Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 08:15
Behavioral task
behavioral1
Sample
Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Rc7 - Cracked/Rc7.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Rc7 - Cracked/Rc7.dll
Resource
win10v2004-20240709-en
General
-
Target
Rc7 - Cracked/Rc7- Cracked by Roque Exploitzz.exe
-
Size
907KB
-
MD5
5668bd983341f9ffd4726d887090b64c
-
SHA1
1a150545d2fb65240101f9466b1043269b379f25
-
SHA256
afb1bf7f37ba0ff0ccd8fa29c7089abc4975fef56155ab9f3c1535fea70b1f0d
-
SHA512
0dcb2b2a1c2ee10c3b3727e3cfde698ec339569003bc3e18a6b76de65e7497080799d2e52fae234cb4e5ab518a296bf0d4f2f350f0571a1b39bc8b3e584c6ed1
-
SSDEEP
24576:nhv4MROxnFj3IrkxrrcI0AilFEvxHPyooT:nKMi1UqrrcI0AilFEvxHP
Malware Config
Extracted
orcus
wowthatsagoodmeme.ddns.net:10134
4be6c8113962424a916b8095b89af0c9
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\WlNDOWS DEFENDER\UPDATER.exe
-
reconnect_delay
10000
-
registry_keyname
Wlndows Defender
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\%appdata%/WlNDOWS DEFENDER/WlNDOWS DEFENDER UPDATER.exe
Signatures
-
Orcus main payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x00070000000234fb-13.dat family_orcus -
Orcurs Rat Executable 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4188-1-0x0000000000C10000-0x0000000000CF8000-memory.dmp orcus behavioral2/files/0x00070000000234fb-13.dat orcus -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Rc7- Cracked by Roque Exploitzz.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation Rc7- Cracked by Roque Exploitzz.exe -
Executes dropped EXE 1 IoCs
Processes:
UPDATER.exepid Process 5048 UPDATER.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
UPDATER.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wlndows Defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\WlNDOWS DEFENDER\\UPDATER.exe\"" UPDATER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
UPDATER.exedescription pid Process Token: SeDebugPrivilege 5048 UPDATER.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
UPDATER.exepid Process 5048 UPDATER.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Rc7- Cracked by Roque Exploitzz.exedescription pid Process procid_target PID 4188 wrote to memory of 5048 4188 Rc7- Cracked by Roque Exploitzz.exe 88 PID 4188 wrote to memory of 5048 4188 Rc7- Cracked by Roque Exploitzz.exe 88 PID 4188 wrote to memory of 5048 4188 Rc7- Cracked by Roque Exploitzz.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rc7 - Cracked\Rc7- Cracked by Roque Exploitzz.exe"C:\Users\Admin\AppData\Local\Temp\Rc7 - Cracked\Rc7- Cracked by Roque Exploitzz.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Roaming\WlNDOWS DEFENDER\UPDATER.exe"C:\Users\Admin\AppData\Roaming\WlNDOWS DEFENDER\UPDATER.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD55668bd983341f9ffd4726d887090b64c
SHA11a150545d2fb65240101f9466b1043269b379f25
SHA256afb1bf7f37ba0ff0ccd8fa29c7089abc4975fef56155ab9f3c1535fea70b1f0d
SHA5120dcb2b2a1c2ee10c3b3727e3cfde698ec339569003bc3e18a6b76de65e7497080799d2e52fae234cb4e5ab518a296bf0d4f2f350f0571a1b39bc8b3e584c6ed1
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad