Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 01:18
Behavioral task
behavioral1
Sample
7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe
Resource
win7-20240221-en
General
-
Target
7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe
-
Size
915KB
-
MD5
f37bc9964f10880e3e89528cc4d1f677
-
SHA1
3657ae613f45ae0609b0bea854104f1bd398b038
-
SHA256
7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763
-
SHA512
a4dea6d511b8fd167f130a8e85a549a7f80869ca8584fd129437b991bab227823852b8e5274ec082714e0bf5388aefbd7a5f6ff17f15335ecb2b3ba634c0b450
-
SSDEEP
24576:lBB4MROxnF033dkrrcI0AilFEvxHPmooo:lQMi+SrrcI0AilFEvxHP
Malware Config
Extracted
orcus
100.114.145.122:7777
58040c8e707f46aeaa354c0509774164
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\userprofile
-
reconnect_delay
10000
-
registry_keyname
svchostt
-
taskscheduler_taskname
svchostt
-
watchdog_path
AppData\powershell.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x0034000000015653-15.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/memory/3008-1-0x0000000000B50000-0x0000000000C3A000-memory.dmp orcus behavioral1/files/0x0034000000015653-15.dat orcus -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\userprofile 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe File opened for modification C:\Program Files (x86)\userprofile 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe File created C:\Program Files (x86)\userprofile.config 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2732 AcroRd32.exe 2732 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2644 3008 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe 29 PID 3008 wrote to memory of 2644 3008 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe 29 PID 3008 wrote to memory of 2644 3008 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe 29 PID 3008 wrote to memory of 2644 3008 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe 29 PID 3008 wrote to memory of 2644 3008 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe 29 PID 3008 wrote to memory of 2644 3008 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe 29 PID 3008 wrote to memory of 2644 3008 7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe 29 PID 2644 wrote to memory of 2732 2644 rundll32.exe 30 PID 2644 wrote to memory of 2732 2644 rundll32.exe 30 PID 2644 wrote to memory of 2732 2644 rundll32.exe 30 PID 2644 wrote to memory of 2732 2644 rundll32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe"C:\Users\Admin\AppData\Local\Temp\7735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Program Files (x86)\userprofile2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Program Files (x86)\userprofile"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
915KB
MD5f37bc9964f10880e3e89528cc4d1f677
SHA13657ae613f45ae0609b0bea854104f1bd398b038
SHA2567735b9fa1bf55cf0c008e81deb1353cf6465a6a0513f00670fc3eb4254562763
SHA512a4dea6d511b8fd167f130a8e85a549a7f80869ca8584fd129437b991bab227823852b8e5274ec082714e0bf5388aefbd7a5f6ff17f15335ecb2b3ba634c0b450
-
Filesize
3KB
MD55ac77dcd8660f82331c9d05cb222cef2
SHA15100bfacce596197a768d4ba6b265726e06979ab
SHA2562aca84ee48c0480b26ccd8e0661601608b2d38b1aae27f786c278faef69a21b4
SHA512eba9ff57ef44ab53b932b975461eefeb8129ef55475a0d5d7a8a10ac0215156dc078e742e1166cc3f6815757d1104d72bbcd2a7c614172a6c6d7e924369b136c