Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 01:22

General

  • Target

    03bd0ad29d1b3efb2c876d5f4dbf800dd61df2e1b850c5f08c18cd14d39a97bb.exe

  • Size

    907KB

  • MD5

    2276a582ae9828473bd9d75de4bb5ee7

  • SHA1

    bda02bec26b3e29044dd0a26ad9abab9a46b4bd3

  • SHA256

    03bd0ad29d1b3efb2c876d5f4dbf800dd61df2e1b850c5f08c18cd14d39a97bb

  • SHA512

    802b88660e4c75b69bbdb71dcae39cb4eef9440e1631ff2112317e08bcea2535e69401535cbef6413ff3500e72c622be19792ac08f44bca7f10376adff98b726

  • SSDEEP

    24576:QNL34MROxnFpkptJSarrcI0AilFEvxHP1ooI:QWMiETSarrcI0AilFEvxHP

Malware Config

Extracted

Family

orcus

C2

indi.dynamic-dns.net:10131

Mutex

f0fe7471fd9d446590c2f17aa5f38be0

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03bd0ad29d1b3efb2c876d5f4dbf800dd61df2e1b850c5f08c18cd14d39a97bb.exe
    "C:\Users\Admin\AppData\Local\Temp\03bd0ad29d1b3efb2c876d5f4dbf800dd61df2e1b850c5f08c18cd14d39a97bb.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1640-0-0x000000007484E000-0x000000007484F000-memory.dmp

    Filesize

    4KB

  • memory/1640-1-0x00000000012D0000-0x00000000013B8000-memory.dmp

    Filesize

    928KB

  • memory/1640-2-0x00000000002B0000-0x00000000002BE000-memory.dmp

    Filesize

    56KB

  • memory/1640-3-0x00000000008B0000-0x000000000090C000-memory.dmp

    Filesize

    368KB

  • memory/1640-4-0x0000000074840000-0x0000000074F2E000-memory.dmp

    Filesize

    6.9MB

  • memory/1640-5-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1640-6-0x0000000000420000-0x0000000000428000-memory.dmp

    Filesize

    32KB

  • memory/1640-7-0x00000000006F0000-0x0000000000708000-memory.dmp

    Filesize

    96KB

  • memory/1640-8-0x0000000000B30000-0x0000000000B40000-memory.dmp

    Filesize

    64KB

  • memory/1640-9-0x0000000074840000-0x0000000074F2E000-memory.dmp

    Filesize

    6.9MB