Analysis
-
max time kernel
149s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 08:15
Behavioral task
behavioral1
Sample
Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Rc7 - Cracked/Rc7.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Rc7 - Cracked/Rc7.dll
Resource
win10v2004-20240709-en
General
-
Target
Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe
-
Size
907KB
-
MD5
5668bd983341f9ffd4726d887090b64c
-
SHA1
1a150545d2fb65240101f9466b1043269b379f25
-
SHA256
afb1bf7f37ba0ff0ccd8fa29c7089abc4975fef56155ab9f3c1535fea70b1f0d
-
SHA512
0dcb2b2a1c2ee10c3b3727e3cfde698ec339569003bc3e18a6b76de65e7497080799d2e52fae234cb4e5ab518a296bf0d4f2f350f0571a1b39bc8b3e584c6ed1
-
SSDEEP
24576:nhv4MROxnFj3IrkxrrcI0AilFEvxHPyooT:nKMi1UqrrcI0AilFEvxHP
Malware Config
Extracted
orcus
wowthatsagoodmeme.ddns.net:10134
4be6c8113962424a916b8095b89af0c9
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\WlNDOWS DEFENDER\UPDATER.exe
-
reconnect_delay
10000
-
registry_keyname
Wlndows Defender
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\%appdata%/WlNDOWS DEFENDER/WlNDOWS DEFENDER UPDATER.exe
Signatures
-
Orcus main payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x002a000000018b03-10.dat family_orcus -
Orcurs Rat Executable 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2796-1-0x0000000000EC0000-0x0000000000FA8000-memory.dmp orcus behavioral1/files/0x002a000000018b03-10.dat orcus behavioral1/memory/2820-17-0x00000000009B0000-0x0000000000A98000-memory.dmp orcus -
Executes dropped EXE 1 IoCs
Processes:
UPDATER.exepid Process 2820 UPDATER.exe -
Loads dropped DLL 1 IoCs
Processes:
Rc7- Cracked by Roque Exploitzz.exepid Process 2796 Rc7- Cracked by Roque Exploitzz.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
UPDATER.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wlndows Defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\WlNDOWS DEFENDER\\UPDATER.exe\"" UPDATER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
UPDATER.exedescription pid Process Token: SeDebugPrivilege 2820 UPDATER.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
UPDATER.exepid Process 2820 UPDATER.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Rc7- Cracked by Roque Exploitzz.exedescription pid Process procid_target PID 2796 wrote to memory of 2820 2796 Rc7- Cracked by Roque Exploitzz.exe 29 PID 2796 wrote to memory of 2820 2796 Rc7- Cracked by Roque Exploitzz.exe 29 PID 2796 wrote to memory of 2820 2796 Rc7- Cracked by Roque Exploitzz.exe 29 PID 2796 wrote to memory of 2820 2796 Rc7- Cracked by Roque Exploitzz.exe 29 PID 2796 wrote to memory of 2820 2796 Rc7- Cracked by Roque Exploitzz.exe 29 PID 2796 wrote to memory of 2820 2796 Rc7- Cracked by Roque Exploitzz.exe 29 PID 2796 wrote to memory of 2820 2796 Rc7- Cracked by Roque Exploitzz.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rc7 - Cracked\Rc7- Cracked by Roque Exploitzz.exe"C:\Users\Admin\AppData\Local\Temp\Rc7 - Cracked\Rc7- Cracked by Roque Exploitzz.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Roaming\WlNDOWS DEFENDER\UPDATER.exe"C:\Users\Admin\AppData\Roaming\WlNDOWS DEFENDER\UPDATER.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
907KB
MD55668bd983341f9ffd4726d887090b64c
SHA11a150545d2fb65240101f9466b1043269b379f25
SHA256afb1bf7f37ba0ff0ccd8fa29c7089abc4975fef56155ab9f3c1535fea70b1f0d
SHA5120dcb2b2a1c2ee10c3b3727e3cfde698ec339569003bc3e18a6b76de65e7497080799d2e52fae234cb4e5ab518a296bf0d4f2f350f0571a1b39bc8b3e584c6ed1