Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-04-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe
Resource
win7-20240221-en
General
-
Target
5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe
-
Size
2.6MB
-
MD5
b885348763d4c179cf29b9768cc76acf
-
SHA1
16ce094f522f0726f8fb35d0043ab9e424140890
-
SHA256
5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a
-
SHA512
f78ea20abc1481a000e8f3660383fc71bb266035b2fd549e0d78b048e8d8c1a94f1307d49b414179efad59e0624423d6d1a22eb2a3736e4c5eeee148c0e0b4e7
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXSmHdK3VqbE6przwKpwvEuM/SD0wugdDEl6NrL/Ns:Vh+ZkldoPKiYdKr9e
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 6 IoCs
resource yara_rule behavioral1/memory/2884-4-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2884-10-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2884-11-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/1796-42-0x0000000000090000-0x000000000017A000-memory.dmp orcus behavioral1/memory/1796-48-0x0000000000090000-0x000000000017A000-memory.dmp orcus behavioral1/memory/1796-49-0x0000000000090000-0x000000000017A000-memory.dmp orcus -
Deletes itself 1 IoCs
pid Process 2396 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1948 setspn.exe 1328 setspn.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2848-0-0x0000000000010000-0x00000000002BA000-memory.dmp autoit_exe behavioral1/files/0x000c0000000146fc-24.dat autoit_exe behavioral1/memory/1948-26-0x0000000000DE0000-0x000000000108A000-memory.dmp autoit_exe behavioral1/memory/1328-40-0x0000000001210000-0x00000000014BA000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2848 set thread context of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 1948 set thread context of 2144 1948 setspn.exe 38 PID 1328 set thread context of 1796 1328 setspn.exe 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2600 schtasks.exe 2208 schtasks.exe 2084 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2508 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 1948 setspn.exe 1948 setspn.exe 1328 setspn.exe 1328 setspn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2884 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2884 RegSvcs.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 2848 wrote to memory of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 2848 wrote to memory of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 2848 wrote to memory of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 2848 wrote to memory of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 2848 wrote to memory of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 2848 wrote to memory of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 2848 wrote to memory of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 2848 wrote to memory of 2884 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 28 PID 2848 wrote to memory of 2600 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 29 PID 2848 wrote to memory of 2600 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 29 PID 2848 wrote to memory of 2600 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 29 PID 2848 wrote to memory of 2600 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 29 PID 2848 wrote to memory of 2396 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 31 PID 2848 wrote to memory of 2396 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 31 PID 2848 wrote to memory of 2396 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 31 PID 2848 wrote to memory of 2396 2848 5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe 31 PID 2396 wrote to memory of 2508 2396 cmd.exe 33 PID 2396 wrote to memory of 2508 2396 cmd.exe 33 PID 2396 wrote to memory of 2508 2396 cmd.exe 33 PID 2396 wrote to memory of 2508 2396 cmd.exe 33 PID 1732 wrote to memory of 1948 1732 taskeng.exe 37 PID 1732 wrote to memory of 1948 1732 taskeng.exe 37 PID 1732 wrote to memory of 1948 1732 taskeng.exe 37 PID 1732 wrote to memory of 1948 1732 taskeng.exe 37 PID 1948 wrote to memory of 2144 1948 setspn.exe 38 PID 1948 wrote to memory of 2144 1948 setspn.exe 38 PID 1948 wrote to memory of 2144 1948 setspn.exe 38 PID 1948 wrote to memory of 2144 1948 setspn.exe 38 PID 1948 wrote to memory of 2144 1948 setspn.exe 38 PID 1948 wrote to memory of 2144 1948 setspn.exe 38 PID 1948 wrote to memory of 2144 1948 setspn.exe 38 PID 1948 wrote to memory of 2144 1948 setspn.exe 38 PID 1948 wrote to memory of 2144 1948 setspn.exe 38 PID 1948 wrote to memory of 2208 1948 setspn.exe 39 PID 1948 wrote to memory of 2208 1948 setspn.exe 39 PID 1948 wrote to memory of 2208 1948 setspn.exe 39 PID 1948 wrote to memory of 2208 1948 setspn.exe 39 PID 1732 wrote to memory of 1328 1732 taskeng.exe 41 PID 1732 wrote to memory of 1328 1732 taskeng.exe 41 PID 1732 wrote to memory of 1328 1732 taskeng.exe 41 PID 1732 wrote to memory of 1328 1732 taskeng.exe 41 PID 1328 wrote to memory of 1796 1328 setspn.exe 42 PID 1328 wrote to memory of 1796 1328 setspn.exe 42 PID 1328 wrote to memory of 1796 1328 setspn.exe 42 PID 1328 wrote to memory of 1796 1328 setspn.exe 42 PID 1328 wrote to memory of 1796 1328 setspn.exe 42 PID 1328 wrote to memory of 1796 1328 setspn.exe 42 PID 1328 wrote to memory of 1796 1328 setspn.exe 42 PID 1328 wrote to memory of 1796 1328 setspn.exe 42 PID 1328 wrote to memory of 1796 1328 setspn.exe 42 PID 1328 wrote to memory of 2084 1328 setspn.exe 43 PID 1328 wrote to memory of 2084 1328 setspn.exe 43 PID 1328 wrote to memory of 2084 1328 setspn.exe 43 PID 1328 wrote to memory of 2084 1328 setspn.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe"C:\Users\Admin\AppData\Local\Temp\5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /k ping 127.0.0.1 -t 0 & del C:\Users\Admin\AppData\Local\Temp\5910aa00e8a3ffa7f8abb45d6e8f23307b1f152d6f6a2bbfb9be8215b0b2d26a.exe & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -t 03⤵
- Runs ping.exe
PID:2508
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7568F984-9665-470B-B40E-4EE1186C4E28} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2144
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2208
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1796
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5dcbb6dc1b604d652dd657d9041335fd2
SHA11592f013c53e3b8abd5fd23e5089399368a83200
SHA2569617740b71d792822c49cd1b94e5abb7596b38dd77ee02a39042507e8537dd11
SHA51208d2118047775d6f1cb1c56eecec79a05bb0039ba3a5479a53a3bda788d6af43cc522f52771384f36e03db7226513c3c07321f6ecedd9585dda13f01f033fbb7