Analysis

  • max time kernel
    720s
  • max time network
    724s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 16:57

General

  • Target

    java.exe

  • Size

    912KB

  • MD5

    ded3e760ff8be2ba3644390356a06ecc

  • SHA1

    bf35f9633107ec72a57157f24c4f080ed9203dd6

  • SHA256

    8fe37b9605617ca26443064f74eaaf156f43c7ef80deaecdc71eb5688f4cc255

  • SHA512

    11b7d51395a6dd952a231f093b79df87a1de7e62be6d9a8aadf73dc4dd20c8557b636bafd50672cdb06607bfcffe713685f51f218b7679e07177a42ff931bc62

  • SSDEEP

    12288:c0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCjRzUefAUQGYppMku77dG1lFlWu:gOK4MROxnFHVorrcI0AilFEvxHjWQg

Malware Config

Extracted

Family

orcus

C2

0.tcp.eu.ngrok.io:10019

Mutex

a6fa2ae42e784c859e6a44e0e55cd75b

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\java.exe
    "C:\Users\Admin\AppData\Local\Temp\java.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\{e9451254-c195-4a62-af51-b775a4e0a2f0}.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\system32\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1100
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo j "
        3⤵
          PID:2632
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\java.exe""
          3⤵
          • Deletes itself
          PID:2316
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo j "
          3⤵
            PID:2112
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" del C:\Users\Admin\AppData\Local\Temp\{e9451254-c195-4a62-af51-b775a4e0a2f0}.bat"
            3⤵
              PID:1588

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\CabC860.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\{e9451254-c195-4a62-af51-b775a4e0a2f0}.bat

          Filesize

          181B

          MD5

          746c1b8c2c71f34b63509e3032573465

          SHA1

          5c6c8fff28b2aee619ef53e049ddb72eb8cd614d

          SHA256

          1a9017eca85330f4ad906ab8b07524a8dd0f9fa10da5aaaebadd1f2e018608ab

          SHA512

          a4deda511ca21f1d4fb305780669a816c06b61ce89222ce5b095d009e9ee3a6d7e8762b5a43759514626b55d189d27fcf227baca4af6c6082c4d98501d6087ab

        • \Users\Admin\AppData\Roaming\Orcus\lib_a6fa2ae42e784c859e6a44e0e55cd75b\x64\turbojpeg.dll

          Filesize

          662KB

          MD5

          b36cc7f7c7148a783fbed3493bc27954

          SHA1

          44b39651949a00cf2a5cbba74c3210b980ae81b4

          SHA256

          c1ce9a872d33fb8757c59b5cd1f26c93b9eeec3e3cf57162c29a0783e6222a38

          SHA512

          c987c689ecc2cc57350c74ee22b66cb543535bc17b790016ec6407c3d02c539a727f5c38e1451a201e8e7ccfcb4d4639780b6e68cd38b7e67b1b28034ad738a2

        • memory/2776-38-0x000000001AC10000-0x000000001AC5A000-memory.dmp

          Filesize

          296KB

        • memory/2776-48-0x000000001AEC0000-0x000000001AEE6000-memory.dmp

          Filesize

          152KB

        • memory/2776-5-0x0000000000B10000-0x0000000000B22000-memory.dmp

          Filesize

          72KB

        • memory/2776-6-0x0000000000A20000-0x0000000000A28000-memory.dmp

          Filesize

          32KB

        • memory/2776-7-0x0000000000CB0000-0x0000000000CB8000-memory.dmp

          Filesize

          32KB

        • memory/2776-9-0x0000000000CE0000-0x0000000000CF8000-memory.dmp

          Filesize

          96KB

        • memory/2776-10-0x0000000000D00000-0x0000000000D10000-memory.dmp

          Filesize

          64KB

        • memory/2776-3-0x00000000009F0000-0x00000000009FE000-memory.dmp

          Filesize

          56KB

        • memory/2776-29-0x000007FEF59B3000-0x000007FEF59B4000-memory.dmp

          Filesize

          4KB

        • memory/2776-32-0x0000000001060000-0x00000000010A4000-memory.dmp

          Filesize

          272KB

        • memory/2776-33-0x000007FEF59B0000-0x000007FEF639C000-memory.dmp

          Filesize

          9.9MB

        • memory/2776-0-0x000007FEF59B3000-0x000007FEF59B4000-memory.dmp

          Filesize

          4KB

        • memory/2776-43-0x000000001AD60000-0x000000001ADBA000-memory.dmp

          Filesize

          360KB

        • memory/2776-4-0x000007FEF59B0000-0x000007FEF639C000-memory.dmp

          Filesize

          9.9MB

        • memory/2776-53-0x000000001C220000-0x000000001C374000-memory.dmp

          Filesize

          1.3MB

        • memory/2776-57-0x0000000000F40000-0x0000000000F4A000-memory.dmp

          Filesize

          40KB

        • memory/2776-56-0x0000000000F40000-0x0000000000F4A000-memory.dmp

          Filesize

          40KB

        • memory/2776-60-0x0000000000F50000-0x0000000000F5C000-memory.dmp

          Filesize

          48KB

        • memory/2776-65-0x00000000010B0000-0x00000000010C6000-memory.dmp

          Filesize

          88KB

        • memory/2776-71-0x000000001CD40000-0x000000001CE92000-memory.dmp

          Filesize

          1.3MB

        • memory/2776-72-0x0000000000F40000-0x0000000000F4A000-memory.dmp

          Filesize

          40KB

        • memory/2776-73-0x0000000000F40000-0x0000000000F4A000-memory.dmp

          Filesize

          40KB

        • memory/2776-2-0x0000000000AB0000-0x0000000000B0C000-memory.dmp

          Filesize

          368KB

        • memory/2776-80-0x000000001B670000-0x000000001B6BE000-memory.dmp

          Filesize

          312KB

        • memory/2776-1-0x00000000010D0000-0x00000000011BA000-memory.dmp

          Filesize

          936KB

        • memory/2776-92-0x0000000000F40000-0x0000000000F42000-memory.dmp

          Filesize

          8KB

        • memory/2776-91-0x000007FEF59B0000-0x000007FEF639C000-memory.dmp

          Filesize

          9.9MB