Resubmissions
20-05-2024 14:13
240520-rjjzhsdc78 10Analysis
-
max time kernel
210s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 14:13
Static task
static1
General
-
Target
f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe
-
Size
85KB
-
MD5
958c4f1f63aa4b0916c3443e86ee5c4b
-
SHA1
94b33d97c41f88a5363688fb753ff21df5dd41e0
-
SHA256
f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e
-
SHA512
b7d12d0d0ce224dca54f1819c485d1e10c53f0d2ce57f9815f9a829770e3dc21697659e0cad3dae426d352a1892d6c8b2cda7a85bc065b07b6254035a0247d0b
-
SSDEEP
1536:ygLGdUFcYJnl3lU0PY5lZCXS85X2WlDeSdDatDRZl3pZduO+drmM+qckIt33+ld6:ygLGdUFcYJnl3lU0PY5lZCXS85X2WlDA
Malware Config
Extracted
orcus
154.212.149.59:446
315ff0624fe74021970d128fbc96aa53
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral1/memory/1420-15-0x0000000001290000-0x0000000001378000-memory.dmp orcus -
Executes dropped EXE 1 IoCs
pid Process 1420 f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1420 f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4936 wrote to memory of 3336 4936 f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe 89 PID 4936 wrote to memory of 3336 4936 f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe 89 PID 3336 wrote to memory of 1420 3336 cmd.exe 91 PID 3336 wrote to memory of 1420 3336 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe"C:\Users\Admin\AppData\Local\Temp\f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c C:\Users\Admin\AppData\Roaming\TeamViewer\f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Roaming\TeamViewer\f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exeC:\Users\Admin\AppData\Roaming\TeamViewer\f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\TeamViewer\f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e.exe
Filesize85KB
MD5958c4f1f63aa4b0916c3443e86ee5c4b
SHA194b33d97c41f88a5363688fb753ff21df5dd41e0
SHA256f20585f92942d4406423ebe1257b5eae8a460721e00bea42dc70ec948bd49f2e
SHA512b7d12d0d0ce224dca54f1819c485d1e10c53f0d2ce57f9815f9a829770e3dc21697659e0cad3dae426d352a1892d6c8b2cda7a85bc065b07b6254035a0247d0b