Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 10:20

General

  • Target

    d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    d61d8e0cb1eb7183485f8edb5d9b4eda

  • SHA1

    04be3c46cffce788b7f8b8f238fa3e3296dfeb13

  • SHA256

    3eb5ab3cc11d0064fc147b145a156c1fa37e37fa9bc4e06b6789098ee4a1201d

  • SHA512

    a59e87a7a623cfa2fea7d855e9f9cb31d952850a9abb67f3d0175cfb38f4bb22411ade03c006d45b47fce5541e66cecba3c4c8bb3d85213486d32f0cd879eb4d

  • SSDEEP

    24576:m1JAHT4ordT2aaoHGIRmshpFPYJyRwhOO4JqY:m1mH1rdXaojpFwJy8zE1

Malware Config

Extracted

Family

orcus

C2

79.172.242.28:2404

Mutex

32fbef3c417741eda37ad5e6ba242e3d

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 6 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mljtyht0\mljtyht0.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF344.tmp" "c:\Users\Admin\AppData\Local\Temp\mljtyht0\CSC6528E1A2E69A481480DDC13A12E760E3.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2580
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:1904
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESF344.tmp

      Filesize

      1KB

      MD5

      0ba427addfcab1527fad5cb46dae1b69

      SHA1

      8d96f5bcd33a2af0ec0cd395408b42ba00ab6e3c

      SHA256

      b439d250e13d72a0c3b2b905c4a58334b30315ef4849085016b68a794290179e

      SHA512

      224d563d7af004172e167125643f7eb4d322cbf94b2371e6c7ae5ef82cb26b6403b932ceba34019acb0a2949a58c23f84cde6b49d87b5e7efb4bc9107f1b4829

    • C:\Users\Admin\AppData\Local\Temp\mljtyht0\mljtyht0.dll

      Filesize

      6KB

      MD5

      c0734d79e935315e42611047d4718072

      SHA1

      aa3748ec25327f863c34f204020ba7916749e924

      SHA256

      6bba18aab86521aba3050cce894318f94dfb2644ce2817b802cfb8ca351df268

      SHA512

      a1b3bc8d096b1e7c0efbe73b8671f8135f26d83daf0f8cba01d97cb3588e4e635afce27112de75adf27098c954d2c3e6d43e31165d47ca69a4d05428782ff3aa

    • C:\Users\Admin\AppData\Local\Temp\mljtyht0\mljtyht0.pdb

      Filesize

      15KB

      MD5

      b8e150ba58aba2eaa65f795212ba2aa3

      SHA1

      7b6307c735e150169f9f254a82ec236d16178221

      SHA256

      0823d06f3f23255a1576d02c7ef77b8de8e34ea3449ce2656b02f76c0e968411

      SHA512

      d8419c24ad8c5644999005aa105ae1b98f25fda99a5201e4b5d0d0985a39d5d0ea19d46912d8ab6d0c91e39198918a562a30f29ca41c38762df8554c38192e51

    • \??\c:\Users\Admin\AppData\Local\Temp\mljtyht0\CSC6528E1A2E69A481480DDC13A12E760E3.TMP

      Filesize

      1KB

      MD5

      8698184016884a8b10a6f1b580b3abb5

      SHA1

      fc383ebeb6b25e285dbc3a36ae09058370666ff1

      SHA256

      f46dc8e26a7f78eb32b78fbfd94b4472a9571069c2d7eeb00fa15eec613b61f0

      SHA512

      1c5fa21e9829bb4587a5f4e17ac0f9a4308a5126df49e54ede065a0cf1ec06fbb156d20db6b752298ac2061b92ee5a2bf015ca81a970a6c1f3d4c05f076bfb5d

    • \??\c:\Users\Admin\AppData\Local\Temp\mljtyht0\mljtyht0.0.cs

      Filesize

      2KB

      MD5

      aebac2bde2bb595180d422c5a00ab63a

      SHA1

      fedd7808a3f1c46d6f0c513c3b54fc7dcb9f6652

      SHA256

      16e70a2d827a18e1d48da46c6227777f86e93d791519f19f1f151a4e9eec4551

      SHA512

      2b319ae7ead145e50b0b12cd8ac62ded1244ca7513e7207fb2e5b54fb98ea183cab0ed89d52eab518df076d2d5c615de1b26004bee4664f452e1ac3888218f6f

    • \??\c:\Users\Admin\AppData\Local\Temp\mljtyht0\mljtyht0.cmdline

      Filesize

      312B

      MD5

      80b9bb3a8fbec270115908754562c57b

      SHA1

      9cf4176f2f8a8877ccf7f2617034367ee86c6b76

      SHA256

      11b1222d1d5ad3124d0cd0e8372665bbfb9c99acbcad8bfe0174aebdd8fb34f1

      SHA512

      4897b0f02a5eec329e52d38e9ee6af3a374c00dd674f9b4656e237c17503b2170a2515555706d7f3de012a3015a01d44fba3b0d20908a7f88dd969a09d8deea4

    • memory/2544-33-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2544-37-0x00000000006B0000-0x000000000070C000-memory.dmp

      Filesize

      368KB

    • memory/2544-40-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/2544-39-0x0000000000800000-0x0000000000818000-memory.dmp

      Filesize

      96KB

    • memory/2544-38-0x00000000007E0000-0x00000000007F2000-memory.dmp

      Filesize

      72KB

    • memory/2544-36-0x0000000000690000-0x000000000069E000-memory.dmp

      Filesize

      56KB

    • memory/2544-26-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2544-24-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2544-28-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2544-35-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2544-31-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2544-30-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2544-29-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2792-0-0x000000007465E000-0x000000007465F000-memory.dmp

      Filesize

      4KB

    • memory/2792-23-0x00000000054B0000-0x0000000005598000-memory.dmp

      Filesize

      928KB

    • memory/2792-20-0x00000000005C0000-0x00000000005CC000-memory.dmp

      Filesize

      48KB

    • memory/2792-5-0x0000000074650000-0x0000000074D3E000-memory.dmp

      Filesize

      6.9MB

    • memory/2792-19-0x00000000053C0000-0x00000000054B2000-memory.dmp

      Filesize

      968KB

    • memory/2792-17-0x00000000003C0000-0x00000000003C8000-memory.dmp

      Filesize

      32KB

    • memory/2792-1-0x0000000001230000-0x0000000001334000-memory.dmp

      Filesize

      1.0MB

    • memory/2792-41-0x000000007465E000-0x000000007465F000-memory.dmp

      Filesize

      4KB

    • memory/2792-42-0x0000000074650000-0x0000000074D3E000-memory.dmp

      Filesize

      6.9MB