Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2024 01:26

General

  • Target

    e64d0cbae39e367614ab4a884ec180a7e7a4ed0e15f349e0b10e8aacdcd1f585.exe

  • Size

    907KB

  • MD5

    9a063fd87d0f757afb0e28353c1f744c

  • SHA1

    0d548e1796690e40424bd23bb3209d24d5aa319e

  • SHA256

    e64d0cbae39e367614ab4a884ec180a7e7a4ed0e15f349e0b10e8aacdcd1f585

  • SHA512

    2cf63d2c70c37becf18a8dfb8d6ae200f466804afde62a605b100359baf5380406dc1ce2cc8d7b0147b537c621e77898c74b3d87fee61bb5227c5bec21d02961

  • SSDEEP

    12288:G0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCOcpCwFu/7u2pExO9u7dG1lFlWQ:GcS4MROxnFRcrrcI0AilFEvxHjR9Q9

Malware Config

Extracted

Family

orcus

C2

192.168.21.1:10135

Mutex

48eb17a7509146f391ca61541dfb68f7

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e64d0cbae39e367614ab4a884ec180a7e7a4ed0e15f349e0b10e8aacdcd1f585.exe
    "C:\Users\Admin\AppData\Local\Temp\e64d0cbae39e367614ab4a884ec180a7e7a4ed0e15f349e0b10e8aacdcd1f585.exe"
    1⤵
      PID:2820

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2820-0-0x000007FEF5C93000-0x000007FEF5C94000-memory.dmp

      Filesize

      4KB

    • memory/2820-1-0x0000000001000000-0x00000000010E8000-memory.dmp

      Filesize

      928KB

    • memory/2820-2-0x0000000000460000-0x00000000004BC000-memory.dmp

      Filesize

      368KB

    • memory/2820-3-0x00000000003B0000-0x00000000003BE000-memory.dmp

      Filesize

      56KB

    • memory/2820-4-0x000007FEF5C90000-0x000007FEF667C000-memory.dmp

      Filesize

      9.9MB

    • memory/2820-5-0x00000000004E0000-0x00000000004F2000-memory.dmp

      Filesize

      72KB

    • memory/2820-6-0x000007FEF5C90000-0x000007FEF667C000-memory.dmp

      Filesize

      9.9MB

    • memory/2820-7-0x000007FEF5C93000-0x000007FEF5C94000-memory.dmp

      Filesize

      4KB

    • memory/2820-8-0x000007FEF5C90000-0x000007FEF667C000-memory.dmp

      Filesize

      9.9MB