Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
d61d8e0cb1eb7183485f8edb5d9b4eda
-
SHA1
04be3c46cffce788b7f8b8f238fa3e3296dfeb13
-
SHA256
3eb5ab3cc11d0064fc147b145a156c1fa37e37fa9bc4e06b6789098ee4a1201d
-
SHA512
a59e87a7a623cfa2fea7d855e9f9cb31d952850a9abb67f3d0175cfb38f4bb22411ade03c006d45b47fce5541e66cecba3c4c8bb3d85213486d32f0cd879eb4d
-
SSDEEP
24576:m1JAHT4ordT2aaoHGIRmshpFPYJyRwhOO4JqY:m1mH1rdXaojpFwJy8zE1
Malware Config
Extracted
orcus
79.172.242.28:2404
32fbef3c417741eda37ad5e6ba242e3d
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/memory/720-24-0x00000000050E0000-0x00000000051C8000-memory.dmp orcus behavioral2/memory/4352-26-0x0000000000400000-0x00000000004E8000-memory.dmp orcus -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wiex7.url d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 720 set thread context of 4352 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe Token: SeDebugPrivilege 4352 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4352 AppLaunch.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4352 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4352 AppLaunch.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 720 wrote to memory of 4880 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 85 PID 720 wrote to memory of 4880 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 85 PID 720 wrote to memory of 4880 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 85 PID 4880 wrote to memory of 1100 4880 csc.exe 88 PID 4880 wrote to memory of 1100 4880 csc.exe 88 PID 4880 wrote to memory of 1100 4880 csc.exe 88 PID 720 wrote to memory of 4352 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 89 PID 720 wrote to memory of 4352 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 89 PID 720 wrote to memory of 4352 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 89 PID 720 wrote to memory of 4352 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 89 PID 720 wrote to memory of 4352 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 89 PID 720 wrote to memory of 4352 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 89 PID 720 wrote to memory of 4352 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 89 PID 720 wrote to memory of 4352 720 d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d61d8e0cb1eb7183485f8edb5d9b4eda_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yvm0mrlg\yvm0mrlg.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9DF5.tmp" "c:\Users\Admin\AppData\Local\Temp\yvm0mrlg\CSC3D1EB70AEBA84C2E9C76C442E4364589.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5787d50329c3cb1b7cb107cbc99982401
SHA15593ff207e49814656a558643417cfc229cd6f91
SHA25679158da26b05b79aa59d739f21e1afd35a841ae986cc1d44e6ba589c2393cc1e
SHA512c80b2bad3d1bd1df23f194d4ac850c844234cebf9b8023dfcf53d79274f4b804c6ade0717829f0f9eaecd6ef0d284b887e1d9a7a66aa8d436cd57d529f01b835
-
Filesize
6KB
MD5d80d91b1e5600d9bc3ae3b101e0a3709
SHA119f5415db16a52da4019fad1c25d4ad39153a0b7
SHA25645ca37912f2db6e6b36f12882c23ca81d5c0064d2ce2ed9165818027eb09b6aa
SHA51253362583941639c11f9b12ad6f4533651f41ecd87aa65dd11f9cfab73bf32072d2efb30082b85244abe82b50bdfff629f1d9f00911c95d11d1e4ce77b3181c4c
-
Filesize
15KB
MD57dba2d8774c7cf0f9c9d4413e6d9c7d9
SHA16ed6a714ce949ce0df99b0a1a4952a6f92784d16
SHA2560bbc4a7b4fc26314ee63c2d6a0e6c6c11cdfdd2d4bf2429ed9fc4c1f10fddcfd
SHA512fbf1895374c72ea5e05210d0c6f0d3bd1ed834510d652d13458b805db4690bc1296a209d060788b7da04495e257ce982d07277db778a2c26e0db166325d862ca
-
Filesize
1KB
MD5cb48791d1c6e24ab4caed28b39ed82ad
SHA15977341615ea5e56815f6f299ea0ff2ca9ff9a4d
SHA256495487a99d261f21dc399d169946dff16335e01899142bd29a6b156950a50049
SHA5124de6f3aee8a01ae23361b8b2f17e1edbf93482b0b0dec9e5ddd02b43027996381fd0d7236a4adceff2b64d0f09b358648a6cc5e1e4bc779a31cfcce3e0cfa5c0
-
Filesize
2KB
MD5aebac2bde2bb595180d422c5a00ab63a
SHA1fedd7808a3f1c46d6f0c513c3b54fc7dcb9f6652
SHA25616e70a2d827a18e1d48da46c6227777f86e93d791519f19f1f151a4e9eec4551
SHA5122b319ae7ead145e50b0b12cd8ac62ded1244ca7513e7207fb2e5b54fb98ea183cab0ed89d52eab518df076d2d5c615de1b26004bee4664f452e1ac3888218f6f
-
Filesize
312B
MD5fd1fe578a929de09230a7a425f4effd6
SHA16c8ba2142905a01abd8238af660e5d5f61829af1
SHA256b81c6ef9ae58d7a1f25d21fb9c984b8ebddfb9d57d609b00a4d067e388c8e8f8
SHA5122a92abf49c163ab2478a2d199d1e795b543f6dc3b328d04be583ad05539736bb4cb849c6d037739c6d442625bf151311b5687632dbb824be8b33282632fb6d01