Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 01:23 UTC

General

  • Target

    4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe

  • Size

    5.0MB

  • MD5

    f1ba7a7f631a21d3c5967dcabd56864f

  • SHA1

    098faa39a5eeeaad11b73ccf51b4bae6e9ab88bc

  • SHA256

    4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788

  • SHA512

    c764b7bc0646fdbe1ae3687a0f08dad7bc724e308c7cd7fb993f7933686cef8b4b9c2be1248061d36733ac3224e3e003edb59736a783bc2f6e59ddc51fbd2bb6

  • SSDEEP

    12288:s0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNC7JsLdn48F1IepdkRI7dG1lFlWQ:nIY4MROxnFtMrrcI0AilFEvxHP6Xoon

Malware Config

Extracted

Family

orcus

C2

192.168.0.150:5553

Mutex

9df0748f400a43fd822ce4ad25dd540c

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe
    "C:\Users\Admin\AppData\Local\Temp\4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Program Files (x86)\Orcus\Orcus.exe
      "C:\Program Files (x86)\Orcus\Orcus.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4224
  • C:\Program Files (x86)\Orcus\Orcus.exe
    "C:\Program Files (x86)\Orcus\Orcus.exe"
    1⤵
    • Executes dropped EXE
    PID:2820

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    2.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    2.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    26.165.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    26.165.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    14.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    260 B
    5
  • 192.168.0.150:5553
    Orcus.exe
    208 B
    4
  • 192.168.0.150:5553
    Orcus.exe
    104 B
    2
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    2.159.190.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    2.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    26.165.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    26.165.165.52.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    14.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    14.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Orcus\Orcus.exe

    Filesize

    5.0MB

    MD5

    f1ba7a7f631a21d3c5967dcabd56864f

    SHA1

    098faa39a5eeeaad11b73ccf51b4bae6e9ab88bc

    SHA256

    4346e01001903432c6da8a05fa653030081379a9d4c648b22cdd318b5b165788

    SHA512

    c764b7bc0646fdbe1ae3687a0f08dad7bc724e308c7cd7fb993f7933686cef8b4b9c2be1248061d36733ac3224e3e003edb59736a783bc2f6e59ddc51fbd2bb6

  • C:\Program Files (x86)\Orcus\Orcus.exe.config

    Filesize

    357B

    MD5

    a2b76cea3a59fa9af5ea21ff68139c98

    SHA1

    35d76475e6a54c168f536e30206578babff58274

    SHA256

    f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

    SHA512

    b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

  • C:\Users\Admin\AppData\Roaming\Orcus\err_9df0748f400a43fd822ce4ad25dd540c.dat

    Filesize

    1KB

    MD5

    1c3c2fb671b8b7d6d3c93b22090c4161

    SHA1

    f01d4f0851c122335905d735ad48fa289b577fce

    SHA256

    91c7a456012d9fc365ddc7488dc7a29b6a2befd828989f77378624faa18a92f5

    SHA512

    71582686f2c47da607b38af52aba1509fe72059dbc91fec3f84040e81e1367cd57fe2d99dff5a018c52b93883af52b0c1e1c86b3860a207f079e50828bffaa70

  • memory/2820-45-0x00000000746F0000-0x0000000074EA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2820-43-0x00000000746F0000-0x0000000074EA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2820-41-0x00000000746F0000-0x0000000074EA0000-memory.dmp

    Filesize

    7.7MB

  • memory/3360-14-0x00000000066A0000-0x00000000067AA000-memory.dmp

    Filesize

    1.0MB

  • memory/3360-13-0x0000000006520000-0x000000000656C000-memory.dmp

    Filesize

    304KB

  • memory/3360-8-0x0000000005890000-0x0000000005898000-memory.dmp

    Filesize

    32KB

  • memory/3360-9-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/3360-10-0x0000000006980000-0x0000000006F98000-memory.dmp

    Filesize

    6.1MB

  • memory/3360-11-0x0000000006380000-0x0000000006392000-memory.dmp

    Filesize

    72KB

  • memory/3360-12-0x00000000064E0000-0x000000000651C000-memory.dmp

    Filesize

    240KB

  • memory/3360-4-0x00000000056D0000-0x000000000572C000-memory.dmp

    Filesize

    368KB

  • memory/3360-0-0x00000000746FE000-0x00000000746FF000-memory.dmp

    Filesize

    4KB

  • memory/3360-6-0x00000000058A0000-0x0000000005932000-memory.dmp

    Filesize

    584KB

  • memory/3360-5-0x0000000005DB0000-0x0000000006354000-memory.dmp

    Filesize

    5.6MB

  • memory/3360-1-0x0000000000C60000-0x0000000000D4A000-memory.dmp

    Filesize

    936KB

  • memory/3360-31-0x00000000746F0000-0x0000000074EA0000-memory.dmp

    Filesize

    7.7MB

  • memory/3360-7-0x0000000005880000-0x0000000005892000-memory.dmp

    Filesize

    72KB

  • memory/3360-3-0x00000000746F0000-0x0000000074EA0000-memory.dmp

    Filesize

    7.7MB

  • memory/3360-2-0x0000000003000000-0x000000000300E000-memory.dmp

    Filesize

    56KB

  • memory/4224-32-0x00000000746F0000-0x0000000074EA0000-memory.dmp

    Filesize

    7.7MB

  • memory/4224-37-0x00000000073E0000-0x00000000073F8000-memory.dmp

    Filesize

    96KB

  • memory/4224-40-0x0000000007580000-0x0000000007590000-memory.dmp

    Filesize

    64KB

  • memory/4224-39-0x0000000007740000-0x0000000007902000-memory.dmp

    Filesize

    1.8MB

  • memory/4224-36-0x0000000006BF0000-0x0000000006C08000-memory.dmp

    Filesize

    96KB

  • memory/4224-42-0x00000000076E0000-0x00000000076EA000-memory.dmp

    Filesize

    40KB

  • memory/4224-35-0x0000000006BA0000-0x0000000006BEE000-memory.dmp

    Filesize

    312KB

  • memory/4224-30-0x00000000746F0000-0x0000000074EA0000-memory.dmp

    Filesize

    7.7MB

  • memory/4224-46-0x00000000746F0000-0x0000000074EA0000-memory.dmp

    Filesize

    7.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.