Resubmissions

20-05-2024 14:16

240520-rlahvsdd52 10

24-03-2024 22:26

240324-2cg7fscc9t 7

Analysis

  • max time kernel
    198s
  • max time network
    297s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 14:16

General

  • Target

    2cfcbae378ab69f0a78671a560571700.exe

  • Size

    2.6MB

  • MD5

    2cfcbae378ab69f0a78671a560571700

  • SHA1

    97a6e23d367fb58e5076780b9d6358bd7d0ee592

  • SHA256

    17bcbc74ec8166ff11ef983aece5446115a54eddb47138cd6ff7e5a509634962

  • SHA512

    803bef8de5d4693d08611afc9bcc1ec61a159b71bc86cac02ba853c5c335110e161f58c759521eb9c2d7e86d376754d87a2789d91094289e67daf2b4c961c67a

  • SSDEEP

    24576:ke3veFbXAD9zWi4MxO6m6b/fYLGACf9Dtc2PyX8+:ke/etqzXOu1Ff9DtTyf

Malware Config

Extracted

Family

orcus

C2

45.157.69.156:443

Mutex

3b453ed253424c82a94898f42bb6a1be

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cfcbae378ab69f0a78671a560571700.exe
    "C:\Users\Admin\AppData\Local\Temp\2cfcbae378ab69f0a78671a560571700.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Users\Admin\AppData\Local\2cfcbae378ab69f0a78671a560571700.exe
      "C:\Users\Admin\AppData\Local\2cfcbae378ab69f0a78671a560571700.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\2cfcbae378ab69f0a78671a560571700.exe

    Filesize

    2.6MB

    MD5

    2cfcbae378ab69f0a78671a560571700

    SHA1

    97a6e23d367fb58e5076780b9d6358bd7d0ee592

    SHA256

    17bcbc74ec8166ff11ef983aece5446115a54eddb47138cd6ff7e5a509634962

    SHA512

    803bef8de5d4693d08611afc9bcc1ec61a159b71bc86cac02ba853c5c335110e161f58c759521eb9c2d7e86d376754d87a2789d91094289e67daf2b4c961c67a

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2cfcbae378ab69f0a78671a560571700.exe.log

    Filesize

    660B

    MD5

    1c5e1d0ff3381486370760b0f2eb656b

    SHA1

    f9df6be8804ef611063f1ff277e323b1215372de

    SHA256

    f424c891fbc7385e9826beed2dd8755aeac5495744b5de0a1e370891a7beaf7a

    SHA512

    78f5fc40a185d04c9e4a02a3d1b10b4bd684c579a45a0d1e8f49f8dee9018ed7bc8875cbf21f98632f93ead667214a41904226ce54817b85caeeb4b0de54a743

  • memory/3508-0-0x00007FFE57C23000-0x00007FFE57C25000-memory.dmp

    Filesize

    8KB

  • memory/3508-1-0x0000022B161E0000-0x0000022B16472000-memory.dmp

    Filesize

    2.6MB

  • memory/3592-17-0x0000018FFBF00000-0x0000018FFBFE8000-memory.dmp

    Filesize

    928KB

  • memory/3592-16-0x00007FFE57C20000-0x00007FFE586E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3592-15-0x00007FFE57C20000-0x00007FFE586E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3592-18-0x0000018FFC030000-0x0000018FFC08C000-memory.dmp

    Filesize

    368KB

  • memory/3592-19-0x0000018FF9E10000-0x0000018FF9E1E000-memory.dmp

    Filesize

    56KB

  • memory/3592-20-0x00007FFE57C20000-0x00007FFE586E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3592-21-0x0000018FF9E50000-0x0000018FF9E62000-memory.dmp

    Filesize

    72KB

  • memory/3592-22-0x0000018FF9E60000-0x0000018FF9E78000-memory.dmp

    Filesize

    96KB

  • memory/3592-23-0x0000018FF9E30000-0x0000018FF9E40000-memory.dmp

    Filesize

    64KB

  • memory/3592-24-0x00007FFE57C20000-0x00007FFE586E1000-memory.dmp

    Filesize

    10.8MB