Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 10:20

General

  • Target

    d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    d61d8e0cb1eb7183485f8edb5d9b4eda

  • SHA1

    04be3c46cffce788b7f8b8f238fa3e3296dfeb13

  • SHA256

    3eb5ab3cc11d0064fc147b145a156c1fa37e37fa9bc4e06b6789098ee4a1201d

  • SHA512

    a59e87a7a623cfa2fea7d855e9f9cb31d952850a9abb67f3d0175cfb38f4bb22411ade03c006d45b47fce5541e66cecba3c4c8bb3d85213486d32f0cd879eb4d

  • SSDEEP

    24576:m1JAHT4ordT2aaoHGIRmshpFPYJyRwhOO4JqY:m1mH1rdXaojpFwJy8zE1

Malware Config

Extracted

Family

orcus

C2

79.172.242.28:2404

Mutex

32fbef3c417741eda37ad5e6ba242e3d

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 2 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:720
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yvm0mrlg\yvm0mrlg.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9DF5.tmp" "c:\Users\Admin\AppData\Local\Temp\yvm0mrlg\CSC3D1EB70AEBA84C2E9C76C442E4364589.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1100
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9DF5.tmp

    Filesize

    1KB

    MD5

    787d50329c3cb1b7cb107cbc99982401

    SHA1

    5593ff207e49814656a558643417cfc229cd6f91

    SHA256

    79158da26b05b79aa59d739f21e1afd35a841ae986cc1d44e6ba589c2393cc1e

    SHA512

    c80b2bad3d1bd1df23f194d4ac850c844234cebf9b8023dfcf53d79274f4b804c6ade0717829f0f9eaecd6ef0d284b887e1d9a7a66aa8d436cd57d529f01b835

  • C:\Users\Admin\AppData\Local\Temp\yvm0mrlg\yvm0mrlg.dll

    Filesize

    6KB

    MD5

    d80d91b1e5600d9bc3ae3b101e0a3709

    SHA1

    19f5415db16a52da4019fad1c25d4ad39153a0b7

    SHA256

    45ca37912f2db6e6b36f12882c23ca81d5c0064d2ce2ed9165818027eb09b6aa

    SHA512

    53362583941639c11f9b12ad6f4533651f41ecd87aa65dd11f9cfab73bf32072d2efb30082b85244abe82b50bdfff629f1d9f00911c95d11d1e4ce77b3181c4c

  • C:\Users\Admin\AppData\Local\Temp\yvm0mrlg\yvm0mrlg.pdb

    Filesize

    15KB

    MD5

    7dba2d8774c7cf0f9c9d4413e6d9c7d9

    SHA1

    6ed6a714ce949ce0df99b0a1a4952a6f92784d16

    SHA256

    0bbc4a7b4fc26314ee63c2d6a0e6c6c11cdfdd2d4bf2429ed9fc4c1f10fddcfd

    SHA512

    fbf1895374c72ea5e05210d0c6f0d3bd1ed834510d652d13458b805db4690bc1296a209d060788b7da04495e257ce982d07277db778a2c26e0db166325d862ca

  • \??\c:\Users\Admin\AppData\Local\Temp\yvm0mrlg\CSC3D1EB70AEBA84C2E9C76C442E4364589.TMP

    Filesize

    1KB

    MD5

    cb48791d1c6e24ab4caed28b39ed82ad

    SHA1

    5977341615ea5e56815f6f299ea0ff2ca9ff9a4d

    SHA256

    495487a99d261f21dc399d169946dff16335e01899142bd29a6b156950a50049

    SHA512

    4de6f3aee8a01ae23361b8b2f17e1edbf93482b0b0dec9e5ddd02b43027996381fd0d7236a4adceff2b64d0f09b358648a6cc5e1e4bc779a31cfcce3e0cfa5c0

  • \??\c:\Users\Admin\AppData\Local\Temp\yvm0mrlg\yvm0mrlg.0.cs

    Filesize

    2KB

    MD5

    aebac2bde2bb595180d422c5a00ab63a

    SHA1

    fedd7808a3f1c46d6f0c513c3b54fc7dcb9f6652

    SHA256

    16e70a2d827a18e1d48da46c6227777f86e93d791519f19f1f151a4e9eec4551

    SHA512

    2b319ae7ead145e50b0b12cd8ac62ded1244ca7513e7207fb2e5b54fb98ea183cab0ed89d52eab518df076d2d5c615de1b26004bee4664f452e1ac3888218f6f

  • \??\c:\Users\Admin\AppData\Local\Temp\yvm0mrlg\yvm0mrlg.cmdline

    Filesize

    312B

    MD5

    fd1fe578a929de09230a7a425f4effd6

    SHA1

    6c8ba2142905a01abd8238af660e5d5f61829af1

    SHA256

    b81c6ef9ae58d7a1f25d21fb9c984b8ebddfb9d57d609b00a4d067e388c8e8f8

    SHA512

    2a92abf49c163ab2478a2d199d1e795b543f6dc3b328d04be583ad05539736bb4cb849c6d037739c6d442625bf151311b5687632dbb824be8b33282632fb6d01

  • memory/720-25-0x00000000051D0000-0x000000000526C000-memory.dmp

    Filesize

    624KB

  • memory/720-5-0x00000000746C0000-0x0000000074E70000-memory.dmp

    Filesize

    7.7MB

  • memory/720-19-0x0000000004DA0000-0x0000000004E32000-memory.dmp

    Filesize

    584KB

  • memory/720-17-0x0000000002800000-0x0000000002808000-memory.dmp

    Filesize

    32KB

  • memory/720-1-0x0000000000340000-0x0000000000444000-memory.dmp

    Filesize

    1.0MB

  • memory/720-21-0x0000000004D90000-0x0000000004D9C000-memory.dmp

    Filesize

    48KB

  • memory/720-20-0x0000000005570000-0x0000000005662000-memory.dmp

    Filesize

    968KB

  • memory/720-24-0x00000000050E0000-0x00000000051C8000-memory.dmp

    Filesize

    928KB

  • memory/720-0-0x00000000746CE000-0x00000000746CF000-memory.dmp

    Filesize

    4KB

  • memory/720-38-0x00000000746C0000-0x0000000074E70000-memory.dmp

    Filesize

    7.7MB

  • memory/720-37-0x00000000746CE000-0x00000000746CF000-memory.dmp

    Filesize

    4KB

  • memory/4352-29-0x00000000052D0000-0x000000000532C000-memory.dmp

    Filesize

    368KB

  • memory/4352-28-0x0000000001420000-0x000000000142E000-memory.dmp

    Filesize

    56KB

  • memory/4352-31-0x00000000746C0000-0x0000000074E70000-memory.dmp

    Filesize

    7.7MB

  • memory/4352-30-0x0000000005990000-0x0000000005F34000-memory.dmp

    Filesize

    5.6MB

  • memory/4352-32-0x0000000005460000-0x0000000005472000-memory.dmp

    Filesize

    72KB

  • memory/4352-33-0x0000000005F40000-0x0000000005F58000-memory.dmp

    Filesize

    96KB

  • memory/4352-35-0x00000000060B0000-0x00000000060C0000-memory.dmp

    Filesize

    64KB

  • memory/4352-34-0x0000000006280000-0x0000000006442000-memory.dmp

    Filesize

    1.8MB

  • memory/4352-36-0x00000000061E0000-0x00000000061EA000-memory.dmp

    Filesize

    40KB

  • memory/4352-27-0x00000000746C0000-0x0000000074E70000-memory.dmp

    Filesize

    7.7MB

  • memory/4352-26-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/4352-39-0x00000000746C0000-0x0000000074E70000-memory.dmp

    Filesize

    7.7MB

  • memory/4352-40-0x00000000746C0000-0x0000000074E70000-memory.dmp

    Filesize

    7.7MB