Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe
Resource
win7-20240215-en
General
-
Target
822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe
-
Size
2.6MB
-
MD5
ba401af5444b2dd13624f2d4ea246547
-
SHA1
666e75aec29af497b10a21068c4fa1391a46550d
-
SHA256
822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd
-
SHA512
620dc920d8d57ec6824d79613890f6e9e100a2ea77d2949ea074bb597bd6020a123ab63f9749bd2b74021d1ed23dbdcc7675132eb5d923f12c927c4d57af65d8
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXSmHdK3VqbE6przwKpwvEuM/SD0wugdDEl6NrL/Nx:Vh+ZkldoPKiYdKr9v
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2300-3-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2300-9-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2300-10-0x0000000000400000-0x00000000004EA000-memory.dmp orcus -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2572 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
setspn.exesetspn.exepid process 2700 setspn.exe 764 setspn.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2460-0-0x00000000010C0000-0x000000000136A000-memory.dmp autoit_exe C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe autoit_exe behavioral1/memory/2700-25-0x00000000008F0000-0x0000000000B9A000-memory.dmp autoit_exe behavioral1/memory/764-39-0x0000000000CF0000-0x0000000000F9A000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exesetspn.exesetspn.exedescription pid process target process PID 2460 set thread context of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2700 set thread context of 1992 2700 setspn.exe RegSvcs.exe PID 764 set thread context of 356 764 setspn.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2524 schtasks.exe 1280 schtasks.exe 908 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exesetspn.exesetspn.exepid process 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe 2700 setspn.exe 2700 setspn.exe 764 setspn.exe 764 setspn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 2300 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 2300 RegSvcs.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.execmd.exetaskeng.exesetspn.exesetspn.exedescription pid process target process PID 2460 wrote to memory of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2460 wrote to memory of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2460 wrote to memory of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2460 wrote to memory of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2460 wrote to memory of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2460 wrote to memory of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2460 wrote to memory of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2460 wrote to memory of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2460 wrote to memory of 2300 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe RegSvcs.exe PID 2460 wrote to memory of 2524 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe schtasks.exe PID 2460 wrote to memory of 2524 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe schtasks.exe PID 2460 wrote to memory of 2524 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe schtasks.exe PID 2460 wrote to memory of 2524 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe schtasks.exe PID 2460 wrote to memory of 2572 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe cmd.exe PID 2460 wrote to memory of 2572 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe cmd.exe PID 2460 wrote to memory of 2572 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe cmd.exe PID 2460 wrote to memory of 2572 2460 822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe cmd.exe PID 2572 wrote to memory of 2512 2572 cmd.exe PING.EXE PID 2572 wrote to memory of 2512 2572 cmd.exe PING.EXE PID 2572 wrote to memory of 2512 2572 cmd.exe PING.EXE PID 2572 wrote to memory of 2512 2572 cmd.exe PING.EXE PID 1604 wrote to memory of 2700 1604 taskeng.exe setspn.exe PID 1604 wrote to memory of 2700 1604 taskeng.exe setspn.exe PID 1604 wrote to memory of 2700 1604 taskeng.exe setspn.exe PID 1604 wrote to memory of 2700 1604 taskeng.exe setspn.exe PID 2700 wrote to memory of 1992 2700 setspn.exe RegSvcs.exe PID 2700 wrote to memory of 1992 2700 setspn.exe RegSvcs.exe PID 2700 wrote to memory of 1992 2700 setspn.exe RegSvcs.exe PID 2700 wrote to memory of 1992 2700 setspn.exe RegSvcs.exe PID 2700 wrote to memory of 1992 2700 setspn.exe RegSvcs.exe PID 2700 wrote to memory of 1992 2700 setspn.exe RegSvcs.exe PID 2700 wrote to memory of 1992 2700 setspn.exe RegSvcs.exe PID 2700 wrote to memory of 1992 2700 setspn.exe RegSvcs.exe PID 2700 wrote to memory of 1992 2700 setspn.exe RegSvcs.exe PID 2700 wrote to memory of 1280 2700 setspn.exe schtasks.exe PID 2700 wrote to memory of 1280 2700 setspn.exe schtasks.exe PID 2700 wrote to memory of 1280 2700 setspn.exe schtasks.exe PID 2700 wrote to memory of 1280 2700 setspn.exe schtasks.exe PID 1604 wrote to memory of 764 1604 taskeng.exe setspn.exe PID 1604 wrote to memory of 764 1604 taskeng.exe setspn.exe PID 1604 wrote to memory of 764 1604 taskeng.exe setspn.exe PID 1604 wrote to memory of 764 1604 taskeng.exe setspn.exe PID 764 wrote to memory of 356 764 setspn.exe RegSvcs.exe PID 764 wrote to memory of 356 764 setspn.exe RegSvcs.exe PID 764 wrote to memory of 356 764 setspn.exe RegSvcs.exe PID 764 wrote to memory of 356 764 setspn.exe RegSvcs.exe PID 764 wrote to memory of 356 764 setspn.exe RegSvcs.exe PID 764 wrote to memory of 356 764 setspn.exe RegSvcs.exe PID 764 wrote to memory of 356 764 setspn.exe RegSvcs.exe PID 764 wrote to memory of 356 764 setspn.exe RegSvcs.exe PID 764 wrote to memory of 356 764 setspn.exe RegSvcs.exe PID 764 wrote to memory of 908 764 setspn.exe schtasks.exe PID 764 wrote to memory of 908 764 setspn.exe schtasks.exe PID 764 wrote to memory of 908 764 setspn.exe schtasks.exe PID 764 wrote to memory of 908 764 setspn.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe"C:\Users\Admin\AppData\Local\Temp\822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /k ping 127.0.0.1 -t 0 & del C:\Users\Admin\AppData\Local\Temp\822739e46fa96ecc2ccb38fea9e82ff9d6fcdaba2a525c6a5b8f9ad33b2fcecd.exe & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -t 03⤵
- Runs ping.exe
-
C:\Windows\system32\taskeng.exetaskeng.exe {55E71391-A4F4-4141-BCF3-D2C8A8DC4692} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeFilesize
2.6MB
MD5139751723dd58701050e1c4a6d399ba6
SHA1c97dc7cfe1e60f41a288309316be40b164236937
SHA256fdbca4da6dd64669863d0d77a9f5a4c6e50e0775d971d9e0ad4aad82f7445e94
SHA512ed1ab3da6fc9a4f5dd9ba511d0dc3db76769e052c1b9a13b6ab9d408d19a8e1ae39cff6b8609b01d28c91b6732066a5a2586cd384caf43a0b73cd7531e7def6b
-
memory/356-50-0x00000000744E0000-0x0000000074BCE000-memory.dmpFilesize
6.9MB
-
memory/356-49-0x00000000744E0000-0x0000000074BCE000-memory.dmpFilesize
6.9MB
-
memory/356-45-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/764-39-0x0000000000CF0000-0x0000000000F9A000-memory.dmpFilesize
2.7MB
-
memory/1992-37-0x00000000744E0000-0x0000000074BCE000-memory.dmpFilesize
6.9MB
-
memory/1992-36-0x0000000000520000-0x0000000000560000-memory.dmpFilesize
256KB
-
memory/1992-35-0x00000000744E0000-0x0000000074BCE000-memory.dmpFilesize
6.9MB
-
memory/2300-18-0x0000000000510000-0x0000000000518000-memory.dmpFilesize
32KB
-
memory/2300-14-0x0000000000380000-0x000000000038E000-memory.dmpFilesize
56KB
-
memory/2300-16-0x0000000000DF0000-0x0000000000E4C000-memory.dmpFilesize
368KB
-
memory/2300-17-0x00000000004F0000-0x0000000000502000-memory.dmpFilesize
72KB
-
memory/2300-2-0x0000000000400000-0x00000000004EA000-memory.dmpFilesize
936KB
-
memory/2300-19-0x00000000006D0000-0x00000000006E8000-memory.dmpFilesize
96KB
-
memory/2300-20-0x00000000008F0000-0x0000000000900000-memory.dmpFilesize
64KB
-
memory/2300-21-0x00000000744E0000-0x0000000074BCE000-memory.dmpFilesize
6.9MB
-
memory/2300-22-0x0000000000F30000-0x0000000000F70000-memory.dmpFilesize
256KB
-
memory/2300-13-0x00000000744E0000-0x0000000074BCE000-memory.dmpFilesize
6.9MB
-
memory/2300-3-0x0000000000400000-0x00000000004EA000-memory.dmpFilesize
936KB
-
memory/2300-15-0x0000000000F30000-0x0000000000F70000-memory.dmpFilesize
256KB
-
memory/2300-10-0x0000000000400000-0x00000000004EA000-memory.dmpFilesize
936KB
-
memory/2300-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2300-9-0x0000000000400000-0x00000000004EA000-memory.dmpFilesize
936KB
-
memory/2460-0-0x00000000010C0000-0x000000000136A000-memory.dmpFilesize
2.7MB
-
memory/2460-1-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/2700-25-0x00000000008F0000-0x0000000000B9A000-memory.dmpFilesize
2.7MB