Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe
-
Size
627KB
-
MD5
e8e5114392d102b3bd444738f6d3d3d4
-
SHA1
dc6b04a59e4ae55ee324c07ea052c90ed57e9f45
-
SHA256
08e6c17c9d5945a005797e3abcbf9b2a656b4cd06d319a6f08941f02a85d4567
-
SHA512
0ab0786ad04f10f83167c961a8e99bf8ca337b5fd0be6d4bdc5dba96028a05aae5ac6d37cb412ccce4cc98a9877ca4a14fcdd32358ee9753a045991c49a5fb21
-
SSDEEP
12288:XRuGWAoOmoh4crtXdHzf/64cnndRRoNKBN9A+ruoqpoK6jl4qYn5biUY2Hiu:Bul1O/h/rtNHzf/64yaKzjrip6J4qrZ6
Malware Config
Extracted
orcus
NewStart
doddyfire.dyndns.org:10134
e3a681f1b3d044cfa729b62b59e822e2
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2676-31-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2676-37-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2676-36-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2676-34-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral1/memory/2676-29-0x0000000000400000-0x00000000004EA000-memory.dmp orcus -
Executes dropped EXE 2 IoCs
Processes:
USB_State.exeUSB_State.exepid Process 2716 USB_State.exe 2676 USB_State.exe -
Loads dropped DLL 2 IoCs
Processes:
e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exeUSB_State.exepid Process 2392 e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe 2716 USB_State.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\DwiDesk\\USB_State.lnk" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
USB_State.exedescription pid Process procid_target PID 2716 set thread context of 2676 2716 USB_State.exe 34 PID 2716 set thread context of 1796 2716 USB_State.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exereg.exeUSB_State.exeMSBuild.exee8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exeUSB_State.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language USB_State.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language USB_State.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
USB_State.exeMSBuild.exepid Process 2716 USB_State.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 2716 USB_State.exe 1796 MSBuild.exe 1796 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
USB_State.exeUSB_State.exeMSBuild.exedescription pid Process Token: SeDebugPrivilege 2716 USB_State.exe Token: SeDebugPrivilege 2676 USB_State.exe Token: SeDebugPrivilege 1796 MSBuild.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
USB_State.exepid Process 2676 USB_State.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
USB_State.exepid Process 2676 USB_State.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
USB_State.exepid Process 2676 USB_State.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exeUSB_State.execmd.exedescription pid Process procid_target PID 2392 wrote to memory of 2716 2392 e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2716 2392 e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2716 2392 e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe 30 PID 2392 wrote to memory of 2716 2392 e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2796 2716 USB_State.exe 31 PID 2716 wrote to memory of 2796 2716 USB_State.exe 31 PID 2716 wrote to memory of 2796 2716 USB_State.exe 31 PID 2716 wrote to memory of 2796 2716 USB_State.exe 31 PID 2796 wrote to memory of 2624 2796 cmd.exe 33 PID 2796 wrote to memory of 2624 2796 cmd.exe 33 PID 2796 wrote to memory of 2624 2796 cmd.exe 33 PID 2796 wrote to memory of 2624 2796 cmd.exe 33 PID 2716 wrote to memory of 2676 2716 USB_State.exe 34 PID 2716 wrote to memory of 2676 2716 USB_State.exe 34 PID 2716 wrote to memory of 2676 2716 USB_State.exe 34 PID 2716 wrote to memory of 2676 2716 USB_State.exe 34 PID 2716 wrote to memory of 2676 2716 USB_State.exe 34 PID 2716 wrote to memory of 2676 2716 USB_State.exe 34 PID 2716 wrote to memory of 2676 2716 USB_State.exe 34 PID 2716 wrote to memory of 2676 2716 USB_State.exe 34 PID 2716 wrote to memory of 2676 2716 USB_State.exe 34 PID 2716 wrote to memory of 1796 2716 USB_State.exe 35 PID 2716 wrote to memory of 1796 2716 USB_State.exe 35 PID 2716 wrote to memory of 1796 2716 USB_State.exe 35 PID 2716 wrote to memory of 1796 2716 USB_State.exe 35 PID 2716 wrote to memory of 1796 2716 USB_State.exe 35 PID 2716 wrote to memory of 1796 2716 USB_State.exe 35 PID 2716 wrote to memory of 1796 2716 USB_State.exe 35 PID 2716 wrote to memory of 1796 2716 USB_State.exe 35 PID 2716 wrote to memory of 1796 2716 USB_State.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8e5114392d102b3bd444738f6d3d3d4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\USB_State.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\USB_State.exe" -n2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\USB_State.lnk" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\USB_State.lnk" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\USB_State.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\USB_State.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5425e51fce60fb0f23231005b3e032673
SHA11fb2bc921c45a99daad88b9397fda7aa4a6ae107
SHA256df1ad70b6a9944caac8ae8cad263f3cf8c31aaaf565d62dd63a78553485a6852
SHA5123c3f259b74a96a0551310dcad76c0d97dfb9925bd0a3671ad8e5e29a22d321d7324f9499344d94b13c6c04818507cd0c489968018dbb98839f5d869b53ebb2cb
-
Filesize
627KB
MD5e8e5114392d102b3bd444738f6d3d3d4
SHA1dc6b04a59e4ae55ee324c07ea052c90ed57e9f45
SHA25608e6c17c9d5945a005797e3abcbf9b2a656b4cd06d319a6f08941f02a85d4567
SHA5120ab0786ad04f10f83167c961a8e99bf8ca337b5fd0be6d4bdc5dba96028a05aae5ac6d37cb412ccce4cc98a9877ca4a14fcdd32358ee9753a045991c49a5fb21