Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe
Resource
win7-20240221-en
General
-
Target
34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe
-
Size
2.6MB
-
MD5
c291e372be8805bf06c427db33c5a044
-
SHA1
719e74da08ef39310a824b89897a7bd636024692
-
SHA256
34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe
-
SHA512
2c14882f02bfe0f7aba3a66c7d9bbbe3b1a830a1452cdd36efa2ac104c50e8bba85390d6053cb6fafc7bf3a69464977d6fe56cc69cae0dd2e6c36b46b349c006
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxk:Hh+ZkldoPKiYdqd6c
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 3 IoCs
resource yara_rule behavioral1/memory/3040-3-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/3040-9-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/3040-10-0x0000000000400000-0x00000000004EA000-memory.dmp orcus -
Executes dropped EXE 2 IoCs
pid Process 2236 setspn.exe 2776 setspn.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2092-0-0x0000000000E50000-0x00000000010FA000-memory.dmp autoit_exe behavioral1/files/0x000d0000000122ee-23.dat autoit_exe behavioral1/memory/2236-25-0x0000000000230000-0x00000000004DA000-memory.dmp autoit_exe behavioral1/memory/2776-40-0x0000000000310000-0x00000000005BA000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2092 set thread context of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2236 set thread context of 2256 2236 setspn.exe 35 PID 2776 set thread context of 2164 2776 setspn.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2536 schtasks.exe 1672 schtasks.exe 1060 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 2236 setspn.exe 2236 setspn.exe 2776 setspn.exe 2776 setspn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3040 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3040 RegSvcs.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2092 wrote to memory of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2092 wrote to memory of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2092 wrote to memory of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2092 wrote to memory of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2092 wrote to memory of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2092 wrote to memory of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2092 wrote to memory of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2092 wrote to memory of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2092 wrote to memory of 3040 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 28 PID 2092 wrote to memory of 2536 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 29 PID 2092 wrote to memory of 2536 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 29 PID 2092 wrote to memory of 2536 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 29 PID 2092 wrote to memory of 2536 2092 34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe 29 PID 540 wrote to memory of 2236 540 taskeng.exe 34 PID 540 wrote to memory of 2236 540 taskeng.exe 34 PID 540 wrote to memory of 2236 540 taskeng.exe 34 PID 540 wrote to memory of 2236 540 taskeng.exe 34 PID 2236 wrote to memory of 2256 2236 setspn.exe 35 PID 2236 wrote to memory of 2256 2236 setspn.exe 35 PID 2236 wrote to memory of 2256 2236 setspn.exe 35 PID 2236 wrote to memory of 2256 2236 setspn.exe 35 PID 2236 wrote to memory of 2256 2236 setspn.exe 35 PID 2236 wrote to memory of 2256 2236 setspn.exe 35 PID 2236 wrote to memory of 2256 2236 setspn.exe 35 PID 2236 wrote to memory of 2256 2236 setspn.exe 35 PID 2236 wrote to memory of 2256 2236 setspn.exe 35 PID 2236 wrote to memory of 1672 2236 setspn.exe 36 PID 2236 wrote to memory of 1672 2236 setspn.exe 36 PID 2236 wrote to memory of 1672 2236 setspn.exe 36 PID 2236 wrote to memory of 1672 2236 setspn.exe 36 PID 540 wrote to memory of 2776 540 taskeng.exe 38 PID 540 wrote to memory of 2776 540 taskeng.exe 38 PID 540 wrote to memory of 2776 540 taskeng.exe 38 PID 540 wrote to memory of 2776 540 taskeng.exe 38 PID 2776 wrote to memory of 2164 2776 setspn.exe 39 PID 2776 wrote to memory of 2164 2776 setspn.exe 39 PID 2776 wrote to memory of 2164 2776 setspn.exe 39 PID 2776 wrote to memory of 2164 2776 setspn.exe 39 PID 2776 wrote to memory of 2164 2776 setspn.exe 39 PID 2776 wrote to memory of 2164 2776 setspn.exe 39 PID 2776 wrote to memory of 2164 2776 setspn.exe 39 PID 2776 wrote to memory of 2164 2776 setspn.exe 39 PID 2776 wrote to memory of 2164 2776 setspn.exe 39 PID 2776 wrote to memory of 1060 2776 setspn.exe 40 PID 2776 wrote to memory of 1060 2776 setspn.exe 40 PID 2776 wrote to memory of 1060 2776 setspn.exe 40 PID 2776 wrote to memory of 1060 2776 setspn.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe"C:\Users\Admin\AppData\Local\Temp\34a04a802d884bd778d6e264aa77e9c8453f4a90d03eacb51974968e3ec0d1fe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3040
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2536
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8230D60A-9321-415A-8366-5B239B8CBED5} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2256
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1672
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2164
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5bb0df85bfa2d32068f10d31dcd69aca3
SHA1857ad456c2fed84242ae8527ea2f1c45bdd7a96b
SHA2568451471eaed067eb09cf28cd440ff07ea5863645e99014a910c0136f478ba701
SHA512f59d8dc9b742905a61521ef14eb14fcbcf9dd518e7ec6cdce1b907dfcbeda21ecaf3ada23f4e40280c138e4e804df6fa4615e428093ee6560a7804b8d74b5ea0