Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 14:03

General

  • Target

    fa8a33fb3bda39a4ca3cea2500c635b8_JaffaCakes118.exe

  • Size

    918KB

  • MD5

    fa8a33fb3bda39a4ca3cea2500c635b8

  • SHA1

    47c0e3509a249d0d80716da3afe28b5fe765d225

  • SHA256

    cf92e7573d34ef42a341d5562357169b90e0542bd66b00d57c84eff686de0400

  • SHA512

    3fc02998288f88ad2b822281830ac328981b42a94ecfef370b67dd4f6f62724eceabadcba635e401a0ddb5dd77011f199c8e4e68b51e3765e3cdaa66177a9c92

  • SSDEEP

    24576:F1I4MROxnFi3WUrUrZlI0AilFEvxHiSRX:F1rMioN4rZlI0AilFEvxHi

Malware Config

Extracted

Family

orcus

C2

87.103.252.59:25565

Mutex

7d661032d74f479fa6fca588ed3ac59f

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    %programfiles%\Steam\depotcache\SteamWebHelper.exe

  • reconnect_delay

    5000

  • registry_keyname

    Windows

  • taskscheduler_taskname

    Windows

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa8a33fb3bda39a4ca3cea2500c635b8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa8a33fb3bda39a4ca3cea2500c635b8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3mccpacl.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES87A0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC879F.tmp"
        3⤵
          PID:2536
      • C:\Program Files\Steam\depotcache\SteamWebHelper.exe
        "C:\Program Files\Steam\depotcache\SteamWebHelper.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
          "C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchSelfAndExit "C:\Program Files\Steam\depotcache\SteamWebHelper.exe" 1612 /protectFile
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2800
          • C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe
            "C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /watchProcess "C:\Program Files\Steam\depotcache\SteamWebHelper.exe" 1612 "/protectFile"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1628
    • C:\Program Files\Steam\depotcache\SteamWebHelper.exe
      "C:\Program Files\Steam\depotcache\SteamWebHelper.exe"
      1⤵
      • Executes dropped EXE
      PID:4052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Steam\depotcache\SteamWebHelper.exe

      Filesize

      918KB

      MD5

      fa8a33fb3bda39a4ca3cea2500c635b8

      SHA1

      47c0e3509a249d0d80716da3afe28b5fe765d225

      SHA256

      cf92e7573d34ef42a341d5562357169b90e0542bd66b00d57c84eff686de0400

      SHA512

      3fc02998288f88ad2b822281830ac328981b42a94ecfef370b67dd4f6f62724eceabadcba635e401a0ddb5dd77011f199c8e4e68b51e3765e3cdaa66177a9c92

    • C:\Program Files\Steam\depotcache\SteamWebHelper.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OrcusWatchdog.exe.log

      Filesize

      425B

      MD5

      4eaca4566b22b01cd3bc115b9b0b2196

      SHA1

      e743e0792c19f71740416e7b3c061d9f1336bf94

      SHA256

      34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

      SHA512

      bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

    • C:\Users\Admin\AppData\Local\Temp\3mccpacl.dll

      Filesize

      76KB

      MD5

      301db0b11b2c554a0348d0ab4dd4f20e

      SHA1

      e927a2cd36c15b0010f8036191ab9f225e3c956c

      SHA256

      94988665b87e95f3401b22043c8deca536658cc3987f31ebc180307b8b95961a

      SHA512

      13707d8d9f9bc25033de56b1bf7f3850f623d493d211283d73ec891003c7f80087a1b1ee76b986577c4fc2836db55698fed34ddcf677d39e7feda26f2a743c2c

    • C:\Users\Admin\AppData\Local\Temp\RES87A0.tmp

      Filesize

      1KB

      MD5

      4f140bea8b2deb5ef2b3c8a2dfd29ccb

      SHA1

      e94cd423bd36d62db41fa614e28f509ffb0f5125

      SHA256

      4abdd5676fc4e247cf7707b3ee8937ce6c8d53f6affc4af3b8c7622ff290b454

      SHA512

      9b5d031075a6b85a11554bec24292e7095b0c2154436cea6be6898f382889ce4c533107ca7cf656a41a29ed7c846f86b483ac3cef12d56af82e25bdcf0bd83bc

    • C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe

      Filesize

      9KB

      MD5

      913967b216326e36a08010fb70f9dba3

      SHA1

      7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

      SHA256

      8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

      SHA512

      c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

    • C:\Users\Admin\AppData\Roaming\Orcus\err_7d661032d74f479fa6fca588ed3ac59f.dat

      Filesize

      1KB

      MD5

      d04e96bab1dbef584fc89a33a702fe03

      SHA1

      79d97681ff0902e12954135a08531add43b04ea7

      SHA256

      009b5edddd836e14efd408b20c70b4f2ae573f451ddebf373d5564b5335b9482

      SHA512

      3527601642ef80b8c5d5fc07261f697663c295934075e60c92812f12492a181e811f534cef243684c0fbb774f4800388db1b99daf5d4ae35d027c948aef4aba9

    • \??\c:\Users\Admin\AppData\Local\Temp\3mccpacl.0.cs

      Filesize

      208KB

      MD5

      5178c6c58c604e27470274448ba74220

      SHA1

      5ed089f74ff7d6f843a16865824f08294a0c8ebb

      SHA256

      dd96cbbfa578a94812a67a6b532eb5e99f498be4fbf234638820d7d3cd394eb8

      SHA512

      615138e14631f40ae8b82ab19e6c033092557b7473d02919af85c558012a44bcb891d048be4ba98fc5d171a0da3178c1624f2075abcda12cc77f49861f5fc17f

    • \??\c:\Users\Admin\AppData\Local\Temp\3mccpacl.cmdline

      Filesize

      349B

      MD5

      978740e975b3b38fb551e4a9351fe162

      SHA1

      13821f0319954452f98d702a80051004c0b25547

      SHA256

      7e72fd6c3b99b7f969a6c4e8289103d2dd5c2bd8ab19b68a01fbc25c9ad74796

      SHA512

      8b70045fcc97d8208b7c40f7e56fbb30e27b8c857e9117b41ae553d98fe6202007f6db0ee2bc1fd7572750acb5e039d6c1f6bf23a6d4084f9d6cb3129b3a9624

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC879F.tmp

      Filesize

      676B

      MD5

      ffea816bdeb3701d41397aa028c0b00c

      SHA1

      5c125f1ed36079171b40643c149abc81f3bc5d55

      SHA256

      f5a3c0fefd8e8f1192fea1d5f107f1c703fa8faf5221dbfab23a21c406af4e8a

      SHA512

      6e98eca431d0c7fb42a1837b358192229a88951cfe20702d901b636978924c69c537bbb1d2301856343618ecf281949c827b3c99006883a383ae534b3e5c338c

    • memory/1612-57-0x000000001C9F0000-0x000000001CA2C000-memory.dmp

      Filesize

      240KB

    • memory/1612-56-0x000000001BAE0000-0x000000001BAF2000-memory.dmp

      Filesize

      72KB

    • memory/1612-52-0x00007FFF9B323000-0x00007FFF9B325000-memory.dmp

      Filesize

      8KB

    • memory/1612-84-0x00007FFF9B323000-0x00007FFF9B325000-memory.dmp

      Filesize

      8KB

    • memory/1612-53-0x0000000000E50000-0x0000000000F3C000-memory.dmp

      Filesize

      944KB

    • memory/1612-64-0x000000001D490000-0x000000001D652000-memory.dmp

      Filesize

      1.8MB

    • memory/1612-65-0x000000001D230000-0x000000001D240000-memory.dmp

      Filesize

      64KB

    • memory/1612-63-0x000000001D100000-0x000000001D118000-memory.dmp

      Filesize

      96KB

    • memory/1612-61-0x000000001CD50000-0x000000001CD9E000-memory.dmp

      Filesize

      312KB

    • memory/1612-58-0x000000001CB40000-0x000000001CC4A000-memory.dmp

      Filesize

      1.0MB

    • memory/1612-55-0x000000001BAA0000-0x000000001BAB2000-memory.dmp

      Filesize

      72KB

    • memory/2800-79-0x0000000000FB0000-0x0000000000FB8000-memory.dmp

      Filesize

      32KB

    • memory/3172-16-0x00007FFF9E0D0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      9.6MB

    • memory/3172-21-0x00007FFF9E0D0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      9.6MB

    • memory/4196-6-0x00007FFF9E0D0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      9.6MB

    • memory/4196-0-0x00007FFF9E385000-0x00007FFF9E386000-memory.dmp

      Filesize

      4KB

    • memory/4196-7-0x000000001C340000-0x000000001C80E000-memory.dmp

      Filesize

      4.8MB

    • memory/4196-34-0x000000001E460000-0x000000001E4D0000-memory.dmp

      Filesize

      448KB

    • memory/4196-33-0x00007FFF9E0D0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      9.6MB

    • memory/4196-32-0x000000001E380000-0x000000001E3C9000-memory.dmp

      Filesize

      292KB

    • memory/4196-54-0x00007FFF9E0D0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      9.6MB

    • memory/4196-30-0x000000001E280000-0x000000001E370000-memory.dmp

      Filesize

      960KB

    • memory/4196-31-0x000000001D4C0000-0x000000001D4DE000-memory.dmp

      Filesize

      120KB

    • memory/4196-35-0x00007FFF9E0D0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      9.6MB

    • memory/4196-29-0x000000001DCC0000-0x000000001E27A000-memory.dmp

      Filesize

      5.7MB

    • memory/4196-5-0x000000001BE60000-0x000000001BE6E000-memory.dmp

      Filesize

      56KB

    • memory/4196-28-0x000000001D360000-0x000000001D3C2000-memory.dmp

      Filesize

      392KB

    • memory/4196-27-0x000000001BC50000-0x000000001BC58000-memory.dmp

      Filesize

      32KB

    • memory/4196-26-0x0000000001880000-0x0000000001888000-memory.dmp

      Filesize

      32KB

    • memory/4196-25-0x000000001BBC0000-0x000000001BBD2000-memory.dmp

      Filesize

      72KB

    • memory/4196-2-0x000000001BC60000-0x000000001BCBC000-memory.dmp

      Filesize

      368KB

    • memory/4196-8-0x000000001C8B0000-0x000000001C94C000-memory.dmp

      Filesize

      624KB

    • memory/4196-1-0x00007FFF9E0D0000-0x00007FFF9EA71000-memory.dmp

      Filesize

      9.6MB

    • memory/4196-23-0x000000001CF70000-0x000000001CF86000-memory.dmp

      Filesize

      88KB