-0x0000000000170000-0x000000000025A000-memory.dmp

          Filesize

          936KB