Resubmissions

20-05-2024 14:17

240520-rlneqaeb81 10

24-03-2024 12:06

240324-n9qm7scf68 7

Analysis

  • max time kernel
    197s
  • max time network
    299s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 14:17

General

  • Target

    128f9907493f02c86832e77ee1baeb50.exe

  • Size

    1022KB

  • MD5

    128f9907493f02c86832e77ee1baeb50

  • SHA1

    1a5f9e929ed8f3a83073156403a2cd943f29523b

  • SHA256

    f877b39e42932d1cb0bb2df1742c5fb492fdca752970e3397e733218d112be7b

  • SHA512

    be49646190ff383c3f9e9d6018c66abdbb86b6a807c6d8b2c789c33b9db6dc1ea99044b96feb54ec6cde0b46ab0c807c8005739ffd84ac181c22cb616185b684

  • SSDEEP

    24576:le3veFbXAD9zWi4MxO6m6b/fYLGACf9Dtc2PyY:le/etqzXOu1Ff9DtTy

Malware Config

Extracted

Family

orcus

C2

45.157.69.156:443

Mutex

3b453ed253424c82a94898f42bb6a1be

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\128f9907493f02c86832e77ee1baeb50.exe
    "C:\Users\Admin\AppData\Local\Temp\128f9907493f02c86832e77ee1baeb50.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Users\Admin\AppData\Local\128f9907493f02c86832e77ee1baeb50.exe
      "C:\Users\Admin\AppData\Local\128f9907493f02c86832e77ee1baeb50.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\128f9907493f02c86832e77ee1baeb50.exe

    Filesize

    1022KB

    MD5

    128f9907493f02c86832e77ee1baeb50

    SHA1

    1a5f9e929ed8f3a83073156403a2cd943f29523b

    SHA256

    f877b39e42932d1cb0bb2df1742c5fb492fdca752970e3397e733218d112be7b

    SHA512

    be49646190ff383c3f9e9d6018c66abdbb86b6a807c6d8b2c789c33b9db6dc1ea99044b96feb54ec6cde0b46ab0c807c8005739ffd84ac181c22cb616185b684

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\128f9907493f02c86832e77ee1baeb50.exe.log

    Filesize

    660B

    MD5

    1c5e1d0ff3381486370760b0f2eb656b

    SHA1

    f9df6be8804ef611063f1ff277e323b1215372de

    SHA256

    f424c891fbc7385e9826beed2dd8755aeac5495744b5de0a1e370891a7beaf7a

    SHA512

    78f5fc40a185d04c9e4a02a3d1b10b4bd684c579a45a0d1e8f49f8dee9018ed7bc8875cbf21f98632f93ead667214a41904226ce54817b85caeeb4b0de54a743

  • memory/2836-17-0x0000019DA8330000-0x0000019DA8418000-memory.dmp

    Filesize

    928KB

  • memory/2836-15-0x00007FF9F8B40000-0x00007FF9F9601000-memory.dmp

    Filesize

    10.8MB

  • memory/2836-16-0x00007FF9F8B40000-0x00007FF9F9601000-memory.dmp

    Filesize

    10.8MB

  • memory/2836-18-0x0000019D8FA00000-0x0000019D8FA5C000-memory.dmp

    Filesize

    368KB

  • memory/2836-20-0x00007FF9F8B40000-0x00007FF9F9601000-memory.dmp

    Filesize

    10.8MB

  • memory/2836-19-0x0000019D8E240000-0x0000019D8E24E000-memory.dmp

    Filesize

    56KB

  • memory/2836-21-0x0000019D8FB10000-0x0000019D8FB22000-memory.dmp

    Filesize

    72KB

  • memory/2836-22-0x0000019D8FB20000-0x0000019D8FB38000-memory.dmp

    Filesize

    96KB

  • memory/2836-23-0x0000019D8FB00000-0x0000019D8FB10000-memory.dmp

    Filesize

    64KB

  • memory/2836-24-0x00007FF9F8B40000-0x00007FF9F9601000-memory.dmp

    Filesize

    10.8MB

  • memory/4648-1-0x000001F41AC50000-0x000001F41AD54000-memory.dmp

    Filesize

    1.0MB

  • memory/4648-0-0x00007FF9F8B43000-0x00007FF9F8B45000-memory.dmp

    Filesize

    8KB