Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe
Resource
win7-20240215-en
General
-
Target
519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe
-
Size
2.6MB
-
MD5
bd162d72541eb2bd28063891b83e7561
-
SHA1
81c05100315338a1b06bae7e71fd8f68dccf063e
-
SHA256
519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555
-
SHA512
484f6aab5d77d7ff94ee56b85358f8a8a59491d43b7a57f6d0022a6d8c710d7dd4192614865d364e2756d70e9e7ad6a56f01817d32dfea354b7fa4dce51d4d1f
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxy:Hh+ZkldoPKiYdqd66
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 6 IoCs
resource yara_rule behavioral1/memory/3036-4-0x00000000001B0000-0x000000000029A000-memory.dmp orcus behavioral1/memory/3036-10-0x00000000001B0000-0x000000000029A000-memory.dmp orcus behavioral1/memory/3036-11-0x00000000001B0000-0x000000000029A000-memory.dmp orcus behavioral1/memory/2468-26-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2468-32-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2468-33-0x0000000000400000-0x00000000004EA000-memory.dmp orcus -
Executes dropped EXE 3 IoCs
pid Process 1044 setspn.exe 1656 setspn.exe 2280 setspn.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/3012-0-0x0000000000ED0000-0x000000000117A000-memory.dmp autoit_exe behavioral1/files/0x000b0000000153c7-22.dat autoit_exe behavioral1/memory/1044-24-0x0000000000F00000-0x00000000011AA000-memory.dmp autoit_exe behavioral1/memory/1656-40-0x0000000000F00000-0x00000000011AA000-memory.dmp autoit_exe behavioral1/memory/2280-54-0x0000000000270000-0x000000000051A000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3012 set thread context of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 1044 set thread context of 2468 1044 setspn.exe 33 PID 1656 set thread context of 1604 1656 setspn.exe 39 PID 2280 set thread context of 3068 2280 setspn.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe 2968 schtasks.exe 1336 schtasks.exe 624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 1044 setspn.exe 1044 setspn.exe 1656 setspn.exe 1656 setspn.exe 2280 setspn.exe 2280 setspn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3036 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3036 RegSvcs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 3012 wrote to memory of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 3012 wrote to memory of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 3012 wrote to memory of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 3012 wrote to memory of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 3012 wrote to memory of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 3012 wrote to memory of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 3012 wrote to memory of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 3012 wrote to memory of 3036 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 28 PID 3012 wrote to memory of 2596 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 29 PID 3012 wrote to memory of 2596 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 29 PID 3012 wrote to memory of 2596 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 29 PID 3012 wrote to memory of 2596 3012 519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe 29 PID 2688 wrote to memory of 1044 2688 taskeng.exe 32 PID 2688 wrote to memory of 1044 2688 taskeng.exe 32 PID 2688 wrote to memory of 1044 2688 taskeng.exe 32 PID 2688 wrote to memory of 1044 2688 taskeng.exe 32 PID 1044 wrote to memory of 2468 1044 setspn.exe 33 PID 1044 wrote to memory of 2468 1044 setspn.exe 33 PID 1044 wrote to memory of 2468 1044 setspn.exe 33 PID 1044 wrote to memory of 2468 1044 setspn.exe 33 PID 1044 wrote to memory of 2468 1044 setspn.exe 33 PID 1044 wrote to memory of 2468 1044 setspn.exe 33 PID 1044 wrote to memory of 2468 1044 setspn.exe 33 PID 1044 wrote to memory of 2468 1044 setspn.exe 33 PID 1044 wrote to memory of 2468 1044 setspn.exe 33 PID 1044 wrote to memory of 2968 1044 setspn.exe 34 PID 1044 wrote to memory of 2968 1044 setspn.exe 34 PID 1044 wrote to memory of 2968 1044 setspn.exe 34 PID 1044 wrote to memory of 2968 1044 setspn.exe 34 PID 2688 wrote to memory of 1656 2688 taskeng.exe 38 PID 2688 wrote to memory of 1656 2688 taskeng.exe 38 PID 2688 wrote to memory of 1656 2688 taskeng.exe 38 PID 2688 wrote to memory of 1656 2688 taskeng.exe 38 PID 1656 wrote to memory of 1604 1656 setspn.exe 39 PID 1656 wrote to memory of 1604 1656 setspn.exe 39 PID 1656 wrote to memory of 1604 1656 setspn.exe 39 PID 1656 wrote to memory of 1604 1656 setspn.exe 39 PID 1656 wrote to memory of 1604 1656 setspn.exe 39 PID 1656 wrote to memory of 1604 1656 setspn.exe 39 PID 1656 wrote to memory of 1604 1656 setspn.exe 39 PID 1656 wrote to memory of 1604 1656 setspn.exe 39 PID 1656 wrote to memory of 1604 1656 setspn.exe 39 PID 1656 wrote to memory of 1336 1656 setspn.exe 40 PID 1656 wrote to memory of 1336 1656 setspn.exe 40 PID 1656 wrote to memory of 1336 1656 setspn.exe 40 PID 1656 wrote to memory of 1336 1656 setspn.exe 40 PID 2688 wrote to memory of 2280 2688 taskeng.exe 42 PID 2688 wrote to memory of 2280 2688 taskeng.exe 42 PID 2688 wrote to memory of 2280 2688 taskeng.exe 42 PID 2688 wrote to memory of 2280 2688 taskeng.exe 42 PID 2280 wrote to memory of 3068 2280 setspn.exe 43 PID 2280 wrote to memory of 3068 2280 setspn.exe 43 PID 2280 wrote to memory of 3068 2280 setspn.exe 43 PID 2280 wrote to memory of 3068 2280 setspn.exe 43 PID 2280 wrote to memory of 3068 2280 setspn.exe 43 PID 2280 wrote to memory of 3068 2280 setspn.exe 43 PID 2280 wrote to memory of 3068 2280 setspn.exe 43 PID 2280 wrote to memory of 3068 2280 setspn.exe 43 PID 2280 wrote to memory of 3068 2280 setspn.exe 43 PID 2280 wrote to memory of 624 2280 setspn.exe 44 PID 2280 wrote to memory of 624 2280 setspn.exe 44 PID 2280 wrote to memory of 624 2280 setspn.exe 44 PID 2280 wrote to memory of 624 2280 setspn.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe"C:\Users\Admin\AppData\Local\Temp\519e98a8fc432af6f887b69bdaecc280b82e749104a2ce4644e904c6edc44555.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9D252D83-6D40-45E5-BFE5-698252152134} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2468
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2968
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1604
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1336
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3068
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD54fa846f8177cde04292f7c6fba046463
SHA147206ef4ea026c09d656f6ca7fa15c8a9cd8de25
SHA2568a8340a92b601e3cd91f31a29eda07ef6ef501bcb5ec40e4656a01989866283e
SHA51278e49aa81956a5668033aea8d364751e703b6edb9eed6f3b2188bb41bec68876df095f5b0019c08988e18a051f6256a5d884375cc905ef9f3c3ce54fe7c1af47