Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe
Resource
win7-20240215-en
General
-
Target
f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe
-
Size
2.6MB
-
MD5
942e6d4d79fafc99f4339e0cd957675d
-
SHA1
03f5cadf461749cd06cd4defd93e31e3ce9e716f
-
SHA256
f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621
-
SHA512
1192451b24280780b65881c4a27b09cbe98fccc836819832554796d0dd966ab29dfe27afd0476efb2f73689b992813a8e63f1525c49395a5d41e3a90493a3130
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxx9:Hh+ZkldoPKiYdqd6l
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 6 IoCs
resource yara_rule behavioral1/memory/3024-4-0x0000000000090000-0x000000000017A000-memory.dmp orcus behavioral1/memory/3024-10-0x0000000000090000-0x000000000017A000-memory.dmp orcus behavioral1/memory/3024-11-0x0000000000090000-0x000000000017A000-memory.dmp orcus behavioral1/memory/2516-28-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2516-34-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2516-35-0x0000000000400000-0x00000000004EA000-memory.dmp orcus -
Executes dropped EXE 3 IoCs
pid Process 2460 setspn.exe 1556 setspn.exe 1796 setspn.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2240-0-0x00000000001A0000-0x000000000044A000-memory.dmp autoit_exe behavioral1/files/0x000b0000000153c7-22.dat autoit_exe behavioral1/memory/2460-24-0x0000000001140000-0x00000000013EA000-memory.dmp autoit_exe behavioral1/memory/1556-40-0x0000000001140000-0x00000000013EA000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2240 set thread context of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2460 set thread context of 2516 2460 setspn.exe 33 PID 1556 set thread context of 2068 1556 setspn.exe 39 PID 1796 set thread context of 2028 1796 setspn.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1904 schtasks.exe 2928 schtasks.exe 2436 schtasks.exe 1692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 2460 setspn.exe 2460 setspn.exe 1556 setspn.exe 1556 setspn.exe 1796 setspn.exe 1796 setspn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3024 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3024 RegSvcs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2240 wrote to memory of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2240 wrote to memory of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2240 wrote to memory of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2240 wrote to memory of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2240 wrote to memory of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2240 wrote to memory of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2240 wrote to memory of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2240 wrote to memory of 3024 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 28 PID 2240 wrote to memory of 1904 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 29 PID 2240 wrote to memory of 1904 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 29 PID 2240 wrote to memory of 1904 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 29 PID 2240 wrote to memory of 1904 2240 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 29 PID 2620 wrote to memory of 2460 2620 taskeng.exe 32 PID 2620 wrote to memory of 2460 2620 taskeng.exe 32 PID 2620 wrote to memory of 2460 2620 taskeng.exe 32 PID 2620 wrote to memory of 2460 2620 taskeng.exe 32 PID 2460 wrote to memory of 2516 2460 setspn.exe 33 PID 2460 wrote to memory of 2516 2460 setspn.exe 33 PID 2460 wrote to memory of 2516 2460 setspn.exe 33 PID 2460 wrote to memory of 2516 2460 setspn.exe 33 PID 2460 wrote to memory of 2516 2460 setspn.exe 33 PID 2460 wrote to memory of 2516 2460 setspn.exe 33 PID 2460 wrote to memory of 2516 2460 setspn.exe 33 PID 2460 wrote to memory of 2516 2460 setspn.exe 33 PID 2460 wrote to memory of 2516 2460 setspn.exe 33 PID 2460 wrote to memory of 2928 2460 setspn.exe 34 PID 2460 wrote to memory of 2928 2460 setspn.exe 34 PID 2460 wrote to memory of 2928 2460 setspn.exe 34 PID 2460 wrote to memory of 2928 2460 setspn.exe 34 PID 2620 wrote to memory of 1556 2620 taskeng.exe 38 PID 2620 wrote to memory of 1556 2620 taskeng.exe 38 PID 2620 wrote to memory of 1556 2620 taskeng.exe 38 PID 2620 wrote to memory of 1556 2620 taskeng.exe 38 PID 1556 wrote to memory of 2068 1556 setspn.exe 39 PID 1556 wrote to memory of 2068 1556 setspn.exe 39 PID 1556 wrote to memory of 2068 1556 setspn.exe 39 PID 1556 wrote to memory of 2068 1556 setspn.exe 39 PID 1556 wrote to memory of 2068 1556 setspn.exe 39 PID 1556 wrote to memory of 2068 1556 setspn.exe 39 PID 1556 wrote to memory of 2068 1556 setspn.exe 39 PID 1556 wrote to memory of 2068 1556 setspn.exe 39 PID 1556 wrote to memory of 2068 1556 setspn.exe 39 PID 1556 wrote to memory of 2436 1556 setspn.exe 40 PID 1556 wrote to memory of 2436 1556 setspn.exe 40 PID 1556 wrote to memory of 2436 1556 setspn.exe 40 PID 1556 wrote to memory of 2436 1556 setspn.exe 40 PID 2620 wrote to memory of 1796 2620 taskeng.exe 42 PID 2620 wrote to memory of 1796 2620 taskeng.exe 42 PID 2620 wrote to memory of 1796 2620 taskeng.exe 42 PID 2620 wrote to memory of 1796 2620 taskeng.exe 42 PID 1796 wrote to memory of 2028 1796 setspn.exe 43 PID 1796 wrote to memory of 2028 1796 setspn.exe 43 PID 1796 wrote to memory of 2028 1796 setspn.exe 43 PID 1796 wrote to memory of 2028 1796 setspn.exe 43 PID 1796 wrote to memory of 2028 1796 setspn.exe 43 PID 1796 wrote to memory of 2028 1796 setspn.exe 43 PID 1796 wrote to memory of 2028 1796 setspn.exe 43 PID 1796 wrote to memory of 2028 1796 setspn.exe 43 PID 1796 wrote to memory of 2028 1796 setspn.exe 43 PID 1796 wrote to memory of 1692 1796 setspn.exe 44 PID 1796 wrote to memory of 1692 1796 setspn.exe 44 PID 1796 wrote to memory of 1692 1796 setspn.exe 44 PID 1796 wrote to memory of 1692 1796 setspn.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe"C:\Users\Admin\AppData\Local\Temp\f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:1904
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9D252D83-6D40-45E5-BFE5-698252152134} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2516
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2928
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2068
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2436
-
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2028
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5f23f35bbf6ed3cb1b142a494c9cafb44
SHA130828d67b1f2a50ff9b0a5d4b1dcb3c638f0aee2
SHA2567c47a0bd684f3865cf021b81918805ddf7d9cabbf700bf6d0c8851ce0d1f1ad3
SHA51206910d0a286fc4718a6733370ee6527bd2f03186d5124449cd7003698e8c2d24b11bf90e0d8f8a45f656f5dbf46ba12afd316f482cbde7996e1cc332bf9ab850