Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 01:01

General

  • Target

    803776c8b23ad99dbd923575c31303896d5d00b431d712bef1594369ddd57c43.exe

  • Size

    3.0MB

  • MD5

    1c442246340be6c7f7d70150c5626ffd

  • SHA1

    f74d1e6721db9163a7746755633b2a11aa064448

  • SHA256

    803776c8b23ad99dbd923575c31303896d5d00b431d712bef1594369ddd57c43

  • SHA512

    cf081aa1c10b2614bf10d54eff218bbb09b52d76b30a900411df3490fbb0ffa3134c66826315e681a42bee52ba433924005efc4393a6423bfd433b01e80929aa

  • SSDEEP

    49152:V+LEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmvwsrZz:V+LtODUKTslWp2MpbfGGilIJPypSbxEl

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:10134

Mutex

0ece821d7cdc4863af5a95c1f4a79898

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    Temp\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\803776c8b23ad99dbd923575c31303896d5d00b431d712bef1594369ddd57c43.exe
    "C:\Users\Admin\AppData\Local\Temp\803776c8b23ad99dbd923575c31303896d5d00b431d712bef1594369ddd57c43.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uhyb9jer.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES55F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC54E.tmp"
        3⤵
          PID:2704
      • C:\Program Files\Orcus\Orcus.exe
        "C:\Program Files\Orcus\Orcus.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Users\Admin\AppData\Local\Temp\OrcusWatchdog.exe
          "C:\Users\Admin\AppData\Local\Temp\OrcusWatchdog.exe" /launchSelfAndExit "C:\Program Files\Orcus\Orcus.exe" 1740
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3000
          • C:\Users\Admin\AppData\Local\Temp\OrcusWatchdog.exe
            "C:\Users\Admin\AppData\Local\Temp\OrcusWatchdog.exe" /watchProcess "C:\Program Files\Orcus\Orcus.exe" 1740
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1892
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {2711A9DA-3452-4D4D-9585-9A09AFE5BCBD} S-1-5-21-2172136094-3310281978-782691160-1000:EXCFTDUU\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Program Files\Orcus\Orcus.exe
        "C:\Program Files\Orcus\Orcus.exe"
        2⤵
        • Executes dropped EXE
        PID:1696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Orcus\Orcus.exe

      Filesize

      3.0MB

      MD5

      1c442246340be6c7f7d70150c5626ffd

      SHA1

      f74d1e6721db9163a7746755633b2a11aa064448

      SHA256

      803776c8b23ad99dbd923575c31303896d5d00b431d712bef1594369ddd57c43

      SHA512

      cf081aa1c10b2614bf10d54eff218bbb09b52d76b30a900411df3490fbb0ffa3134c66826315e681a42bee52ba433924005efc4393a6423bfd433b01e80929aa

    • C:\Program Files\Orcus\Orcus.exe.config

      Filesize

      349B

      MD5

      89817519e9e0b4e703f07e8c55247861

      SHA1

      4636de1f6c997a25c3190f73f46a3fd056238d78

      SHA256

      f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13

      SHA512

      b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3

    • C:\Users\Admin\AppData\Local\Temp\OrcusWatchdog.exe

      Filesize

      9KB

      MD5

      7a195b6c9de2d5cab015f649da6931a1

      SHA1

      89f7372dd92a90a8e13b74ee512b464412e4cf9b

      SHA256

      30183935449a625c2a61f6342dc3b9907028194173f2e3d594eaa3126ee316bc

      SHA512

      3c2aeef85b51e7f955072fba042bcedf8dd0b66ad813def58c0134355665ba56a713d58005a322561c62be5777d0adea2803da214459f362f22fe2a0dba5a1c7

    • C:\Users\Admin\AppData\Local\Temp\RES55F.tmp

      Filesize

      1KB

      MD5

      7100f109f2c8f8d6599e07dd577f05e3

      SHA1

      78f00eba82db6826eedb5404d2659ac676306678

      SHA256

      de22a91546678e1d920e8241691633c9bf34cec454ea64653381b8da55590cca

      SHA512

      690a7c0de5ca2d838926049afff5ec018b6bc26ebe94e13d5e6ab02a7481dc6fc5fb100505ba15f99a8d61ae8d20d6cb5faa56ae3f1510ad9d7c1f24a3fb23d3

    • C:\Users\Admin\AppData\Local\Temp\uhyb9jer.dll

      Filesize

      76KB

      MD5

      4860e344308d20ed885b302c51131678

      SHA1

      b1964041035d49c7bc20247f980945f7f0ed4af1

      SHA256

      1c5585ece943a7d180fad66730e2a55cb9b18ae2bfecb19e656d0e1c56a3f8d2

      SHA512

      525fdd8103b1cd55a0ade1d1b0cd88430fbe8a1fec90534893f51024d13b6ee42ca3f9cf663cfcdb0472e6a112fd0973a43f76d889b032a6ffd8d211597011d3

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC54E.tmp

      Filesize

      676B

      MD5

      e31cf4117b5a3848b82efb433e3447a8

      SHA1

      ec0e011e46e609c7e7444e12912eb6ea8acd7b82

      SHA256

      18ee0be5345231820d5acb3c5533dd5b732196461316f8ef4bd4f8c1a0616bbd

      SHA512

      9368ce551a26becd4b6d04c31fd2f901a7723b3ac8e390c207ead78d23683c5771e773b92ee7de0c72728e8b515833df3f4b92a89742d6b46b26b190ab5cd07c

    • \??\c:\Users\Admin\AppData\Local\Temp\uhyb9jer.0.cs

      Filesize

      208KB

      MD5

      d9f26c56ba4d303302b58923e3f3b601

      SHA1

      145d52165ef6092193233b7e80013a6e8a848e53

      SHA256

      1abe714f9efc1de74cb7cfbbb98f90e74fca759f4e43ee79899120b95d3f3dee

      SHA512

      81cb00a99c695f2df192754c1c12374ec108688486d956089a60e249bf250b92bad1ed5f2a1155d7eaa9f15c1131778751b5d4e5707c3744c6a2bd5c6755379a

    • \??\c:\Users\Admin\AppData\Local\Temp\uhyb9jer.cmdline

      Filesize

      349B

      MD5

      d174d4f082ac9db548d90aeec8811469

      SHA1

      355028c72e59b3a5ef094a000e12bf82fdb39412

      SHA256

      51ada6b389e762bcd452be346e1f83907ce59f25e8ca82f324b83f330f79db55

      SHA512

      1800faff66866ea3d47c3d4c0c0e6b1d42347ddf378cb619dacf438b11b4b92efb936fa5106dfcfd59a20ced970b626320ca32c58a060c979216102b32ca45fd

    • memory/1632-73-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-46-0x000000001B150000-0x000000001B16C000-memory.dmp

      Filesize

      112KB

    • memory/1632-0-0x000007FEF5F5E000-0x000007FEF5F5F000-memory.dmp

      Filesize

      4KB

    • memory/1632-4-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

      Filesize

      9.6MB

    • memory/1632-21-0x0000000000D80000-0x0000000000D92000-memory.dmp

      Filesize

      72KB

    • memory/1632-22-0x0000000000D90000-0x0000000000D98000-memory.dmp

      Filesize

      32KB

    • memory/1632-23-0x000000001B0E0000-0x000000001B0E8000-memory.dmp

      Filesize

      32KB

    • memory/1632-28-0x000000001B560000-0x000000001B5B6000-memory.dmp

      Filesize

      344KB

    • memory/1632-36-0x000000001C7F0000-0x000000001CAEE000-memory.dmp

      Filesize

      3.0MB

    • memory/1632-38-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/1632-39-0x000000001B180000-0x000000001B1A6000-memory.dmp

      Filesize

      152KB

    • memory/1632-40-0x000000001B150000-0x000000001B168000-memory.dmp

      Filesize

      96KB

    • memory/1632-41-0x000000001B150000-0x000000001B18B000-memory.dmp

      Filesize

      236KB

    • memory/1632-42-0x000000001B150000-0x000000001B166000-memory.dmp

      Filesize

      88KB

    • memory/1632-43-0x000000001B180000-0x000000001B1AA000-memory.dmp

      Filesize

      168KB

    • memory/1632-44-0x0000000000C40000-0x0000000000C48000-memory.dmp

      Filesize

      32KB

    • memory/1632-45-0x000000001B180000-0x000000001B1A6000-memory.dmp

      Filesize

      152KB

    • memory/1632-76-0x000000001B150000-0x000000001B168000-memory.dmp

      Filesize

      96KB

    • memory/1632-47-0x000000001C4F0000-0x000000001C5FA000-memory.dmp

      Filesize

      1.0MB

    • memory/1632-48-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-49-0x000000001B150000-0x000000001B170000-memory.dmp

      Filesize

      128KB

    • memory/1632-50-0x000000001B180000-0x000000001B1A6000-memory.dmp

      Filesize

      152KB

    • memory/1632-51-0x000000001B150000-0x000000001B16C000-memory.dmp

      Filesize

      112KB

    • memory/1632-52-0x000000001B150000-0x000000001B18B000-memory.dmp

      Filesize

      236KB

    • memory/1632-53-0x000000001B150000-0x000000001B162000-memory.dmp

      Filesize

      72KB

    • memory/1632-54-0x000000001B150000-0x000000001B16C000-memory.dmp

      Filesize

      112KB

    • memory/1632-55-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/1632-75-0x000000001B150000-0x000000001B168000-memory.dmp

      Filesize

      96KB

    • memory/1632-57-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/1632-58-0x000000001B150000-0x000000001B16E000-memory.dmp

      Filesize

      120KB

    • memory/1632-59-0x000000001B150000-0x000000001B16E000-memory.dmp

      Filesize

      120KB

    • memory/1632-77-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-61-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/1632-62-0x0000000000C40000-0x0000000000C4E000-memory.dmp

      Filesize

      56KB

    • memory/1632-63-0x000000001B150000-0x000000001B164000-memory.dmp

      Filesize

      80KB

    • memory/1632-64-0x0000000000C40000-0x0000000000C50000-memory.dmp

      Filesize

      64KB

    • memory/1632-65-0x0000000000AB0000-0x0000000000ABC000-memory.dmp

      Filesize

      48KB

    • memory/1632-66-0x000000001C0C0000-0x000000001C195000-memory.dmp

      Filesize

      852KB

    • memory/1632-67-0x000000001B180000-0x000000001B1A8000-memory.dmp

      Filesize

      160KB

    • memory/1632-68-0x000000001B150000-0x000000001B170000-memory.dmp

      Filesize

      128KB

    • memory/1632-69-0x000000001B180000-0x000000001B1A6000-memory.dmp

      Filesize

      152KB

    • memory/1632-70-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/1632-72-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-71-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-3-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

      Filesize

      9.6MB

    • memory/1632-74-0x000000001B150000-0x000000001B164000-memory.dmp

      Filesize

      80KB

    • memory/1632-56-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-19-0x000000001B0B0000-0x000000001B0C6000-memory.dmp

      Filesize

      88KB

    • memory/1632-60-0x0000000000C40000-0x0000000000C48000-memory.dmp

      Filesize

      32KB

    • memory/1632-78-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-79-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-80-0x0000000000C40000-0x0000000000C50000-memory.dmp

      Filesize

      64KB

    • memory/1632-81-0x0000000000C40000-0x0000000000C4E000-memory.dmp

      Filesize

      56KB

    • memory/1632-82-0x000000001B180000-0x000000001B1A2000-memory.dmp

      Filesize

      136KB

    • memory/1632-83-0x000000001B150000-0x000000001B16C000-memory.dmp

      Filesize

      112KB

    • memory/1632-84-0x000000001B180000-0x000000001B1AC000-memory.dmp

      Filesize

      176KB

    • memory/1632-85-0x000000001B150000-0x000000001B164000-memory.dmp

      Filesize

      80KB

    • memory/1632-86-0x0000000000C40000-0x0000000000C48000-memory.dmp

      Filesize

      32KB

    • memory/1632-87-0x000000001B150000-0x000000001B16A000-memory.dmp

      Filesize

      104KB

    • memory/1632-88-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-89-0x0000000000C40000-0x0000000000C4E000-memory.dmp

      Filesize

      56KB

    • memory/1632-90-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/1632-91-0x000000001B190000-0x000000001B1D0000-memory.dmp

      Filesize

      256KB

    • memory/1632-92-0x000000001B150000-0x000000001B162000-memory.dmp

      Filesize

      72KB

    • memory/1632-93-0x0000000000C40000-0x0000000000C4E000-memory.dmp

      Filesize

      56KB

    • memory/1632-94-0x000000001B180000-0x000000001B1A4000-memory.dmp

      Filesize

      144KB

    • memory/1632-95-0x000000001B180000-0x000000001B1A8000-memory.dmp

      Filesize

      160KB

    • memory/1632-96-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/1632-97-0x0000000000C40000-0x0000000000C48000-memory.dmp

      Filesize

      32KB

    • memory/1632-98-0x000000001B150000-0x000000001B16C000-memory.dmp

      Filesize

      112KB

    • memory/1632-99-0x000000001B150000-0x000000001B16C000-memory.dmp

      Filesize

      112KB

    • memory/1632-100-0x0000000000C40000-0x0000000000C48000-memory.dmp

      Filesize

      32KB

    • memory/1632-101-0x0000000000C40000-0x0000000000C48000-memory.dmp

      Filesize

      32KB

    • memory/1632-102-0x0000000000C40000-0x0000000000C48000-memory.dmp

      Filesize

      32KB

    • memory/1632-103-0x0000000000C40000-0x0000000000C4E000-memory.dmp

      Filesize

      56KB

    • memory/1632-104-0x000000001B150000-0x000000001B162000-memory.dmp

      Filesize

      72KB

    • memory/1632-105-0x0000000000C40000-0x0000000000C4E000-memory.dmp

      Filesize

      56KB

    • memory/1632-106-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/1632-107-0x000000001B180000-0x000000001B1AA000-memory.dmp

      Filesize

      168KB

    • memory/1632-108-0x000000001C0C0000-0x000000001C195000-memory.dmp

      Filesize

      852KB

    • memory/1632-109-0x000000001B180000-0x000000001B1A8000-memory.dmp

      Filesize

      160KB

    • memory/1632-111-0x000000001B180000-0x000000001B1A6000-memory.dmp

      Filesize

      152KB

    • memory/1632-110-0x000000001B150000-0x000000001B16E000-memory.dmp

      Filesize

      120KB

    • memory/1632-112-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-113-0x0000000000C40000-0x0000000000C4A000-memory.dmp

      Filesize

      40KB

    • memory/1632-114-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-115-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-116-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-117-0x000000001B150000-0x000000001B164000-memory.dmp

      Filesize

      80KB

    • memory/1632-118-0x000000001B150000-0x000000001B168000-memory.dmp

      Filesize

      96KB

    • memory/1632-119-0x000000001B150000-0x000000001B166000-memory.dmp

      Filesize

      88KB

    • memory/1632-120-0x0000000000C40000-0x0000000000C4C000-memory.dmp

      Filesize

      48KB

    • memory/1632-1-0x0000000000C50000-0x0000000000CAC000-memory.dmp

      Filesize

      368KB

    • memory/1632-2-0x0000000000A80000-0x0000000000A8E000-memory.dmp

      Filesize

      56KB

    • memory/2020-13-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

      Filesize

      9.6MB

    • memory/2020-17-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

      Filesize

      9.6MB