General
-
Target
87f7d55dbf9bd13dd5440ef0a51fec2e_JaffaCakes118
-
Size
2.3MB
-
Sample
240810-2mx1nasamp
-
MD5
87f7d55dbf9bd13dd5440ef0a51fec2e
-
SHA1
b57facd3bda38c5fca68a44898cc7930d727e48c
-
SHA256
098c48ea4fb2c2f4efefba74a6e4c3c4c0367ed8a257786fcf3cc9d9d08f8377
-
SHA512
b887e2b340a22a0a6607ef5396bb5d75ac68c6a7d06e0def3fbaa86fb59696c89399b6b83a870f7fb88f5804e055ce8f873d811d2b58ff6471e700c6bc3d1659
-
SSDEEP
49152:3AyKUOPuD8C+N+3M/i5cdRW2CVip0CfXl2LXV7eoW:bh8YNcdRW2KiRgF5W
Static task
static1
Behavioral task
behavioral1
Sample
87f7d55dbf9bd13dd5440ef0a51fec2e_JaffaCakes118.exe
Resource
win7-20240705-en
Malware Config
Extracted
orcus
37.46.150.253:1337
42a98ed1b2ce431689d696f918634edc
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Windows Defender\Windows Defender.exe
-
reconnect_delay
10000
-
registry_keyname
Windows Defender
-
taskscheduler_taskname
Windows Defender Service
-
watchdog_path
Temp\Windows Defender.exe
Targets
-
-
Target
87f7d55dbf9bd13dd5440ef0a51fec2e_JaffaCakes118
-
Size
2.3MB
-
MD5
87f7d55dbf9bd13dd5440ef0a51fec2e
-
SHA1
b57facd3bda38c5fca68a44898cc7930d727e48c
-
SHA256
098c48ea4fb2c2f4efefba74a6e4c3c4c0367ed8a257786fcf3cc9d9d08f8377
-
SHA512
b887e2b340a22a0a6607ef5396bb5d75ac68c6a7d06e0def3fbaa86fb59696c89399b6b83a870f7fb88f5804e055ce8f873d811d2b58ff6471e700c6bc3d1659
-
SSDEEP
49152:3AyKUOPuD8C+N+3M/i5cdRW2CVip0CfXl2LXV7eoW:bh8YNcdRW2KiRgF5W
-
Orcus main payload
-
Orcurs Rat Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1