Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
d61d8e0cb1eb7183485f8edb5d9b4eda
-
SHA1
04be3c46cffce788b7f8b8f238fa3e3296dfeb13
-
SHA256
3eb5ab3cc11d0064fc147b145a156c1fa37e37fa9bc4e06b6789098ee4a1201d
-
SHA512
a59e87a7a623cfa2fea7d855e9f9cb31d952850a9abb67f3d0175cfb38f4bb22411ade03c006d45b47fce5541e66cecba3c4c8bb3d85213486d32f0cd879eb4d
-
SSDEEP
24576:m1JAHT4ordT2aaoHGIRmshpFPYJyRwhOO4JqY:m1mH1rdXaojpFwJy8zE1
Malware Config
Extracted
orcus
79.172.242.28:2404
32fbef3c417741eda37ad5e6ba242e3d
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 6 IoCs
resource yara_rule behavioral1/memory/2792-23-0x00000000054B0000-0x0000000005598000-memory.dmp orcus behavioral1/memory/2544-33-0x0000000000400000-0x00000000004E8000-memory.dmp orcus behavioral1/memory/2544-35-0x0000000000400000-0x00000000004E8000-memory.dmp orcus behavioral1/memory/2544-31-0x0000000000400000-0x00000000004E8000-memory.dmp orcus behavioral1/memory/2544-29-0x0000000000400000-0x00000000004E8000-memory.dmp orcus behavioral1/memory/2544-28-0x0000000000400000-0x00000000004E8000-memory.dmp orcus -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wiex7.url d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2792 set thread context of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe Token: SeDebugPrivilege 2544 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 AppLaunch.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2544 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2544 AppLaunch.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2228 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2228 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2228 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2228 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2580 2228 csc.exe 32 PID 2228 wrote to memory of 2580 2228 csc.exe 32 PID 2228 wrote to memory of 2580 2228 csc.exe 32 PID 2228 wrote to memory of 2580 2228 csc.exe 32 PID 2792 wrote to memory of 1904 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 33 PID 2792 wrote to memory of 1904 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 33 PID 2792 wrote to memory of 1904 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 33 PID 2792 wrote to memory of 1904 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 33 PID 2792 wrote to memory of 1904 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 33 PID 2792 wrote to memory of 1904 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 33 PID 2792 wrote to memory of 1904 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34 PID 2792 wrote to memory of 2544 2792 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mljtyht0\mljtyht0.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF344.tmp" "c:\Users\Admin\AppData\Local\Temp\mljtyht0\CSC6528E1A2E69A481480DDC13A12E760E3.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50ba427addfcab1527fad5cb46dae1b69
SHA18d96f5bcd33a2af0ec0cd395408b42ba00ab6e3c
SHA256b439d250e13d72a0c3b2b905c4a58334b30315ef4849085016b68a794290179e
SHA512224d563d7af004172e167125643f7eb4d322cbf94b2371e6c7ae5ef82cb26b6403b932ceba34019acb0a2949a58c23f84cde6b49d87b5e7efb4bc9107f1b4829
-
Filesize
6KB
MD5c0734d79e935315e42611047d4718072
SHA1aa3748ec25327f863c34f204020ba7916749e924
SHA2566bba18aab86521aba3050cce894318f94dfb2644ce2817b802cfb8ca351df268
SHA512a1b3bc8d096b1e7c0efbe73b8671f8135f26d83daf0f8cba01d97cb3588e4e635afce27112de75adf27098c954d2c3e6d43e31165d47ca69a4d05428782ff3aa
-
Filesize
15KB
MD5b8e150ba58aba2eaa65f795212ba2aa3
SHA17b6307c735e150169f9f254a82ec236d16178221
SHA2560823d06f3f23255a1576d02c7ef77b8de8e34ea3449ce2656b02f76c0e968411
SHA512d8419c24ad8c5644999005aa105ae1b98f25fda99a5201e4b5d0d0985a39d5d0ea19d46912d8ab6d0c91e39198918a562a30f29ca41c38762df8554c38192e51
-
Filesize
1KB
MD58698184016884a8b10a6f1b580b3abb5
SHA1fc383ebeb6b25e285dbc3a36ae09058370666ff1
SHA256f46dc8e26a7f78eb32b78fbfd94b4472a9571069c2d7eeb00fa15eec613b61f0
SHA5121c5fa21e9829bb4587a5f4e17ac0f9a4308a5126df49e54ede065a0cf1ec06fbb156d20db6b752298ac2061b92ee5a2bf015ca81a970a6c1f3d4c05f076bfb5d
-
Filesize
2KB
MD5aebac2bde2bb595180d422c5a00ab63a
SHA1fedd7808a3f1c46d6f0c513c3b54fc7dcb9f6652
SHA25616e70a2d827a18e1d48da46c6227777f86e93d791519f19f1f151a4e9eec4551
SHA5122b319ae7ead145e50b0b12cd8ac62ded1244ca7513e7207fb2e5b54fb98ea183cab0ed89d52eab518df076d2d5c615de1b26004bee4664f452e1ac3888218f6f
-
Filesize
312B
MD580b9bb3a8fbec270115908754562c57b
SHA19cf4176f2f8a8877ccf7f2617034367ee86c6b76
SHA25611b1222d1d5ad3124d0cd0e8372665bbfb9c99acbcad8bfe0174aebdd8fb34f1
SHA5124897b0f02a5eec329e52d38e9ee6af3a374c00dd674f9b4656e237c17503b2170a2515555706d7f3de012a3015a01d44fba3b0d20908a7f88dd969a09d8deea4