Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 01:00

General

  • Target

    705e236d9741eab7b6bd7c00cc31396d_JaffaCakes118.exe

  • Size

    905KB

  • MD5

    705e236d9741eab7b6bd7c00cc31396d

  • SHA1

    b74b875ca24cf47706dd3c9d143a667cf3b5578f

  • SHA256

    b024801dc39508b26f463fdd002e4daaf3c3e45870c664f75ab1a98e42cb1d2f

  • SHA512

    05efc5d585c86d4c3eff76313e8fd24647458207f2b9885bcea4852db8c4daf928e53468b990c6a77bb624939669a87672a42d0a50737880e1af5188d9c8a4c3

  • SSDEEP

    12288:noHWszy2LkjKgEX0pq5g7dG1lFlWcYT70pxnnaaoawvjKgRRAErZNrI0AilFEvxk:Leu4MROxnFDgHjrZlI0AilFEvxHiSVu

Malware Config

Extracted

Family

orcus

C2

s1.kekw.tk:1337

Mutex

ec048ad7fb2544ce8ce0e245ce5e3c05

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %allusersprofile%\Microsoft\Windows\time.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\705e236d9741eab7b6bd7c00cc31396d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\705e236d9741eab7b6bd7c00cc31396d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dgjhcibv.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1018.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1017.tmp"
        3⤵
          PID:2676
      • C:\ProgramData\Microsoft\Windows\time.exe
        "C:\ProgramData\Microsoft\Windows\time.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2120
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {AB5859FA-0065-4E36-8827-B4930D55ED91} S-1-5-21-481678230-3773327859-3495911762-1000:UIBNQNMA\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\ProgramData\Microsoft\Windows\time.exe
        C:\ProgramData\Microsoft\Windows\time.exe
        2⤵
        • Executes dropped EXE
        PID:2640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\Windows\time.exe

      Filesize

      905KB

      MD5

      705e236d9741eab7b6bd7c00cc31396d

      SHA1

      b74b875ca24cf47706dd3c9d143a667cf3b5578f

      SHA256

      b024801dc39508b26f463fdd002e4daaf3c3e45870c664f75ab1a98e42cb1d2f

      SHA512

      05efc5d585c86d4c3eff76313e8fd24647458207f2b9885bcea4852db8c4daf928e53468b990c6a77bb624939669a87672a42d0a50737880e1af5188d9c8a4c3

    • C:\ProgramData\Microsoft\Windows\time.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • C:\Users\Admin\AppData\Local\Temp\RES1018.tmp

      Filesize

      1KB

      MD5

      7a4a05380de5a55c1e3c14236e38d43b

      SHA1

      9e30af768861995cd2782211520061ccb78ad2a5

      SHA256

      ab3ae776e6057b7ac051ff950ca80f05925cc6e31cacd27482ac07b3e16f30cb

      SHA512

      4378727aafc5aa3d9c31ae64850a6640a6940f3448470e24abae4af0fa5ba8bcf50243c503a18a8c18149ad66b94d88517ee7adee8871cccbfec3ed028b7f44f

    • C:\Users\Admin\AppData\Local\Temp\dgjhcibv.dll

      Filesize

      76KB

      MD5

      43879524d012565b8e6cc22def98094e

      SHA1

      ede62c68d763526ce45423ce056c867d402e94a8

      SHA256

      a0ea85063f1f75ec2742a0e2f0165e4c3eec1ef727c136ae0edd5e981b87f6e5

      SHA512

      c24af5d735584891ba3dfdea8ea0553b86a6718da570a62369420b5428e78bf0088d3a940ec5b6d9716176dfc33801f29516a9b0099bf7448079d423cd08f786

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC1017.tmp

      Filesize

      676B

      MD5

      68d2aa6f912b9ced6df7ad6922f58498

      SHA1

      5dca7d158e35828f918732d2301c0cdcbb530815

      SHA256

      af460c9bca79eface735c7d943281643b4305a2b863b438d0ca0e830d9214d6e

      SHA512

      3cac5752763a12395a567a811dd86df0fd113af55a796128ad1acaf2f06d4330652fe86d3c282e8e29d6f28c46afd6373f91de5a42a5e9189cf1137da9df559e

    • \??\c:\Users\Admin\AppData\Local\Temp\dgjhcibv.0.cs

      Filesize

      208KB

      MD5

      250321226bbc2a616d91e1c82cb4ab2b

      SHA1

      7cffd0b2e9c842865d8961386ab8fcfac8d04173

      SHA256

      ef2707f83a0c0927cfd46b115641b9cae52a41123e4826515b9eeb561785218d

      SHA512

      bda59ca04cdf254f837f2cec6da55eff5c3d2af00da66537b9ebaa3601c502ae63772f082fd12663b63d537d2e03efe87a3b5746ef25e842aaf1c7d88245b4e1

    • \??\c:\Users\Admin\AppData\Local\Temp\dgjhcibv.cmdline

      Filesize

      349B

      MD5

      977205e745980e53f179e800543b9729

      SHA1

      bfc19798f76dab77deaf8aaf3ef9c8c53f49b0d0

      SHA256

      cc1ef790fd16c4cadac677aefcc7231ef4149c71a8404fb787146607db40e982

      SHA512

      51907536e22344824ad2d317b3e45d9e344587d969cfda0de3a7e531209dbece6debdfea21da108b124db06f93672bc136e9709e56617a5a8bdd732a48fa034c

    • memory/2120-29-0x0000000001350000-0x0000000001438000-memory.dmp

      Filesize

      928KB

    • memory/2120-32-0x000000001ABB0000-0x000000001ABC0000-memory.dmp

      Filesize

      64KB

    • memory/2120-31-0x000000001AB80000-0x000000001AB98000-memory.dmp

      Filesize

      96KB

    • memory/2120-30-0x00000000012F0000-0x000000000133E000-memory.dmp

      Filesize

      312KB

    • memory/2440-4-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

      Filesize

      9.6MB

    • memory/2440-20-0x0000000000550000-0x0000000000562000-memory.dmp

      Filesize

      72KB

    • memory/2440-2-0x0000000000510000-0x000000000051E000-memory.dmp

      Filesize

      56KB

    • memory/2440-1-0x000000001AD60000-0x000000001ADBC000-memory.dmp

      Filesize

      368KB

    • memory/2440-27-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

      Filesize

      9.6MB

    • memory/2440-3-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

      Filesize

      9.6MB

    • memory/2440-0-0x000007FEF658E000-0x000007FEF658F000-memory.dmp

      Filesize

      4KB

    • memory/2440-17-0x000000001ADC0000-0x000000001ADD6000-memory.dmp

      Filesize

      88KB

    • memory/3000-19-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

      Filesize

      9.6MB

    • memory/3000-34-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

      Filesize

      9.6MB