Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 01:10
Behavioral task
behavioral1
Sample
6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe
Resource
win7-20240508-en
General
-
Target
6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe
-
Size
1.2MB
-
MD5
484ccd343ab6a5c338b67264a6fdb5d3
-
SHA1
1bd30cc22cbd8813e5218548b0cb301e170bbc83
-
SHA256
6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4
-
SHA512
a93d07c673734b069e3d507377534eea6c33e29239045be62e16c7fb6d518d02c11150e45420a2d3b0e16d6b1f99f5d631c3782b624c2073c5b42a11cb2bb95f
-
SSDEEP
24576:rGK4MROxnFE32O3KrrcI0AilFEvxHPyoos/:rKMiujKrrcI0AilFEvxHP
Malware Config
Extracted
orcus
127.0.0.1:666
7d31cc59ebdf4dc49809adc208f79149
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\ChromiumUpdated\Updater.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
svchost
-
watchdog_path
AppData\sihost.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023420-48.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/memory/3380-1-0x0000000000BB0000-0x0000000000CE0000-memory.dmp orcus behavioral2/files/0x0007000000023420-48.dat orcus -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Updater.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation sihost.exe -
Executes dropped EXE 6 IoCs
pid Process 4612 WindowsInput.exe 4192 WindowsInput.exe 4372 Updater.exe 3168 Updater.exe 956 sihost.exe 2076 sihost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\ChromiumUpdated\Updater.exe 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe File opened for modification C:\Program Files (x86)\ChromiumUpdated\Updater.exe 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe File created C:\Program Files (x86)\ChromiumUpdated\Updater.exe.config 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4372 Updater.exe 4372 Updater.exe 4372 Updater.exe 2076 sihost.exe 2076 sihost.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe 4372 Updater.exe 2076 sihost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4372 Updater.exe Token: SeDebugPrivilege 956 sihost.exe Token: SeDebugPrivilege 2076 sihost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4372 Updater.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4372 Updater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4372 Updater.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4612 3380 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe 87 PID 3380 wrote to memory of 4612 3380 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe 87 PID 3380 wrote to memory of 4372 3380 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe 91 PID 3380 wrote to memory of 4372 3380 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe 91 PID 3380 wrote to memory of 4372 3380 6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe 91 PID 4372 wrote to memory of 956 4372 Updater.exe 94 PID 4372 wrote to memory of 956 4372 Updater.exe 94 PID 4372 wrote to memory of 956 4372 Updater.exe 94 PID 956 wrote to memory of 2076 956 sihost.exe 95 PID 956 wrote to memory of 2076 956 sihost.exe 95 PID 956 wrote to memory of 2076 956 sihost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe"C:\Users\Admin\AppData\Local\Temp\6940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4612
-
-
C:\Program Files (x86)\ChromiumUpdated\Updater.exe"C:\Program Files (x86)\ChromiumUpdated\Updater.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Roaming\sihost.exe"C:\Users\Admin\AppData\Roaming\sihost.exe" /launchSelfAndExit "C:\Program Files (x86)\ChromiumUpdated\Updater.exe" 4372 /protectFile3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Roaming\sihost.exe"C:\Users\Admin\AppData\Roaming\sihost.exe" /watchProcess "C:\Program Files (x86)\ChromiumUpdated\Updater.exe" 4372 "/protectFile"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:4192
-
C:\Program Files (x86)\ChromiumUpdated\Updater.exe"C:\Program Files (x86)\ChromiumUpdated\Updater.exe"1⤵
- Executes dropped EXE
PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5484ccd343ab6a5c338b67264a6fdb5d3
SHA11bd30cc22cbd8813e5218548b0cb301e170bbc83
SHA2566940a399198631c39646edd49630f466839e6ec5040ac86cbace99014e50dfa4
SHA512a93d07c673734b069e3d507377534eea6c33e29239045be62e16c7fb6d518d02c11150e45420a2d3b0e16d6b1f99f5d631c3782b624c2073c5b42a11cb2bb95f
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
1KB
MD53c00e6e0e8fb824cdd859941806d8958
SHA1fb4f4ff882604ce9885f9fddf4cfcb488ad965b6
SHA2564aa2bd57c848628bc42341a6dec8cad6a4a79273e1a94ee259a1779ae3623776
SHA51285f1f346f2a506d56986b129c3ee805e1afb73410235837610803354d22a9b8c3fa9f9b8ddb8dd469214c2be54f1b5915795a28ab5b178b1b1a2fa7fb5f5070e
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad