Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 02:15
Behavioral task
behavioral1
Sample
a1aceb472152e5f8a0da2389a13f2db959788d8790c97363dbf742ef966c5b25.exe
Resource
win7-20240708-en
General
-
Target
a1aceb472152e5f8a0da2389a13f2db959788d8790c97363dbf742ef966c5b25.exe
-
Size
910KB
-
MD5
8e3f383b02d4c62b543d5b7c56d4db79
-
SHA1
53888e44275358a395630841a244d16226beb1dc
-
SHA256
a1aceb472152e5f8a0da2389a13f2db959788d8790c97363dbf742ef966c5b25
-
SHA512
c113e49c3221fb517d66d827a1f822e4133625535b9e950c08b7cc4adedbcd42297143d511fd8fd69adcd3818c24a631acc01afe9ed0206cc43b87fc5a1406c0
-
SSDEEP
12288:/0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCg+34ai5V2Xopqi1n07dG1lFlWe:L2C4MROxnFRC8rrcI0AilFEvxHjoQJ
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3388-1-0x0000000000C40000-0x0000000000D2A000-memory.dmp orcus -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a1aceb472152e5f8a0da2389a13f2db959788d8790c97363dbf742ef966c5b25.exedescription pid Process Token: SeDebugPrivilege 3388 a1aceb472152e5f8a0da2389a13f2db959788d8790c97363dbf742ef966c5b25.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a1aceb472152e5f8a0da2389a13f2db959788d8790c97363dbf742ef966c5b25.exepid Process 3388 a1aceb472152e5f8a0da2389a13f2db959788d8790c97363dbf742ef966c5b25.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1aceb472152e5f8a0da2389a13f2db959788d8790c97363dbf742ef966c5b25.exe"C:\Users\Admin\AppData\Local\Temp\a1aceb472152e5f8a0da2389a13f2db959788d8790c97363dbf742ef966c5b25.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3388