General
-
Target
f8d622954cef4882bc8a0a77ad399604_JaffaCakes118
-
Size
1.6MB
-
Sample
240926-vmtjxaydjp
-
MD5
f8d622954cef4882bc8a0a77ad399604
-
SHA1
0e904cebd41ae2aaa1947aeaf431449b319e07f6
-
SHA256
15a56267ca5e39c679432257291333d4878e70650d419dca6c90b942377b043f
-
SHA512
c4f9eeb7d9c49e742785b4a1f04ab677a9086d898b3c725bf9d32cebf4d5718a205b5e13f7bc64510f6169fef787636c49c45e3370f9ff29959514f867e893a5
-
SSDEEP
49152:RmizTCwwGX9AvRoaXp2kEfhHsXrAolZHTJx:Rvz7/+RzpMhz6Htx
Static task
static1
Behavioral task
behavioral1
Sample
f8d622954cef4882bc8a0a77ad399604_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f8d622954cef4882bc8a0a77ad399604_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
orcus
DESK-100618
poulty55.chickenkiller.com:9030
a386a045d9c842428c74de4ed9645fe9
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10002
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Targets
-
-
Target
f8d622954cef4882bc8a0a77ad399604_JaffaCakes118
-
Size
1.6MB
-
MD5
f8d622954cef4882bc8a0a77ad399604
-
SHA1
0e904cebd41ae2aaa1947aeaf431449b319e07f6
-
SHA256
15a56267ca5e39c679432257291333d4878e70650d419dca6c90b942377b043f
-
SHA512
c4f9eeb7d9c49e742785b4a1f04ab677a9086d898b3c725bf9d32cebf4d5718a205b5e13f7bc64510f6169fef787636c49c45e3370f9ff29959514f867e893a5
-
SSDEEP
49152:RmizTCwwGX9AvRoaXp2kEfhHsXrAolZHTJx:Rvz7/+RzpMhz6Htx
-
Orcurs Rat Executable
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1