Resubmissions

20-05-2024 14:16

240520-rlhjgaeb8t 10

24-03-2024 10:31

240324-mkc55sbh87 7

Analysis

  • max time kernel
    233s
  • max time network
    307s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 14:16

General

  • Target

    0374a5265d5ec5febcd31867d36fc3b0.exe

  • Size

    993KB

  • MD5

    0374a5265d5ec5febcd31867d36fc3b0

  • SHA1

    7a0ddd9ea155a4bc7decf202fba4f3ab00945308

  • SHA256

    8dea2d324a4bf1fb49bd5eaf009fdafaa4001807912efff03f411082e01d24b7

  • SHA512

    408b9ac6251c9bdc6b4061e99c3e05e77e06334a283be3958e7c98053133f9c0a69fb08372f5c739ab3879d5539b022d15da30f99e1adbae451c9574200e6b86

  • SSDEEP

    24576:He3veFbXAD9zWi4MxO6m6b/fYLGACf9Dtc2Py/+:He/etqzXOu1Ff9DtTyW

Malware Config

Extracted

Family

orcus

C2

45.157.69.156:443

Mutex

3b453ed253424c82a94898f42bb6a1be

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0374a5265d5ec5febcd31867d36fc3b0.exe
    "C:\Users\Admin\AppData\Local\Temp\0374a5265d5ec5febcd31867d36fc3b0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\0374a5265d5ec5febcd31867d36fc3b0.exe
      "C:\Users\Admin\AppData\Local\0374a5265d5ec5febcd31867d36fc3b0.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4560
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4340 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\0374a5265d5ec5febcd31867d36fc3b0.exe

      Filesize

      993KB

      MD5

      0374a5265d5ec5febcd31867d36fc3b0

      SHA1

      7a0ddd9ea155a4bc7decf202fba4f3ab00945308

      SHA256

      8dea2d324a4bf1fb49bd5eaf009fdafaa4001807912efff03f411082e01d24b7

      SHA512

      408b9ac6251c9bdc6b4061e99c3e05e77e06334a283be3958e7c98053133f9c0a69fb08372f5c739ab3879d5539b022d15da30f99e1adbae451c9574200e6b86

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0374a5265d5ec5febcd31867d36fc3b0.exe.log

      Filesize

      660B

      MD5

      1c5e1d0ff3381486370760b0f2eb656b

      SHA1

      f9df6be8804ef611063f1ff277e323b1215372de

      SHA256

      f424c891fbc7385e9826beed2dd8755aeac5495744b5de0a1e370891a7beaf7a

      SHA512

      78f5fc40a185d04c9e4a02a3d1b10b4bd684c579a45a0d1e8f49f8dee9018ed7bc8875cbf21f98632f93ead667214a41904226ce54817b85caeeb4b0de54a743

    • memory/4560-17-0x00007FFAE92C0000-0x00007FFAE9D81000-memory.dmp

      Filesize

      10.8MB

    • memory/4560-16-0x00007FFAE92C0000-0x00007FFAE9D81000-memory.dmp

      Filesize

      10.8MB

    • memory/4560-18-0x0000020AB27D0000-0x0000020AB28B8000-memory.dmp

      Filesize

      928KB

    • memory/4560-19-0x0000020AB28C0000-0x0000020AB291C000-memory.dmp

      Filesize

      368KB

    • memory/4560-20-0x00007FFAE92C0000-0x00007FFAE9D81000-memory.dmp

      Filesize

      10.8MB

    • memory/4560-21-0x0000020AB2730000-0x0000020AB273E000-memory.dmp

      Filesize

      56KB

    • memory/4560-22-0x0000020ACB100000-0x0000020ACB112000-memory.dmp

      Filesize

      72KB

    • memory/4560-23-0x0000020ACB110000-0x0000020ACB128000-memory.dmp

      Filesize

      96KB

    • memory/4560-24-0x0000020ACB0F0000-0x0000020ACB100000-memory.dmp

      Filesize

      64KB

    • memory/4560-25-0x00007FFAE92C0000-0x00007FFAE9D81000-memory.dmp

      Filesize

      10.8MB

    • memory/4616-2-0x00007FFAE92C3000-0x00007FFAE92C5000-memory.dmp

      Filesize

      8KB

    • memory/4616-1-0x0000018DEDB00000-0x0000018DEDBFA000-memory.dmp

      Filesize

      1000KB

    • memory/4616-0-0x00007FFAE92C3000-0x00007FFAE92C5000-memory.dmp

      Filesize

      8KB