Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 01:00

General

  • Target

    705e236d9741eab7b6bd7c00cc31396d_JaffaCakes118.exe

  • Size

    905KB

  • MD5

    705e236d9741eab7b6bd7c00cc31396d

  • SHA1

    b74b875ca24cf47706dd3c9d143a667cf3b5578f

  • SHA256

    b024801dc39508b26f463fdd002e4daaf3c3e45870c664f75ab1a98e42cb1d2f

  • SHA512

    05efc5d585c86d4c3eff76313e8fd24647458207f2b9885bcea4852db8c4daf928e53468b990c6a77bb624939669a87672a42d0a50737880e1af5188d9c8a4c3

  • SSDEEP

    12288:noHWszy2LkjKgEX0pq5g7dG1lFlWcYT70pxnnaaoawvjKgRRAErZNrI0AilFEvxk:Leu4MROxnFDgHjrZlI0AilFEvxHiSVu

Malware Config

Extracted

Family

orcus

C2

s1.kekw.tk:1337

Mutex

ec048ad7fb2544ce8ce0e245ce5e3c05

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %allusersprofile%\Microsoft\Windows\time.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\705e236d9741eab7b6bd7c00cc31396d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\705e236d9741eab7b6bd7c00cc31396d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hjkfpxws.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4244
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES52E4.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC52E3.tmp"
        3⤵
          PID:3832
      • C:\ProgramData\Microsoft\Windows\time.exe
        "C:\ProgramData\Microsoft\Windows\time.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1352
    • C:\ProgramData\Microsoft\Windows\time.exe
      C:\ProgramData\Microsoft\Windows\time.exe
      1⤵
      • Executes dropped EXE
      PID:1660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\Windows\time.exe

      Filesize

      905KB

      MD5

      705e236d9741eab7b6bd7c00cc31396d

      SHA1

      b74b875ca24cf47706dd3c9d143a667cf3b5578f

      SHA256

      b024801dc39508b26f463fdd002e4daaf3c3e45870c664f75ab1a98e42cb1d2f

      SHA512

      05efc5d585c86d4c3eff76313e8fd24647458207f2b9885bcea4852db8c4daf928e53468b990c6a77bb624939669a87672a42d0a50737880e1af5188d9c8a4c3

    • C:\ProgramData\Microsoft\Windows\time.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • C:\Users\Admin\AppData\Local\Temp\RES52E4.tmp

      Filesize

      1KB

      MD5

      9becf825688c6726776dd271aa2eb94d

      SHA1

      c50e7a5e875ad8b07788738f5d511e04ddd81465

      SHA256

      9c339a4523e1c27fab57ae2bd2b02efdca131daad1a8d14b2c32addf28b7c403

      SHA512

      d370ca6de2ef99c42b637064c8b82fb16624853640b9e051edcb528d5fbab1dc97c5c625f3d25320701e88fb0909a2cb0ce205c500b7c7535f31477286d43c21

    • C:\Users\Admin\AppData\Local\Temp\hjkfpxws.dll

      Filesize

      76KB

      MD5

      24afbcc767b627ebcc20b8c7ff05ff85

      SHA1

      3bc4c3e41793f9903c024eda43f2dfaab22f21f6

      SHA256

      1af9021ed951ab8949f4d31887feff85f47dd5c1b7020cf85e21a1c25ef11f3e

      SHA512

      47fa814a4fc9d45d52d07011122d8a6c8ded4eb7980fd8f35cadce189047818510f71d80ac5b3e357843fedf05f011b6258110c3012dc303a76fd9715e1efde4

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC52E3.tmp

      Filesize

      676B

      MD5

      fbf09ce76f2400d5c48176d26da0c8f7

      SHA1

      07ee2a191005826a45e2766320636bcf6d6efb9c

      SHA256

      7e9490c8e38f0dbd050c8c8ebdc13a19c637209650f26434656d01ffd7409678

      SHA512

      18ca259ec7f8aad7975b1b23f8a52fb9f789b022e01556236fac3e0f61814e543ba1ea09f9677e1d39087006deb0bc7767efc7e2d7a83c111cdbf3f6714b0e10

    • \??\c:\Users\Admin\AppData\Local\Temp\hjkfpxws.0.cs

      Filesize

      208KB

      MD5

      bd2ede1eb9d75bedf2449df9b1edf02f

      SHA1

      4b98323042c1877aac19ce2ed7d52eda4dcd0773

      SHA256

      02f525a33e97120b6aaa31d728145b93b25461fd3a7e5a96afb2767486f19e4b

      SHA512

      4aaa28a2256c846e4017ab15fdd01d032be1b95b0ab3ec4ee3c150fdd09f8678e547f645421c241705874546e267b4883834ce2320a41fac70bd31b1506185cf

    • \??\c:\Users\Admin\AppData\Local\Temp\hjkfpxws.cmdline

      Filesize

      349B

      MD5

      4d7a12fcbcaa41413cf90724a1219961

      SHA1

      da6d0c7ef26ad20ce24e833fbd3d563316791d0f

      SHA256

      a9e056c335d6ca7059b2eb725ee7b7a8942ff39e6b41591b8094f5dda0a7feab

      SHA512

      82e34292650519363199d23a49662434278d728ff7ba02c6e638d31fe19b1dd25c20a66b4a71747726f216ce7d6a73fd4c39e907fa03bb6c9388b813922eec88

    • memory/1352-47-0x000000001D0F0000-0x000000001D2B2000-memory.dmp

      Filesize

      1.8MB

    • memory/1352-43-0x0000000002CF0000-0x0000000002D02000-memory.dmp

      Filesize

      72KB

    • memory/1352-44-0x000000001B780000-0x000000001B7CE000-memory.dmp

      Filesize

      312KB

    • memory/1352-42-0x0000000000AF0000-0x0000000000BD8000-memory.dmp

      Filesize

      928KB

    • memory/1352-46-0x000000001B7E0000-0x000000001B7F8000-memory.dmp

      Filesize

      96KB

    • memory/1352-39-0x00007FFE417B3000-0x00007FFE417B5000-memory.dmp

      Filesize

      8KB

    • memory/1352-48-0x000000001B800000-0x000000001B810000-memory.dmp

      Filesize

      64KB

    • memory/1352-50-0x00007FFE417B3000-0x00007FFE417B5000-memory.dmp

      Filesize

      8KB

    • memory/3076-8-0x000000001C3F0000-0x000000001C48C000-memory.dmp

      Filesize

      624KB

    • memory/3076-25-0x000000001B700000-0x000000001B712000-memory.dmp

      Filesize

      72KB

    • memory/3076-23-0x000000001CAB0000-0x000000001CAC6000-memory.dmp

      Filesize

      88KB

    • memory/3076-41-0x00007FFE445C0000-0x00007FFE44F61000-memory.dmp

      Filesize

      9.6MB

    • memory/3076-0-0x00007FFE44875000-0x00007FFE44876000-memory.dmp

      Filesize

      4KB

    • memory/3076-7-0x00007FFE445C0000-0x00007FFE44F61000-memory.dmp

      Filesize

      9.6MB

    • memory/3076-6-0x000000001BE80000-0x000000001C34E000-memory.dmp

      Filesize

      4.8MB

    • memory/3076-5-0x000000001B9A0000-0x000000001B9AE000-memory.dmp

      Filesize

      56KB

    • memory/3076-2-0x000000001B7B0000-0x000000001B80C000-memory.dmp

      Filesize

      368KB

    • memory/3076-1-0x00007FFE445C0000-0x00007FFE44F61000-memory.dmp

      Filesize

      9.6MB

    • memory/4244-21-0x00007FFE445C0000-0x00007FFE44F61000-memory.dmp

      Filesize

      9.6MB

    • memory/4244-17-0x00007FFE445C0000-0x00007FFE44F61000-memory.dmp

      Filesize

      9.6MB