Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 00:16
Behavioral task
behavioral1
Sample
die.exe
Resource
win7-20240903-en
General
-
Target
die.exe
-
Size
3.0MB
-
MD5
e0e9f2b50bfa42d18679c8c0b429cddd
-
SHA1
b7f28f076a3d109396380bf85bfb732fa45b7901
-
SHA256
dad9c156fb5562b5ca6a3fc66ce92d0435091a0444448633a8d8d0e7caee6534
-
SHA512
d5cfbe7977b6b0fbdcc1326065976b3cefac3b1f5d0e7b013d96d5967dd8288e5f612f02aca45869a817752331bef98ee6358251b139ce1d6606a2609005e3fa
-
SSDEEP
49152:eNODf7+QSLqZeM9/04zgaMWUljQfJgVXkKAypQxb0/o9JnCmsWncFf0I74gu3KM:egyb2MnjQBEUNypSb6o9JCm
Malware Config
Extracted
orcus
10.211.55.25:10134
0d5c4caa686e4bf1a077d8b4011ad8f2
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus family
-
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/memory/5112-1-0x0000019E20290000-0x0000019E20588000-memory.dmp orcus behavioral2/files/0x000a000000023b89-13.dat orcus -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation die.exe -
Executes dropped EXE 1 IoCs
pid Process 3608 Orcus.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Orcus\Orcus.exe die.exe File created C:\Program Files\Orcus\Orcus.exe.config die.exe File created C:\Program Files\Orcus\Orcus.exe die.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3608 5112 die.exe 83 PID 5112 wrote to memory of 3608 5112 die.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\die.exe"C:\Users\Admin\AppData\Local\Temp\die.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files\Orcus\Orcus.exe"C:\Program Files\Orcus\Orcus.exe"2⤵
- Executes dropped EXE
PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5e0e9f2b50bfa42d18679c8c0b429cddd
SHA1b7f28f076a3d109396380bf85bfb732fa45b7901
SHA256dad9c156fb5562b5ca6a3fc66ce92d0435091a0444448633a8d8d0e7caee6534
SHA512d5cfbe7977b6b0fbdcc1326065976b3cefac3b1f5d0e7b013d96d5967dd8288e5f612f02aca45869a817752331bef98ee6358251b139ce1d6606a2609005e3fa
-
Filesize
349B
MD589817519e9e0b4e703f07e8c55247861
SHA14636de1f6c997a25c3190f73f46a3fd056238d78
SHA256f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13
SHA512b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3