Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 01:23
Behavioral task
behavioral1
Sample
4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe
Resource
win7-20240221-en
General
-
Target
4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe
-
Size
5.0MB
-
MD5
f1ba7a7f631a21d3c5967dcabd56864f
-
SHA1
098faa39a5eeeaad11b73ccf51b4bae6e9ab88bc
-
SHA256
4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788
-
SHA512
c764b7bc0646fdbe1ae3687a0f08dad7bc724e308c7cd7fb993f7933686cef8b4b9c2be1248061d36733ac3224e3e003edb59736a783bc2f6e59ddc51fbd2bb6
-
SSDEEP
12288:s0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNC7JsLdn48F1IepdkRI7dG1lFlWQ:nIY4MROxnFtMrrcI0AilFEvxHP6Xoon
Malware Config
Extracted
orcus
192.168.0.150:5553
9df0748f400a43fd822ce4ad25dd540c
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015364-11.dat family_orcus -
Orcurs Rat Executable 3 IoCs
resource yara_rule behavioral1/memory/2888-1-0x0000000000C10000-0x0000000000CFA000-memory.dmp orcus behavioral1/files/0x0008000000015364-11.dat orcus behavioral1/memory/2656-17-0x0000000000C30000-0x0000000000D1A000-memory.dmp orcus -
Executes dropped EXE 2 IoCs
pid Process 2656 Orcus.exe 2376 Orcus.exe -
Loads dropped DLL 1 IoCs
pid Process 2888 4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Orcus\Orcus.exe 4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe File opened for modification C:\Program Files (x86)\Orcus\Orcus.exe 4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe File created C:\Program Files (x86)\Orcus\Orcus.exe.config 4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 Orcus.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 Orcus.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2656 Orcus.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2656 Orcus.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2656 2888 4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe 29 PID 2888 wrote to memory of 2656 2888 4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe 29 PID 2888 wrote to memory of 2656 2888 4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe 29 PID 2888 wrote to memory of 2656 2888 4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe 29 PID 2684 wrote to memory of 2376 2684 taskeng.exe 31 PID 2684 wrote to memory of 2376 2684 taskeng.exe 31 PID 2684 wrote to memory of 2376 2684 taskeng.exe 31 PID 2684 wrote to memory of 2376 2684 taskeng.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe"C:\Users\Admin\AppData\Local\Temp\4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Orcus\Orcus.exe"C:\Program Files (x86)\Orcus\Orcus.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {4B51FA37-6A0C-4E18-86EA-15C81B2B0604} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Orcus\Orcus.exe"C:\Program Files (x86)\Orcus\Orcus.exe"2⤵
- Executes dropped EXE
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
1KB
MD52c39a653784315a2216c7585a8f55e17
SHA1c21167eda614be28685dc935e321631553f434cd
SHA256d4370a4b0dc198e4ceb2869bfad622b2e364018ba86ccc1bb2690e6e6e1f8558
SHA512f21b7efbaa7a294c1c672296fda24282f9fd320b9c8f8a07e6bc724e9abe4f8e01fa433536e44fa2313038c227605ba7167577217b75b63b796e6ff10489bc5a
-
Filesize
5.0MB
MD5f1ba7a7f631a21d3c5967dcabd56864f
SHA1098faa39a5eeeaad11b73ccf51b4bae6e9ab88bc
SHA2564346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788
SHA512c764b7bc0646fdbe1ae3687a0f08dad7bc724e308c7cd7fb993f7933686cef8b4b9c2be1248061d36733ac3224e3e003edb59736a783bc2f6e59ddc51fbd2bb6