Analysis
-
max time kernel
40s -
max time network
41s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-10-2024 12:31
Behavioral task
behavioral1
Sample
123.exe
Resource
win10v2004-20241007-en
General
-
Target
123.exe
-
Size
3.0MB
-
MD5
07240cd6ba75c9de0b73c89e44d95b7a
-
SHA1
2081431367f5ecfcd338becc676dfdfc09324329
-
SHA256
a91db08cd243f4a8186026af1a99ea3d5c90ed868fb54c4465b115c8ec20c06d
-
SHA512
56fb58adc517326ecc8bdbade7a36fc14a47c5c1c6aecd6ca27b58c623b502d0c667d9fcb67db46dcdd397d1821b96ed350166451572e54fae2b6897df2d7ca9
-
SSDEEP
49152:snwEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmm8crZEu:snwtODUKTslWp2MpbfGGilIJPypSbxEe
Malware Config
Extracted
orcus
10.9.173.50:1337
c7a29885defe4dd8a65fbed3f3afa030
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus main payload 1 IoCs
Processes:
resource yara_rule C:\Program Files\Orcus\Orcus.exe family_orcus -
Orcurs Rat Executable 2 IoCs
Processes:
resource yara_rule C:\Program Files\Orcus\Orcus.exe orcus behavioral2/memory/2892-40-0x0000000000350000-0x000000000064A000-memory.dmp orcus -
Executes dropped EXE 1 IoCs
Processes:
Orcus.exepid process 2892 Orcus.exe -
Drops file in Program Files directory 4 IoCs
Processes:
123.exeOrcus.exedescription ioc process File created C:\Program Files\Orcus\Orcus.exe 123.exe File opened for modification C:\Program Files\Orcus\Orcus.exe 123.exe File created C:\Program Files\Orcus\Orcus.exe.config 123.exe File opened for modification C:\Program Files\Orcus\Orcus.exe Orcus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Orcus.exepid process 2892 Orcus.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Orcus.exepid process 2892 Orcus.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
123.execsc.exeOrcus.execmd.exedescription pid process target process PID 4064 wrote to memory of 2132 4064 123.exe csc.exe PID 4064 wrote to memory of 2132 4064 123.exe csc.exe PID 2132 wrote to memory of 2060 2132 csc.exe cvtres.exe PID 2132 wrote to memory of 2060 2132 csc.exe cvtres.exe PID 4064 wrote to memory of 2892 4064 123.exe Orcus.exe PID 4064 wrote to memory of 2892 4064 123.exe Orcus.exe PID 2892 wrote to memory of 3768 2892 Orcus.exe cmd.exe PID 2892 wrote to memory of 3768 2892 Orcus.exe cmd.exe PID 3768 wrote to memory of 1848 3768 cmd.exe PING.EXE PID 3768 wrote to memory of 1848 3768 cmd.exe PING.EXE PID 3768 wrote to memory of 2780 3768 cmd.exe cmd.exe PID 3768 wrote to memory of 2780 3768 cmd.exe cmd.exe PID 3768 wrote to memory of 5000 3768 cmd.exe cmd.exe PID 3768 wrote to memory of 5000 3768 cmd.exe cmd.exe PID 3768 wrote to memory of 3008 3768 cmd.exe cmd.exe PID 3768 wrote to memory of 3008 3768 cmd.exe cmd.exe PID 3768 wrote to memory of 1060 3768 cmd.exe cmd.exe PID 3768 wrote to memory of 1060 3768 cmd.exe cmd.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\123.exe"C:\Users\Admin\AppData\Local\Temp\123.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b9fmma8z.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBE50.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCBE4F.tmp"3⤵PID:2060
-
-
-
C:\Program Files\Orcus\Orcus.exe"C:\Program Files\Orcus\Orcus.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\{ccd0917d-3058-4d99-97a3-94c07f603958}.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\system32\PING.EXEping 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo j "4⤵PID:2780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Program Files\Orcus\Orcus.exe""4⤵PID:5000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo j "4⤵PID:3008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del C:\Users\Admin\AppData\Local\Temp\{ccd0917d-3058-4d99-97a3-94c07f603958}.bat"4⤵PID:1060
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD507240cd6ba75c9de0b73c89e44d95b7a
SHA12081431367f5ecfcd338becc676dfdfc09324329
SHA256a91db08cd243f4a8186026af1a99ea3d5c90ed868fb54c4465b115c8ec20c06d
SHA51256fb58adc517326ecc8bdbade7a36fc14a47c5c1c6aecd6ca27b58c623b502d0c667d9fcb67db46dcdd397d1821b96ed350166451572e54fae2b6897df2d7ca9
-
Filesize
349B
MD589817519e9e0b4e703f07e8c55247861
SHA14636de1f6c997a25c3190f73f46a3fd056238d78
SHA256f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13
SHA512b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3
-
Filesize
1KB
MD51c792f65be92f30f05d5829f311e6095
SHA147cf1d733e298d13188d469a2a46c4dc57f3d845
SHA2567e65930163c95e1c519e78ee49f1acef985e236018a7ccd9a9cdbf647a04e274
SHA51238ab2ae33519be8600bb0888e84633b7b47afae7159a899b5180b7bd6293ce67281fee5b9475482be7c8a89647a16ff2b877b967f2a4d57d63e391ddd96807c7
-
Filesize
76KB
MD5068229cc334b2d24b3d0e736447630a3
SHA10f741b52df59646ba7d754e875b3aa4d8ebcc947
SHA256b18301d23c4f796e6166b500da2746bbf04d7ce4506583cb5ee927b6d28c8daf
SHA512b5d849fb2b5a6e430863a2a36c33de72d87546ed18097af7b2c7c731addaef9d8d4a41b55bf21fa49f36243b17078aa7d25dbc686a176ef0a3ee873fffbf6244
-
Filesize
171B
MD55f4b358b60ff8baf84ea9f9f752e0617
SHA1927aa4931bcf6cde61781e8302f126c00b2817a3
SHA25614f0909795480bca4f72a6c7afa752706380fdcc4d6a5c11e55ca906e2e1e512
SHA512aff993e7d1f89220588eaeff0e56c91ff2d90fdafdf2b326189c85d19d7e8ba3654ff6a059dbf3eccedd0270f3ced9f2c9919eeacf2ffce171c4bf49dcc912e8
-
Filesize
676B
MD554a6f0d71dd61591eba6a14e56225091
SHA11443c80c2c0dc9ea228e4f1d84832295761df789
SHA25677e6bf3c57faafe596772e8f08ee88fca8768b3f6421244399fac6250435c981
SHA5129f7f288f9e4cb0a2ecc7025dfc198cbbe2717a4fb72a5742aff56d8ea607d00b7c236ed31648d13307e9c84742aeb834b2afaedef7b5074ec061d6bea04c42e6
-
Filesize
208KB
MD50b5a4a578a040a419fac6f4dd71481af
SHA18cdb8c880e04275a3fc5e08d6c091f7835266e0f
SHA25686f9e73fb057a0c670596f547b4f344bdca0de3624d87db31da4e1581b1e7ce3
SHA5126f8ec43c2262db7ab31e9c266231dd9ee32a548a45dc06c7e39c974ca57307f5c8657689f6ff02f837123d01c8c5447a6891f6750f5debbddd258cc0b45d541c
-
Filesize
349B
MD5aa711ab76a306140116157329780b315
SHA1f9c4fedc1911ac369dbe7e64a955698d3eb7573c
SHA256c9b80a47c747f41961bebd2c7cec0be6b008df965ac8a6a3872b0f3b91fc71d6
SHA51252c757a9ca027bc38b8cfa6b34b083aa0e97989910744f492ecd66b8e714755dc5c3365eec6536cb45ce2b1a93beb8f9539799b7e00c378876d7cdab607f2caf