Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 23:44
Behavioral task
behavioral1
Sample
2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
2c49c82f684c4d5de26627294556ed5e
-
SHA1
3df81bf27d88964c7f56d13b6a11e6f2873d065b
-
SHA256
acccfc2189e8bde1e7566f15bb9b3b0e562570eabb893cac966c297b65c19364
-
SHA512
950cc7c39b25ea874c9412445459442ac4a9d63fd0578c2a9cc9fd81b74d40d7439f5c304cbb4ee5b91c009f690159dd7947a7a5fcc7aa910bd3b2920cf07419
-
SSDEEP
49152:Ur9gNGKXYe/AhPAyTJwbfxlycZ1A5wR/LKbPD1+:UBMd8ub7ycZ1b+b
Malware Config
Extracted
orcus
FudServ
vam0vsem0pizda.ddns.net:1704
aa3ea6f245a74b669a769243c6a90de7
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral2/memory/1576-6-0x0000000000400000-0x00000000004EA000-memory.dmp orcus -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DedStrong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DedStrong.exe -
Executes dropped EXE 2 IoCs
pid Process 2264 DedStrong.exe 2276 DedStrong.exe -
resource yara_rule behavioral2/memory/5016-0-0x0000000000280000-0x0000000000566000-memory.dmp upx behavioral2/memory/5016-2-0x0000000000280000-0x0000000000566000-memory.dmp upx behavioral2/memory/5016-12-0x0000000000280000-0x0000000000566000-memory.dmp upx behavioral2/files/0x0005000000022ac7-26.dat upx behavioral2/memory/2264-28-0x0000000000620000-0x0000000000906000-memory.dmp upx behavioral2/memory/2264-30-0x0000000000620000-0x0000000000906000-memory.dmp upx behavioral2/memory/2264-39-0x0000000000620000-0x0000000000906000-memory.dmp upx behavioral2/memory/2276-42-0x0000000000620000-0x0000000000906000-memory.dmp upx behavioral2/memory/2276-43-0x0000000000620000-0x0000000000906000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AutoIt3 = "C:\\Users\\Admin\\AppData\\Roaming\\AutoIt3\\DedStrong.exe" 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AutoIt3 = "C:\\Users\\Admin\\AppData\\Roaming\\AutoIt3\\DedStrong.exe" DedStrong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AutoIt3 = "C:\\Users\\Admin\\AppData\\Roaming\\AutoIt3\\DedStrong.exe" DedStrong.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5016-2-0x0000000000280000-0x0000000000566000-memory.dmp autoit_exe behavioral2/memory/5016-12-0x0000000000280000-0x0000000000566000-memory.dmp autoit_exe behavioral2/memory/2264-30-0x0000000000620000-0x0000000000906000-memory.dmp autoit_exe behavioral2/memory/2264-39-0x0000000000620000-0x0000000000906000-memory.dmp autoit_exe behavioral2/memory/2276-43-0x0000000000620000-0x0000000000906000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winmgmts:\root\cimv2 DedStrong.exe File opened for modification C:\Windows\SysWOW64\winmgmts:\root\cimv2 DedStrong.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5016 set thread context of 1576 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 93 PID 2264 set thread context of 4224 2264 DedStrong.exe 97 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3576 schtasks.exe 4944 schtasks.exe 1764 schtasks.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName DedStrong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DedStrong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName DedStrong.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DedStrong.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DedStrong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DedStrong.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\root\cimv2 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 2264 DedStrong.exe 2276 DedStrong.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1576 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1576 RegSvcs.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 5016 wrote to memory of 3576 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 89 PID 5016 wrote to memory of 3576 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 89 PID 5016 wrote to memory of 3576 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 89 PID 5016 wrote to memory of 1576 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 93 PID 5016 wrote to memory of 1576 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 93 PID 5016 wrote to memory of 1576 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 93 PID 5016 wrote to memory of 1576 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 93 PID 5016 wrote to memory of 1576 5016 2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe 93 PID 2264 wrote to memory of 4944 2264 DedStrong.exe 95 PID 2264 wrote to memory of 4944 2264 DedStrong.exe 95 PID 2264 wrote to memory of 4944 2264 DedStrong.exe 95 PID 2264 wrote to memory of 4224 2264 DedStrong.exe 97 PID 2264 wrote to memory of 4224 2264 DedStrong.exe 97 PID 2264 wrote to memory of 4224 2264 DedStrong.exe 97 PID 2264 wrote to memory of 4224 2264 DedStrong.exe 97 PID 2264 wrote to memory of 4224 2264 DedStrong.exe 97 PID 2276 wrote to memory of 1764 2276 DedStrong.exe 99 PID 2276 wrote to memory of 1764 2276 DedStrong.exe 99 PID 2276 wrote to memory of 1764 2276 DedStrong.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c49c82f684c4d5de26627294556ed5e_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /tn ikllnhvpvt /tr C:\Users\Admin\AppData\Roaming\AutoIt3\DedStrong.exe /sc minute /mo 12⤵
- Creates scheduled task(s)
PID:3576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
C:\Users\Admin\AppData\Roaming\AutoIt3\DedStrong.exeC:\Users\Admin\AppData\Roaming\AutoIt3\DedStrong.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /tn ikllnhvpvt /tr C:\Users\Admin\AppData\Roaming\AutoIt3\DedStrong.exe /sc minute /mo 12⤵
- Creates scheduled task(s)
PID:4944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:4224
-
-
C:\Users\Admin\AppData\Roaming\AutoIt3\DedStrong.exeC:\Users\Admin\AppData\Roaming\AutoIt3\DedStrong.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /tn ikllnhvpvt /tr C:\Users\Admin\AppData\Roaming\AutoIt3\DedStrong.exe /sc minute /mo 12⤵
- Creates scheduled task(s)
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52c49c82f684c4d5de26627294556ed5e
SHA13df81bf27d88964c7f56d13b6a11e6f2873d065b
SHA256acccfc2189e8bde1e7566f15bb9b3b0e562570eabb893cac966c297b65c19364
SHA512950cc7c39b25ea874c9412445459442ac4a9d63fd0578c2a9cc9fd81b74d40d7439f5c304cbb4ee5b91c009f690159dd7947a7a5fcc7aa910bd3b2920cf07419