Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 01:08
Behavioral task
behavioral1
Sample
a57055364481676e2cf162f4f91be228458c7e03eed0f54d1e5f18a8907a3b62.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
a57055364481676e2cf162f4f91be228458c7e03eed0f54d1e5f18a8907a3b62.exe
-
Size
903KB
-
MD5
5d29b913273c7abfc589ee8c620f12f6
-
SHA1
36369b0f2ccc7b50720ed21d607166fac13d6e3a
-
SHA256
a57055364481676e2cf162f4f91be228458c7e03eed0f54d1e5f18a8907a3b62
-
SHA512
be0862868f343f394d7597a365aed628a8e71eb4d419196b5a08e5af2065f39b8b0449e56961b2c59fa66d7c497ab2b5f9afab75f1a0a7c275304ab1912183a1
-
SSDEEP
12288:b0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCZ3uljipeyKWepvBgw7dG1lFlWz:EW64MROxnFgHrrcI0AilFEvxHPX9ood
Malware Config
Extracted
Family
orcus
C2
91.109.186.2:1194
Mutex
60d5f56e0ff9486480153dc7e98d1c84
Attributes
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral1/memory/1152-1-0x00000000013E0000-0x00000000014C8000-memory.dmp orcus -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 a57055364481676e2cf162f4f91be228458c7e03eed0f54d1e5f18a8907a3b62.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1152 a57055364481676e2cf162f4f91be228458c7e03eed0f54d1e5f18a8907a3b62.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2872 2480 taskeng.exe 29 PID 2480 wrote to memory of 2872 2480 taskeng.exe 29 PID 2480 wrote to memory of 2872 2480 taskeng.exe 29 PID 2480 wrote to memory of 2872 2480 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a57055364481676e2cf162f4f91be228458c7e03eed0f54d1e5f18a8907a3b62.exe"C:\Users\Admin\AppData\Local\Temp\a57055364481676e2cf162f4f91be228458c7e03eed0f54d1e5f18a8907a3b62.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1152
-
C:\Windows\system32\taskeng.exetaskeng.exe {C433745F-1E4C-4363-877D-322178FA64B1} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\a57055364481676e2cf162f4f91be228458c7e03eed0f54d1e5f18a8907a3b62.exeC:\Users\Admin\AppData\Local\Temp\a57055364481676e2cf162f4f91be228458c7e03eed0f54d1e5f18a8907a3b62.exe2⤵PID:2872
-