Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 01:27
Behavioral task
behavioral1
Sample
a9aa350b786356d7d78279e338ccc590N.exe
Resource
win7-20240903-en
General
-
Target
a9aa350b786356d7d78279e338ccc590N.exe
-
Size
7.6MB
-
MD5
a9aa350b786356d7d78279e338ccc590
-
SHA1
248541c0cac6a66ba81dd8573470a15fd6107ddd
-
SHA256
1a740ea5fc256aeac6c2df54d489e502cd2b752c20c09495ff879705f4bf5a0c
-
SHA512
c7c4f3412ec0e027f5230b9912a1c2885c075cfc3cd5836ee21be44a93bf81df9afad7dda12274a29e5607f50a1ddb3290462170098dd53b731a4582d8890ef1
-
SSDEEP
196608:0N/rsm+cw4nWA4e9p9KGOXvFzYJncZfN/rsm+cw9nWA4e9p9KGOXvFzYJncZwh:0N/rsr4nC0PodYJncpN/rsr9nC0PodYt
Malware Config
Extracted
orcus
127.0.0.1:10134
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023473-11.dat family_orcus -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a9aa350b786356d7d78279e338ccc590N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Synaptics.exe -
Orcurs Rat Executable 11 IoCs
resource yara_rule behavioral2/memory/4968-4-0x0000000000780000-0x0000000001411000-memory.dmp orcus behavioral2/memory/4968-5-0x0000000000780000-0x0000000001411000-memory.dmp orcus behavioral2/files/0x0009000000023473-11.dat orcus behavioral2/memory/3412-136-0x0000000000610000-0x00000000006F8000-memory.dmp orcus behavioral2/memory/4968-138-0x0000000000780000-0x0000000001411000-memory.dmp orcus behavioral2/memory/1512-145-0x0000000000920000-0x00000000015B1000-memory.dmp orcus behavioral2/memory/1512-146-0x0000000000920000-0x00000000015B1000-memory.dmp orcus behavioral2/memory/1512-286-0x0000000000920000-0x00000000015B1000-memory.dmp orcus behavioral2/memory/1512-285-0x0000000000920000-0x00000000015B1000-memory.dmp orcus behavioral2/memory/1512-290-0x0000000000920000-0x00000000015B1000-memory.dmp orcus behavioral2/memory/1512-314-0x0000000000920000-0x00000000015B1000-memory.dmp orcus -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a9aa350b786356d7d78279e338ccc590N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a9aa350b786356d7d78279e338ccc590N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Synaptics.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation a9aa350b786356d7d78279e338ccc590N.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ._cache_a9aa350b786356d7d78279e338ccc590N.exe -
Executes dropped EXE 4 IoCs
pid Process 3412 ._cache_a9aa350b786356d7d78279e338ccc590N.exe 1512 Synaptics.exe 1520 Orcus.exe 692 ._cache_Synaptics.exe -
resource yara_rule behavioral2/memory/4968-0-0x0000000000780000-0x0000000001411000-memory.dmp themida behavioral2/memory/4968-2-0x0000000000780000-0x0000000001411000-memory.dmp themida behavioral2/memory/4968-3-0x0000000000780000-0x0000000001411000-memory.dmp themida behavioral2/memory/4968-4-0x0000000000780000-0x0000000001411000-memory.dmp themida behavioral2/memory/4968-5-0x0000000000780000-0x0000000001411000-memory.dmp themida behavioral2/files/0x000a00000002342e-72.dat themida behavioral2/memory/1512-141-0x0000000000920000-0x00000000015B1000-memory.dmp themida behavioral2/memory/1512-140-0x0000000000920000-0x00000000015B1000-memory.dmp themida behavioral2/memory/1512-139-0x0000000000920000-0x00000000015B1000-memory.dmp themida behavioral2/memory/4968-138-0x0000000000780000-0x0000000001411000-memory.dmp themida behavioral2/memory/1512-145-0x0000000000920000-0x00000000015B1000-memory.dmp themida behavioral2/memory/1512-146-0x0000000000920000-0x00000000015B1000-memory.dmp themida behavioral2/memory/1512-286-0x0000000000920000-0x00000000015B1000-memory.dmp themida behavioral2/memory/1512-285-0x0000000000920000-0x00000000015B1000-memory.dmp themida behavioral2/memory/1512-290-0x0000000000920000-0x00000000015B1000-memory.dmp themida behavioral2/memory/1512-314-0x0000000000920000-0x00000000015B1000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a9aa350b786356d7d78279e338ccc590N.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a9aa350b786356d7d78279e338ccc590N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Synaptics.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4968 a9aa350b786356d7d78279e338ccc590N.exe 1512 Synaptics.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Orcus\Orcus.exe ._cache_a9aa350b786356d7d78279e338ccc590N.exe File opened for modification C:\Program Files (x86)\Orcus\Orcus.exe ._cache_a9aa350b786356d7d78279e338ccc590N.exe File created C:\Program Files (x86)\Orcus\Orcus.exe.config ._cache_a9aa350b786356d7d78279e338ccc590N.exe File opened for modification C:\Program Files (x86)\Orcus\Orcus.exe ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9aa350b786356d7d78279e338ccc590N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_a9aa350b786356d7d78279e338ccc590N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Orcus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a9aa350b786356d7d78279e338ccc590N.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4664 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1520 Orcus.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 Orcus.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1520 Orcus.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4664 EXCEL.EXE 4664 EXCEL.EXE 4664 EXCEL.EXE 4664 EXCEL.EXE 1520 Orcus.exe 4664 EXCEL.EXE 4664 EXCEL.EXE 4664 EXCEL.EXE 4664 EXCEL.EXE 4664 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4968 wrote to memory of 3412 4968 a9aa350b786356d7d78279e338ccc590N.exe 86 PID 4968 wrote to memory of 3412 4968 a9aa350b786356d7d78279e338ccc590N.exe 86 PID 4968 wrote to memory of 3412 4968 a9aa350b786356d7d78279e338ccc590N.exe 86 PID 4968 wrote to memory of 1512 4968 a9aa350b786356d7d78279e338ccc590N.exe 87 PID 4968 wrote to memory of 1512 4968 a9aa350b786356d7d78279e338ccc590N.exe 87 PID 4968 wrote to memory of 1512 4968 a9aa350b786356d7d78279e338ccc590N.exe 87 PID 3412 wrote to memory of 1520 3412 ._cache_a9aa350b786356d7d78279e338ccc590N.exe 88 PID 3412 wrote to memory of 1520 3412 ._cache_a9aa350b786356d7d78279e338ccc590N.exe 88 PID 3412 wrote to memory of 1520 3412 ._cache_a9aa350b786356d7d78279e338ccc590N.exe 88 PID 1512 wrote to memory of 692 1512 Synaptics.exe 89 PID 1512 wrote to memory of 692 1512 Synaptics.exe 89 PID 1512 wrote to memory of 692 1512 Synaptics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9aa350b786356d7d78279e338ccc590N.exe"C:\Users\Admin\AppData\Local\Temp\a9aa350b786356d7d78279e338ccc590N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\._cache_a9aa350b786356d7d78279e338ccc590N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a9aa350b786356d7d78279e338ccc590N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Program Files (x86)\Orcus\Orcus.exe"C:\Program Files (x86)\Orcus\Orcus.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:692
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
7.6MB
MD5a9aa350b786356d7d78279e338ccc590
SHA1248541c0cac6a66ba81dd8573470a15fd6107ddd
SHA2561a740ea5fc256aeac6c2df54d489e502cd2b752c20c09495ff879705f4bf5a0c
SHA512c7c4f3412ec0e027f5230b9912a1c2885c075cfc3cd5836ee21be44a93bf81df9afad7dda12274a29e5607f50a1ddb3290462170098dd53b731a4582d8890ef1
-
Filesize
903KB
MD5f25eb9be765070030a1f2e26deb22abe
SHA11cc47835cfe0472b285f891b2e66cc43a14a1ed1
SHA2561e66f6824062400a6c9a8d7de09c7f3a1fa6b07273d8a97adf332b21b88905d7
SHA5125e2229f652207812cc61cb4bd5f96fbee071424c5013dc66a70316cf6526460b927dd6595353b89ff5cf6f3653b996df99d11ae1bdebfc84bbe6755cedded6c1
-
Filesize
23KB
MD5e9d76861abce2e8562005d62989ae097
SHA11e9820a80f0b9917e2feb7b051c7d18cf4a56211
SHA25674e8838036daedbab5e223e45b4f6fcd7db3c1f19baf65c4e220b65dbda0ca09
SHA512cb75b188aee1e8d5ac7c5cf3e18bd84899c0f716fad05e7b5601a695751b53c4aa7da2049f1df1e03df6715adbdd12777b9012da04f4305da7c03d8c5752ed27
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04