Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 01:22
Behavioral task
behavioral1
Sample
9a58bbf6b8ef43378ccee0480a038b632419ea279426da8e7f9fcc42610cdbba.exe
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
9a58bbf6b8ef43378ccee0480a038b632419ea279426da8e7f9fcc42610cdbba.exe
-
Size
903KB
-
MD5
8d53677144c021e946e43962da67769c
-
SHA1
5e208a249afc4d2176f5440b76dc02b7ffd18115
-
SHA256
9a58bbf6b8ef43378ccee0480a038b632419ea279426da8e7f9fcc42610cdbba
-
SHA512
4d3c77d8f9585c57f6907d6ca59c34289d8b74b3a50b6aca47d40714e3246f2153c5f3e380f50b184ab84c77951d0b9e468c15da1f78a6e03ee0f1e6d7063fcc
-
SSDEEP
24576:RW64MROxnFgOVrrcI0AilFEvxHPn1ooJ:RKMiy8rrcI0AilFEvxHP
Malware Config
Extracted
Family
orcus
C2
127.0.0.1:8080
Mutex
3e83cd0f67e54dff998e61ead50edf97
Attributes
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral1/memory/2712-1-0x00000000011C0000-0x00000000012A8000-memory.dmp orcus -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 9a58bbf6b8ef43378ccee0480a038b632419ea279426da8e7f9fcc42610cdbba.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2712 9a58bbf6b8ef43378ccee0480a038b632419ea279426da8e7f9fcc42610cdbba.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a58bbf6b8ef43378ccee0480a038b632419ea279426da8e7f9fcc42610cdbba.exe"C:\Users\Admin\AppData\Local\Temp\9a58bbf6b8ef43378ccee0480a038b632419ea279426da8e7f9fcc42610cdbba.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2712