Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 02:31

General

  • Target

    d4205c32a32976e3ff2cf981e2959ed4a8df9689a4c17bfc5b6d860666912417.exe

  • Size

    2.6MB

  • MD5

    a1de47f3e2c2d8384e730f62414b45e9

  • SHA1

    5f886112de96a5d414c34a9b48ddbdb8dba9a419

  • SHA256

    d4205c32a32976e3ff2cf981e2959ed4a8df9689a4c17bfc5b6d860666912417

  • SHA512

    10abb7c01414f773b61ec2abd23eb36f04d9b5e6c8cefe8ab7806df9721787531535c6b2064bb4c4a18c867a5c92a8886a2c1728dbdf099968bee07e6c124996

  • SSDEEP

    24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxx3:Hh+ZkldoPKiYdqd6P

Malware Config

Extracted

Family

orcus

Botnet

ligeon

C2

ligeon.ddns.net:1606

Mutex

b98fb09a59c24a81b9d17a55ccf2c036

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4205c32a32976e3ff2cf981e2959ed4a8df9689a4c17bfc5b6d860666912417.exe
    "C:\Users\Admin\AppData\Local\Temp\d4205c32a32976e3ff2cf981e2959ed4a8df9689a4c17bfc5b6d860666912417.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2796
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
      2⤵
      • Creates scheduled task(s)
      PID:4784
  • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
    C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:552
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
        2⤵
        • Creates scheduled task(s)
        PID:1904
    • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
      C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
          PID:1992
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
          2⤵
          • Creates scheduled task(s)
          PID:3656
      • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
        C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
        1⤵
        • Executes dropped EXE
        PID:2512

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log

              Filesize

              1KB

              MD5

              0672db2ef13237d5cb85075ff4915942

              SHA1

              ad8b4d3eb5e40791c47d48b22e273486f25f663f

              SHA256

              0a933408890369b5a178f9c30aa93d2c94f425650815cf8e8310de4e90a3b519

              SHA512

              84ad10ba5b695567d33a52f786405a5544aa49d8d23631ba9edf3afa877c5dbd81570d15bcf74bce5d9fb1afad2117d0a4ef913b396c0d923afefe615619c84b

            • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe

              Filesize

              2.6MB

              MD5

              17bb3f70aec61d7be144bbf07ec9856f

              SHA1

              b2d952106e64d49b7ee042723b763b966ae1d2bf

              SHA256

              30c54a6c01ad716983b7c8a2b6864c6c01c5aaea6df980efa0a3e223ec15a503

              SHA512

              3d1793bcdc8e8cdc2480442b04632eed0c5d6bf2f29a2e825b6297256690a0c061118b5527b874a1fc8ed4696cb7bac7945ebc4a169f88aeb95f549ec87c7b17

            • memory/552-34-0x0000000073A60000-0x0000000074210000-memory.dmp

              Filesize

              7.7MB

            • memory/552-32-0x0000000005540000-0x0000000005550000-memory.dmp

              Filesize

              64KB

            • memory/552-31-0x0000000073A60000-0x0000000074210000-memory.dmp

              Filesize

              7.7MB

            • memory/768-24-0x0000000000E80000-0x000000000112A000-memory.dmp

              Filesize

              2.7MB

            • memory/1012-3-0x00000000016B0000-0x00000000016B1000-memory.dmp

              Filesize

              4KB

            • memory/1012-0-0x0000000000EF0000-0x000000000119A000-memory.dmp

              Filesize

              2.7MB

            • memory/1992-45-0x0000000073A60000-0x0000000074210000-memory.dmp

              Filesize

              7.7MB

            • memory/1992-43-0x0000000073A60000-0x0000000074210000-memory.dmp

              Filesize

              7.7MB

            • memory/1992-44-0x0000000005920000-0x0000000005930000-memory.dmp

              Filesize

              64KB

            • memory/2488-36-0x0000000000E80000-0x000000000112A000-memory.dmp

              Filesize

              2.7MB

            • memory/2512-47-0x0000000000E80000-0x000000000112A000-memory.dmp

              Filesize

              2.7MB

            • memory/2796-14-0x00000000054B0000-0x0000000005542000-memory.dmp

              Filesize

              584KB

            • memory/2796-19-0x00000000060E0000-0x00000000060F0000-memory.dmp

              Filesize

              64KB

            • memory/2796-21-0x0000000073A60000-0x0000000074210000-memory.dmp

              Filesize

              7.7MB

            • memory/2796-22-0x0000000005400000-0x0000000005410000-memory.dmp

              Filesize

              64KB

            • memory/2796-16-0x0000000005490000-0x0000000005498000-memory.dmp

              Filesize

              32KB

            • memory/2796-20-0x00000000062A0000-0x00000000062AA000-memory.dmp

              Filesize

              40KB

            • memory/2796-18-0x00000000062B0000-0x0000000006472000-memory.dmp

              Filesize

              1.8MB

            • memory/2796-15-0x00000000053F0000-0x0000000005402000-memory.dmp

              Filesize

              72KB

            • memory/2796-17-0x0000000005990000-0x00000000059A8000-memory.dmp

              Filesize

              96KB

            • memory/2796-13-0x00000000059C0000-0x0000000005F64000-memory.dmp

              Filesize

              5.6MB

            • memory/2796-10-0x00000000052E0000-0x000000000533C000-memory.dmp

              Filesize

              368KB

            • memory/2796-7-0x0000000073A60000-0x0000000074210000-memory.dmp

              Filesize

              7.7MB

            • memory/2796-9-0x0000000001140000-0x000000000114E000-memory.dmp

              Filesize

              56KB

            • memory/2796-8-0x0000000005400000-0x0000000005410000-memory.dmp

              Filesize

              64KB

            • memory/2796-1-0x0000000000400000-0x00000000004EA000-memory.dmp

              Filesize

              936KB