Analysis

  • max time kernel
    74s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 01:19

General

  • Target

    5f6154a3940db4d56ccd8b457aad4a651c62f639c3c1eeaedaa18a678c1260c8.exe

  • Size

    2.6MB

  • MD5

    8366bcf215afdac2d26c38e5023ef966

  • SHA1

    d51a9d5644d4bcdebd441a203b46cb7719671902

  • SHA256

    5f6154a3940db4d56ccd8b457aad4a651c62f639c3c1eeaedaa18a678c1260c8

  • SHA512

    5025ea2674f871db44aee7235f2f2c45b944dfff227a63e6c08fb0c90f07087f1951d5eac4a79d54e504ffdd30a9e5fc4d4ba618d269d4a19e61d96b7fbe947c

  • SSDEEP

    24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxxT:Hh+ZkldoPKiYdqd6r

Malware Config

Extracted

Family

orcus

Botnet

ligeon

C2

ligeon.ddns.net:1606

Mutex

b98fb09a59c24a81b9d17a55ccf2c036

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f6154a3940db4d56ccd8b457aad4a651c62f639c3c1eeaedaa18a678c1260c8.exe
    "C:\Users\Admin\AppData\Local\Temp\5f6154a3940db4d56ccd8b457aad4a651c62f639c3c1eeaedaa18a678c1260c8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1388
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
      2⤵
      • Creates scheduled task(s)
      PID:1084
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4588
    • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
      C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4388
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
          PID:1420
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
          2⤵
          • Creates scheduled task(s)
          PID:4080
      • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
        C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe
        1⤵
          PID:3552
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            2⤵
              PID:3484
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F
              2⤵
              • Creates scheduled task(s)
              PID:4268

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log

            Filesize

            1KB

            MD5

            0672db2ef13237d5cb85075ff4915942

            SHA1

            ad8b4d3eb5e40791c47d48b22e273486f25f663f

            SHA256

            0a933408890369b5a178f9c30aa93d2c94f425650815cf8e8310de4e90a3b519

            SHA512

            84ad10ba5b695567d33a52f786405a5544aa49d8d23631ba9edf3afa877c5dbd81570d15bcf74bce5d9fb1afad2117d0a4ef913b396c0d923afefe615619c84b

          • C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe

            Filesize

            2.6MB

            MD5

            5909537f07b211d6de3f545ce93920f6

            SHA1

            987fa557562fae32d80e9fe1c239e0bccd15aaaf

            SHA256

            500e6da59b0dfec56011f72a623f0445edaa9dfe74e7a0b67ffb039bf3580bc6

            SHA512

            4999099201ab6d05e822aaa48d5de93905f3b5a8fe722fdb2535227d63a3ed1f00de851b3d3e9a0a636cf249db2a9951b694fde42182ca00a690ae11c3e8ece0

          • memory/1388-20-0x00000000066F0000-0x0000000006700000-memory.dmp

            Filesize

            64KB

          • memory/1388-8-0x0000000005A30000-0x0000000005A40000-memory.dmp

            Filesize

            64KB

          • memory/1388-21-0x0000000006730000-0x000000000673A000-memory.dmp

            Filesize

            40KB

          • memory/1388-22-0x0000000005A30000-0x0000000005A40000-memory.dmp

            Filesize

            64KB

          • memory/1388-12-0x0000000005910000-0x000000000596C000-memory.dmp

            Filesize

            368KB

          • memory/1388-13-0x0000000005FF0000-0x0000000006594000-memory.dmp

            Filesize

            5.6MB

          • memory/1388-14-0x0000000005AE0000-0x0000000005B72000-memory.dmp

            Filesize

            584KB

          • memory/1388-15-0x0000000073EA0000-0x0000000074650000-memory.dmp

            Filesize

            7.7MB

          • memory/1388-16-0x0000000005AD0000-0x0000000005AE2000-memory.dmp

            Filesize

            72KB

          • memory/1388-17-0x0000000005F80000-0x0000000005F88000-memory.dmp

            Filesize

            32KB

          • memory/1388-18-0x0000000005FA0000-0x0000000005FB8000-memory.dmp

            Filesize

            96KB

          • memory/1388-19-0x00000000068B0000-0x0000000006A72000-memory.dmp

            Filesize

            1.8MB

          • memory/1388-2-0x0000000000400000-0x00000000004EA000-memory.dmp

            Filesize

            936KB

          • memory/1388-7-0x0000000073EA0000-0x0000000074650000-memory.dmp

            Filesize

            7.7MB

          • memory/1388-11-0x00000000032D0000-0x00000000032DE000-memory.dmp

            Filesize

            56KB

          • memory/1420-31-0x0000000073EA0000-0x0000000074650000-memory.dmp

            Filesize

            7.7MB

          • memory/1420-32-0x00000000054B0000-0x00000000054C0000-memory.dmp

            Filesize

            64KB

          • memory/1420-34-0x0000000073EA0000-0x0000000074650000-memory.dmp

            Filesize

            7.7MB

          • memory/1428-1-0x00000000010E0000-0x00000000010E1000-memory.dmp

            Filesize

            4KB

          • memory/1428-0-0x0000000000B60000-0x0000000000E0A000-memory.dmp

            Filesize

            2.7MB

          • memory/3484-45-0x0000000073EA0000-0x0000000074650000-memory.dmp

            Filesize

            7.7MB

          • memory/3484-37-0x0000000000500000-0x00000000005EA000-memory.dmp

            Filesize

            936KB

          • memory/3484-44-0x0000000004C00000-0x0000000004C10000-memory.dmp

            Filesize

            64KB

          • memory/3484-43-0x0000000073EA0000-0x0000000074650000-memory.dmp

            Filesize

            7.7MB

          • memory/3552-36-0x0000000000150000-0x00000000003FA000-memory.dmp

            Filesize

            2.7MB

          • memory/4388-24-0x0000000000150000-0x00000000003FA000-memory.dmp

            Filesize

            2.7MB