Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 21:14
Behavioral task
behavioral1
Sample
f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe
-
Size
905KB
-
MD5
f482f02149622205c6d5ed988aae617c
-
SHA1
8126947af7338744dc8c7f5ea9a17e9c20dd33dc
-
SHA256
fd2421c6582e3d7fcf917b7e3c24309e20731f828bdb8505076dafaf4cd9ee9e
-
SHA512
7b69d4f838c4275d0a73699ad35b7152abef34e75b13787e1a253b6a0f2c7826685e6484d8e32da4c6719e94da364a400396a0a5d751ee58a9c9ff66cadce4e5
-
SSDEEP
12288:X0XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCl/2Nr6BNRCpepD25r7dG1lFlWM:ApP4MROxnFMOVrrcI0AilFEvxHPeoo0
Malware Config
Extracted
orcus
aa
75.23.178.95:214
17e765930f6d487aae82933122a74df7
-
autostart_method
Registry
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Registry.
-
taskscheduler_taskname
Registry
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus main payload 1 IoCs
Processes:
resource yara_rule \Program Files (x86)\Orcus\Orcus.exe family_orcus -
Orcurs Rat Executable 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2948-1-0x0000000000EE0000-0x0000000000FC8000-memory.dmp orcus \Program Files (x86)\Orcus\Orcus.exe orcus behavioral1/memory/3004-18-0x0000000000030000-0x0000000000118000-memory.dmp orcus -
Executes dropped EXE 2 IoCs
Processes:
Orcus.exeOrcus.exepid process 3004 Orcus.exe 2740 Orcus.exe -
Loads dropped DLL 1 IoCs
Processes:
f482f02149622205c6d5ed988aae617c_JaffaCakes118.exepid process 2948 f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Orcus.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Registry. = "\"C:\\Program Files (x86)\\Orcus\\Orcus.exe\"" Orcus.exe -
Drops file in Program Files directory 3 IoCs
Processes:
f482f02149622205c6d5ed988aae617c_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\Orcus\Orcus.exe f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Orcus\Orcus.exe f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe File created C:\Program Files (x86)\Orcus\Orcus.exe.config f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f482f02149622205c6d5ed988aae617c_JaffaCakes118.exeOrcus.exeOrcus.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Orcus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Orcus.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Orcus.exepid process 3004 Orcus.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Orcus.exepid process 3004 Orcus.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f482f02149622205c6d5ed988aae617c_JaffaCakes118.exetaskeng.exedescription pid process target process PID 2948 wrote to memory of 3004 2948 f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe Orcus.exe PID 2948 wrote to memory of 3004 2948 f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe Orcus.exe PID 2948 wrote to memory of 3004 2948 f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe Orcus.exe PID 2948 wrote to memory of 3004 2948 f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe Orcus.exe PID 2772 wrote to memory of 2740 2772 taskeng.exe Orcus.exe PID 2772 wrote to memory of 2740 2772 taskeng.exe Orcus.exe PID 2772 wrote to memory of 2740 2772 taskeng.exe Orcus.exe PID 2772 wrote to memory of 2740 2772 taskeng.exe Orcus.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f482f02149622205c6d5ed988aae617c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Orcus\Orcus.exe"C:\Program Files (x86)\Orcus\Orcus.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3004
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {003C2277-1F58-4253-9176-8F67D29B7B11} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Orcus\Orcus.exe"C:\Program Files (x86)\Orcus\Orcus.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
905KB
MD5f482f02149622205c6d5ed988aae617c
SHA18126947af7338744dc8c7f5ea9a17e9c20dd33dc
SHA256fd2421c6582e3d7fcf917b7e3c24309e20731f828bdb8505076dafaf4cd9ee9e
SHA5127b69d4f838c4275d0a73699ad35b7152abef34e75b13787e1a253b6a0f2c7826685e6484d8e32da4c6719e94da364a400396a0a5d751ee58a9c9ff66cadce4e5