Resubmissions

20-05-2024 14:15

240520-rk2wqadd42 10

18-03-2024 04:21

240318-eynvssgg9w 7

Analysis

  • max time kernel
    287s
  • max time network
    300s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 14:15

General

  • Target

    25704a9ffe807caab1b7f0800f22692f.exe

  • Size

    981KB

  • MD5

    25704a9ffe807caab1b7f0800f22692f

  • SHA1

    61c2c9d62e14410a079746ab6c3272e3ba1e926d

  • SHA256

    bb878d54b68e3be71f2e61cd0e3a8f554a401b49204f76332fad3f8d4960f668

  • SHA512

    70fa6a3551573fac4b1a2852a7bb679c2a641ff62a7a597a5978984a61e8d7e467335e5b31c21d17ea76b855574baaaaa4b11417d42c7529bd757ccc693b6656

  • SSDEEP

    12288:fn4noCPJgCmEAK/frrzBmx7ByirqLVnU93t8dLB0w9LAhDHzqO4tq9q/47QrcSNw:fn4JPRnDJmx8UUVnUpil9LAf4tWoP

Malware Config

Extracted

Family

orcus

C2

103.155.214.203:443

Mutex

09171a523ae744698a8a9b8c7ef17497

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25704a9ffe807caab1b7f0800f22692f.exe
    "C:\Users\Admin\AppData\Local\Temp\25704a9ffe807caab1b7f0800f22692f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\25704a9ffe807caab1b7f0800f22692f.exe
      "C:\Users\Admin\AppData\Local\25704a9ffe807caab1b7f0800f22692f.exe"
      2⤵
      • Executes dropped EXE
      PID:3724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\25704a9ffe807caab1b7f0800f22692f.exe

    Filesize

    981KB

    MD5

    25704a9ffe807caab1b7f0800f22692f

    SHA1

    61c2c9d62e14410a079746ab6c3272e3ba1e926d

    SHA256

    bb878d54b68e3be71f2e61cd0e3a8f554a401b49204f76332fad3f8d4960f668

    SHA512

    70fa6a3551573fac4b1a2852a7bb679c2a641ff62a7a597a5978984a61e8d7e467335e5b31c21d17ea76b855574baaaaa4b11417d42c7529bd757ccc693b6656

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\25704a9ffe807caab1b7f0800f22692f.exe.log

    Filesize

    660B

    MD5

    1c5e1d0ff3381486370760b0f2eb656b

    SHA1

    f9df6be8804ef611063f1ff277e323b1215372de

    SHA256

    f424c891fbc7385e9826beed2dd8755aeac5495744b5de0a1e370891a7beaf7a

    SHA512

    78f5fc40a185d04c9e4a02a3d1b10b4bd684c579a45a0d1e8f49f8dee9018ed7bc8875cbf21f98632f93ead667214a41904226ce54817b85caeeb4b0de54a743

  • memory/944-0-0x00007FF800FD3000-0x00007FF800FD5000-memory.dmp

    Filesize

    8KB

  • memory/944-1-0x00000249BD310000-0x00000249BD40A000-memory.dmp

    Filesize

    1000KB

  • memory/3724-14-0x00000186F9E80000-0x00000186F9F68000-memory.dmp

    Filesize

    928KB

  • memory/3724-13-0x00007FF800FD0000-0x00007FF801A91000-memory.dmp

    Filesize

    10.8MB

  • memory/3724-12-0x00007FF800FD0000-0x00007FF801A91000-memory.dmp

    Filesize

    10.8MB

  • memory/3724-16-0x00000186DFD80000-0x00000186DFD8E000-memory.dmp

    Filesize

    56KB

  • memory/3724-15-0x00000186E1740000-0x00000186E179C000-memory.dmp

    Filesize

    368KB

  • memory/3724-17-0x00007FF800FD0000-0x00007FF801A91000-memory.dmp

    Filesize

    10.8MB

  • memory/3724-18-0x00000186E1570000-0x00000186E1582000-memory.dmp

    Filesize

    72KB

  • memory/3724-19-0x00000186E1580000-0x00000186E1598000-memory.dmp

    Filesize

    96KB

  • memory/3724-20-0x00000186DFF40000-0x00000186DFF50000-memory.dmp

    Filesize

    64KB

  • memory/3724-21-0x00007FF800FD0000-0x00007FF801A91000-memory.dmp

    Filesize

    10.8MB