Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 19:29

General

  • Target

    scvhost.exe

  • Size

    3.4MB

  • MD5

    9ab1178a5c70cf83d7b40db848ff8ee0

  • SHA1

    43a888f1028252adf023110315807fb80c7113c1

  • SHA256

    0558fd9738cc4cb59130fa161c0ef401c189bf99958315fd2c6e218c10f26dcf

  • SHA512

    7a3fe0a7cc0839fbdf6693a09d752bb27757e2a38e0b8d86424c5e9850420c0300ac310d34dabbb8acbc559e469dcabbcb10084887c01b178412e766b14360a3

  • SSDEEP

    98304:6VOK0lWByzgx5x4z5ErcbFyDNesFQ561tozkMzXu7khZF:vluyzUQ5Er+H6GzkMQkhT

Malware Config

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 2 IoCs
  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\scvhost.exe
    "C:\Users\Admin\AppData\Local\Temp\scvhost.exe"
    1⤵
      PID:2528
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        2⤵
          PID:2588
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
          PID:2212
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /4
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:312
        • C:\Windows\system32\csrss.exe
          %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
          1⤵
          • Enumerates system info in registry
          • Suspicious use of WriteProcessMemory
          PID:2112
        • C:\Windows\system32\winlogon.exe
          winlogon.exe
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:2068
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1964

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/312-9-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/312-10-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2268-6-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2268-7-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2268-8-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2528-0-0x000007FEF5A33000-0x000007FEF5A34000-memory.dmp

          Filesize

          4KB

        • memory/2528-1-0x0000000000110000-0x0000000000118000-memory.dmp

          Filesize

          32KB

        • memory/2528-2-0x000000001ADE0000-0x000000001B1AC000-memory.dmp

          Filesize

          3.8MB

        • memory/2528-3-0x0000000000610000-0x000000000066C000-memory.dmp

          Filesize

          368KB

        • memory/2528-4-0x00000000001C0000-0x00000000001CE000-memory.dmp

          Filesize

          56KB

        • memory/2528-5-0x000007FEF5A30000-0x000007FEF641C000-memory.dmp

          Filesize

          9.9MB