Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe
Resource
win7-20240221-en
General
-
Target
b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe
-
Size
6.9MB
-
MD5
e173c05c4a3e872292b1f21e6d1a633a
-
SHA1
60c97091d291855e9dcd3757ddc3a78daae1ac18
-
SHA256
b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7
-
SHA512
34acb6f310646af5ae973db4612e001ec2078a0c0f2758f9dafce18b34e5f703cedd3d316ed458bde47b9c31149e46fbddb16e2c0320e19e426389648828a5af
-
SSDEEP
98304:kb0PkiC5Sofp5XJdP/0Gu4STi94vlTKlrfxgLQFMjAe6shVJRzux84i:kYlMJdXS4STiqlTKlTyLKMkpsLvux8j
Malware Config
Signatures
-
Orcurs Rat Executable 3 IoCs
Processes:
resource yara_rule behavioral2/memory/212-1-0x0000000000C60000-0x00000000020D6000-memory.dmp orcus behavioral2/memory/212-4-0x0000000000C60000-0x00000000020D6000-memory.dmp orcus behavioral2/memory/212-7-0x0000000000C60000-0x00000000020D6000-memory.dmp orcus -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exepid process 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exepid process 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exepid process 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exedescription pid process target process PID 212 wrote to memory of 2236 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe cmd.exe PID 212 wrote to memory of 2236 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe cmd.exe PID 212 wrote to memory of 2236 212 b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe"C:\Users\Admin\AppData\Local\Temp\b64d21aaa7c4d1b39c3210c505a356ae2b8f62546a4582aea9b8b4bde1331cd7.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/212-1-0x0000000000C60000-0x00000000020D6000-memory.dmpFilesize
20.5MB
-
memory/212-2-0x0000000002700000-0x0000000002701000-memory.dmpFilesize
4KB
-
memory/212-4-0x0000000000C60000-0x00000000020D6000-memory.dmpFilesize
20.5MB
-
memory/212-0-0x00000000026F0000-0x00000000026F1000-memory.dmpFilesize
4KB
-
memory/212-7-0x0000000000C60000-0x00000000020D6000-memory.dmpFilesize
20.5MB