Analysis
-
max time kernel
138s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 01:29
Behavioral task
behavioral1
Sample
fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984.exe
Resource
win7-20240221-en
General
-
Target
fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984.exe
-
Size
3.1MB
-
MD5
5f5733f2d10d4c7540cfad004a1a66a3
-
SHA1
2d937253d9ac339e5d636af50cd8429ccac39977
-
SHA256
fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984
-
SHA512
ee577e31ef7dd5d2a47891d86bfe45a88aba154c6b291b7008f1f8ff8d3dde943b056927dd337c6c74aa0e21f7d9868909f1841686d6306e9bbd14b83512c736
-
SSDEEP
98304:1VtODUKTslWp2MpbfGGilIJPypSbxEo9JCmV:UUKTtEgNilIJPypSbJCi
Malware Config
Extracted
orcus
192.168.0.100:10134
4c02bb39af5f434ea8ccdf8d1d4c4bc9
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\pdf\pdf
-
reconnect_delay
10000
-
registry_keyname
pdf
-
taskscheduler_taskname
pdf
-
watchdog_path
AppData\PDF
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002340f-13.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/memory/856-1-0x00000000008E0000-0x0000000000C06000-memory.dmp orcus behavioral2/files/0x000700000002340f-13.dat orcus -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\pdf\pdf fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984.exe File opened for modification C:\Program Files (x86)\pdf\pdf fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984.exe File created C:\Program Files (x86)\pdf\pdf.config fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5040 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984.exe"C:\Users\Admin\AppData\Local\Temp\fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984.exe"1⤵
- Drops file in Program Files directory
- Modifies registry class
PID:856
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55f5733f2d10d4c7540cfad004a1a66a3
SHA12d937253d9ac339e5d636af50cd8429ccac39977
SHA256fb84dd4ac25fc62b6eb922badaa84c53d71639c89903d155bc11304bea0df984
SHA512ee577e31ef7dd5d2a47891d86bfe45a88aba154c6b291b7008f1f8ff8d3dde943b056927dd337c6c74aa0e21f7d9868909f1841686d6306e9bbd14b83512c736