Analysis
-
max time kernel
95s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
qsdadsasd.exe
Resource
win7-20240708-en
General
-
Target
qsdadsasd.exe
-
Size
920KB
-
MD5
9796fb7a3709287242c4070a571115f9
-
SHA1
c2972a613760363bba195af56f46552cbd24637e
-
SHA256
f829c2d6d6d04ef3da1a9259473265122971fa50175b96b10f4c3f944d257f5b
-
SHA512
8c185dec478bb50e5f4a25daf53c98873affb71dfacd713d63e32f18ea7a8a7adbe2ef34d2a18eb1dad879d542033595c3aec566b07a9f61af154f3cdc1ec093
-
SSDEEP
24576:HRfKDPdDy9ixLM8+dBHW8quJMKXFq93wgQGQ:Ulvy8+dBW8qsMYFq93wgdQ
Malware Config
Extracted
orcus
act-predictions.gl.at.ply.gg:53002
ccda6c301bcc4bffbcfcf707e51e3319
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3320-11-0x0000000000400000-0x00000000004E8000-memory.dmp orcus -
Suspicious use of SetThreadContext 1 IoCs
Processes:
qsdadsasd.exedescription pid process target process PID 3268 set thread context of 3320 3268 qsdadsasd.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qsdadsasd.exeRegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qsdadsasd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
qsdadsasd.exedescription pid process target process PID 3268 wrote to memory of 3320 3268 qsdadsasd.exe RegAsm.exe PID 3268 wrote to memory of 3320 3268 qsdadsasd.exe RegAsm.exe PID 3268 wrote to memory of 3320 3268 qsdadsasd.exe RegAsm.exe PID 3268 wrote to memory of 3320 3268 qsdadsasd.exe RegAsm.exe PID 3268 wrote to memory of 3320 3268 qsdadsasd.exe RegAsm.exe PID 3268 wrote to memory of 3320 3268 qsdadsasd.exe RegAsm.exe PID 3268 wrote to memory of 3320 3268 qsdadsasd.exe RegAsm.exe PID 3268 wrote to memory of 3320 3268 qsdadsasd.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\qsdadsasd.exe"C:\Users\Admin\AppData\Local\Temp\qsdadsasd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3320
-