Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 01:08

General

  • Target

    0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34.exe

  • Size

    916KB

  • MD5

    4126e7553a9d344cec8d0c689b96e7a0

  • SHA1

    34f3aadb036869a07cf62df102a0fb89d675ee5a

  • SHA256

    0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34

  • SHA512

    66c723e19830eddb168a169e9d1d78f386415d72a0d43f71a21edae4982f12c8983f204510d3170024db250db755debc03dd6da86b151fe87d9d3a2e9eed52ea

  • SSDEEP

    12288:n5STYf+qnR7Fkxh7dG1lFlWcYT70pxnnaaoawhmL9kgWrprZNrI0AilFEvxHvBMO:xhg4MROxnF/1irZlI0AilFEvxHiFo

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:21726

Mutex

0bc32d4160a24c468470912a114f3da6

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\SYS\Svchost.exe

  • reconnect_delay

    10000

  • registry_keyname

    Discord

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34.exe
    "C:\Users\Admin\AppData\Local\Temp\0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kni7ahne.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD29.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCAD28.tmp"
        3⤵
          PID:2348
      • C:\Windows\SysWOW64\WindowsInput.exe
        "C:\Windows\SysWOW64\WindowsInput.exe" --install
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        PID:5084
      • C:\Program Files\SYS\Svchost.exe
        "C:\Program Files\SYS\Svchost.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4796
    • C:\Windows\SysWOW64\WindowsInput.exe
      "C:\Windows\SysWOW64\WindowsInput.exe"
      1⤵
      • Executes dropped EXE
      PID:4336

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\SYS\Svchost.exe

      Filesize

      916KB

      MD5

      4126e7553a9d344cec8d0c689b96e7a0

      SHA1

      34f3aadb036869a07cf62df102a0fb89d675ee5a

      SHA256

      0d14e312f210c6b6c20d622d1f3b8c9f1291ac655e451ebc41c5366caec11d34

      SHA512

      66c723e19830eddb168a169e9d1d78f386415d72a0d43f71a21edae4982f12c8983f204510d3170024db250db755debc03dd6da86b151fe87d9d3a2e9eed52ea

    • C:\Users\Admin\AppData\Local\Temp\RESAD29.tmp

      Filesize

      1KB

      MD5

      0b20fe7eb55a4c4c66f52f0cfc5a5b3c

      SHA1

      01e0702835368ade7b58363e46eb363667b7d06b

      SHA256

      2016a51b41426858774efb3018815670d3102401ede3f38ef9ac46c89a690157

      SHA512

      66c69cbfbb9207d9d9c9b7368b0ef251cd2a780f8594e16fcedd2c990994315e205ba38a0ef448484e1be8c856bd47e1af0c0e67966b041775463c18606ca44b

    • C:\Users\Admin\AppData\Local\Temp\kni7ahne.dll

      Filesize

      76KB

      MD5

      043b1b2e55caecabbeaba35e277620e9

      SHA1

      399785686b45c1159563766a99ebcc7ae4de22e6

      SHA256

      e514966fccf88ea2661d255c1eb1e7a54ec9fec59b05f70c485af5562aef9884

      SHA512

      8ae10756d4b122bf7d99f1108352ce46350b914e25694a077ce04aace98ae6bb1684cca9c746a2584cf68e7365b5e9b58e5ff7cf8bd36b33dcd26ea0de21989e

    • C:\Windows\SysWOW64\WindowsInput.exe

      Filesize

      21KB

      MD5

      e6fcf516d8ed8d0d4427f86e08d0d435

      SHA1

      c7691731583ab7890086635cb7f3e4c22ca5e409

      SHA256

      8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

      SHA512

      c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

    • C:\Windows\SysWOW64\WindowsInput.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCAD28.tmp

      Filesize

      676B

      MD5

      d9df8fcf01969848167f39d47a281aa2

      SHA1

      d9440a93a467201eafc0ddd20bf80367e702199a

      SHA256

      9823d4d223d8cb75395584c8662e32a246cba810f8eae26c3881ff735e6255b1

      SHA512

      2cee88af0e35788f557647f1891df488512ac52c54f964a477934705f68d9c7caf854a18ceb4a5d503fdf2846de78ff9835b14be63708db66071779d740fd485

    • \??\c:\Users\Admin\AppData\Local\Temp\kni7ahne.0.cs

      Filesize

      208KB

      MD5

      3a3d206f75cc5138c07a47317f7071b1

      SHA1

      c949f16113d1e9d99598b321e8deaf215ebabeac

      SHA256

      1c9e6a537e59ec24d53047c6d07937bccc76cc198eda311d559e4b7ff969eb40

      SHA512

      6b795a0920d87241efb74621f98ca5ac52408cb73dfbf1ab6318a765197843a2ca301b8bff0d893662065c9815e253feae801846a1bd1b30a62087cbcabe1a9d

    • \??\c:\Users\Admin\AppData\Local\Temp\kni7ahne.cmdline

      Filesize

      349B

      MD5

      8db733946497879177d8665016eeb2ac

      SHA1

      8692b3948c2a5ca358844edbe1daf9a426a0e4fc

      SHA256

      b561982c09684da613dbe9a23484f00a1411fd09b18dee01ff9254713759bc8e

      SHA512

      70916c8ddb0a370a6289f3a66c36835473a60c82dd5d6c4c043389c479594c78b5ca058bfc48d5711c4b5a288af0305dbea470c1bfff2f3669dfefdc4c59bc36

    • memory/540-21-0x00007FFA96EE0000-0x00007FFA97881000-memory.dmp

      Filesize

      9.6MB

    • memory/540-14-0x00007FFA96EE0000-0x00007FFA97881000-memory.dmp

      Filesize

      9.6MB

    • memory/692-26-0x00000000012B0000-0x00000000012B8000-memory.dmp

      Filesize

      32KB

    • memory/692-8-0x00007FFA96EE0000-0x00007FFA97881000-memory.dmp

      Filesize

      9.6MB

    • memory/692-23-0x000000001CBB0000-0x000000001CBC6000-memory.dmp

      Filesize

      88KB

    • memory/692-6-0x000000001BFA0000-0x000000001C46E000-memory.dmp

      Filesize

      4.8MB

    • memory/692-25-0x00000000012D0000-0x00000000012E2000-memory.dmp

      Filesize

      72KB

    • memory/692-0-0x00007FFA97195000-0x00007FFA97196000-memory.dmp

      Filesize

      4KB

    • memory/692-27-0x000000001CF30000-0x000000001CF50000-memory.dmp

      Filesize

      128KB

    • memory/692-5-0x000000001B9A0000-0x000000001B9AE000-memory.dmp

      Filesize

      56KB

    • memory/692-2-0x000000001B8B0000-0x000000001B90C000-memory.dmp

      Filesize

      368KB

    • memory/692-65-0x00007FFA96EE0000-0x00007FFA97881000-memory.dmp

      Filesize

      9.6MB

    • memory/692-7-0x000000001C510000-0x000000001C5AC000-memory.dmp

      Filesize

      624KB

    • memory/692-1-0x00007FFA96EE0000-0x00007FFA97881000-memory.dmp

      Filesize

      9.6MB

    • memory/4336-49-0x000000001A100000-0x000000001A20A000-memory.dmp

      Filesize

      1.0MB

    • memory/4796-64-0x0000000000C10000-0x0000000000CFC000-memory.dmp

      Filesize

      944KB

    • memory/4796-66-0x000000001D110000-0x000000001D122000-memory.dmp

      Filesize

      72KB

    • memory/4796-67-0x000000001D120000-0x000000001D16E000-memory.dmp

      Filesize

      312KB

    • memory/4796-68-0x000000001D170000-0x000000001D188000-memory.dmp

      Filesize

      96KB

    • memory/4796-69-0x000000001D290000-0x000000001D2A0000-memory.dmp

      Filesize

      64KB

    • memory/5084-44-0x0000000002ED0000-0x0000000002F0C000-memory.dmp

      Filesize

      240KB

    • memory/5084-43-0x0000000002E70000-0x0000000002E82000-memory.dmp

      Filesize

      72KB

    • memory/5084-42-0x0000000000CA0000-0x0000000000CAC000-memory.dmp

      Filesize

      48KB

    • memory/5084-41-0x00007FFA93D23000-0x00007FFA93D25000-memory.dmp

      Filesize

      8KB