Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 21:44
Behavioral task
behavioral1
Sample
O1.exe
Resource
win7-20240708-en
General
-
Target
O1.exe
-
Size
3.0MB
-
MD5
5b981f0c4df0ac1e4ac7044efd855ef3
-
SHA1
1a916b685f846e9bdbd14c789e098dcd442adf7d
-
SHA256
fc9f450bc1927e864a5f9cad97642515b5daeab7f35ed85257a1b82f4a7ae844
-
SHA512
48d1ff7f2e607cc634c2ec9e5c776b166a923a08595e2446b47fc42bd322d632d77526da2b72ca041e591c09cf2f5ab70809b3488ba2ca59437b14cefd01417e
-
SSDEEP
49152:F74R0QyXQrZeM9/FMDjjVZFGFeHzHt5AmYAypQxbJyBBo9JnCmwWncFf0I74gu3l:Fc2KQ4MDjZZF08t5AmXypSbMBo9JCm
Malware Config
Extracted
orcus
h2xo9w.ddns.net:10134
df6697f408f645e0adc2ec3085681727
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%appdata%\Antimalware Service\Antimalware Service.exe
-
reconnect_delay
10000
-
registry_keyname
Antimalware Service
-
taskscheduler_taskname
Antimalware Service
-
watchdog_path
AppData\Antimalware Service Helper.exe
Signatures
-
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/memory/1740-1-0x000001C1D45B0000-0x000001C1D48AA000-memory.dmp orcus behavioral2/files/0x000900000002353e-13.dat orcus -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation O1.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Antimalware Service.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Antimalware Service Helper.exe -
Executes dropped EXE 4 IoCs
pid Process 2316 Antimalware Service.exe 4540 Antimalware Service.exe 1732 Antimalware Service Helper.exe 3120 Antimalware Service Helper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Antimalware Service Helper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Antimalware Service Helper.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2316 Antimalware Service.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe 2316 Antimalware Service.exe 3120 Antimalware Service Helper.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2316 Antimalware Service.exe Token: SeDebugPrivilege 1732 Antimalware Service Helper.exe Token: SeDebugPrivilege 3120 Antimalware Service Helper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2316 Antimalware Service.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2316 1740 O1.exe 89 PID 1740 wrote to memory of 2316 1740 O1.exe 89 PID 2316 wrote to memory of 1732 2316 Antimalware Service.exe 91 PID 2316 wrote to memory of 1732 2316 Antimalware Service.exe 91 PID 2316 wrote to memory of 1732 2316 Antimalware Service.exe 91 PID 1732 wrote to memory of 3120 1732 Antimalware Service Helper.exe 93 PID 1732 wrote to memory of 3120 1732 Antimalware Service Helper.exe 93 PID 1732 wrote to memory of 3120 1732 Antimalware Service Helper.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\O1.exe"C:\Users\Admin\AppData\Local\Temp\O1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\Antimalware Service\Antimalware Service.exe"C:\Users\Admin\AppData\Roaming\Antimalware Service\Antimalware Service.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\Antimalware Service Helper.exe"C:\Users\Admin\AppData\Roaming\Antimalware Service Helper.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Antimalware Service\Antimalware Service.exe" 23163⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\Antimalware Service Helper.exe"C:\Users\Admin\AppData\Roaming\Antimalware Service Helper.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Antimalware Service\Antimalware Service.exe" 23164⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
-
-
C:\Users\Admin\AppData\Roaming\Antimalware Service\Antimalware Service.exe"C:\Users\Admin\AppData\Roaming\Antimalware Service\Antimalware Service.exe"1⤵
- Executes dropped EXE
PID:4540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3036,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:81⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
9KB
MD5c48de5dc77e5b1e2ddfe2db2258990e4
SHA1c543c804c1cc326e61d85a8cb83d2dafc87317a2
SHA256988113c751ad9d775509fc00cfba2d62385663bfe3587f3b7b681a6660d19db5
SHA512f28552d9e1c43ae3e024eb2f280f9050cc611ab16d9250afd14702a715ab404e4ab72bc4f3aa27aa8c1ebd0c9a9c1c7bdb73ce08efe4dd705e805015ae24c76c
-
Filesize
157B
MD57efa291047eb1202fde7765adac4b00d
SHA122d4846caff5e45c18e50738360579fbbed2aa8d
SHA256807fb6eeaa7c77bf53831d8a4422a53a5d8ccd90e6bbc17c655c0817460407b6
SHA512159c95eb1e817ba2d281f39c3939dd963ab62c0cd29bf66ca3beb0aff53f4617d47f48474e58319130ae4146a044a42fc75f63c343330c1b6d2be7034b9fa724
-
Filesize
3.0MB
MD55b981f0c4df0ac1e4ac7044efd855ef3
SHA11a916b685f846e9bdbd14c789e098dcd442adf7d
SHA256fc9f450bc1927e864a5f9cad97642515b5daeab7f35ed85257a1b82f4a7ae844
SHA51248d1ff7f2e607cc634c2ec9e5c776b166a923a08595e2446b47fc42bd322d632d77526da2b72ca041e591c09cf2f5ab70809b3488ba2ca59437b14cefd01417e
-
Filesize
349B
MD589817519e9e0b4e703f07e8c55247861
SHA14636de1f6c997a25c3190f73f46a3fd056238d78
SHA256f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13
SHA512b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3