Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 01:08
Behavioral task
behavioral1
Sample
fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe
Resource
win10v2004-20241007-en
General
-
Target
fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe
-
Size
1.2MB
-
MD5
8031ba7c7db878cb3ddd3bf3f9bea80b
-
SHA1
58bff6171067acc0b51c5c61c04de60b036bbb5c
-
SHA256
fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd
-
SHA512
581fa0775baca47a48c4b14f186d085ea8c8f37e52faa516b4bcf5bd4958b3fbde0df8dcd5ed65163a928e58ef1c4ac2938d476920be7fd8e72d90f494658d11
-
SSDEEP
24576:+2A4MROxnFE30rXpCrZlI0AilFEvxHinYhrpo:+2jMiuepCrZlI0AilFEvxHig
Malware Config
Extracted
orcus
127.0.0.1:7436
851c13e9b18e43239c52719c67ae474f
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%programfiles%\Windows Academy\quard.ai
-
reconnect_delay
10000
-
registry_keyname
svchost
-
taskscheduler_taskname
svchost
-
watchdog_path
AppData\quard.ai
Signatures
-
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000016d3b-41.dat family_orcus -
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral1/files/0x0008000000016d3b-41.dat orcus -
Executes dropped EXE 2 IoCs
pid Process 2944 WindowsInput.exe 3044 WindowsInput.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe.config fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Windows Academy\quard.ai fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe File opened for modification C:\Program Files\Windows Academy\quard.ai fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe File created C:\Program Files\Windows Academy\quard.ai.config fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2580 AcroRd32.exe 2580 AcroRd32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1036 1504 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe 30 PID 1504 wrote to memory of 1036 1504 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe 30 PID 1504 wrote to memory of 1036 1504 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe 30 PID 1036 wrote to memory of 2628 1036 csc.exe 32 PID 1036 wrote to memory of 2628 1036 csc.exe 32 PID 1036 wrote to memory of 2628 1036 csc.exe 32 PID 1504 wrote to memory of 2944 1504 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe 34 PID 1504 wrote to memory of 2944 1504 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe 34 PID 1504 wrote to memory of 2944 1504 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe 34 PID 1504 wrote to memory of 2752 1504 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe 36 PID 1504 wrote to memory of 2752 1504 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe 36 PID 1504 wrote to memory of 2752 1504 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe 36 PID 2752 wrote to memory of 2580 2752 rundll32.exe 37 PID 2752 wrote to memory of 2580 2752 rundll32.exe 37 PID 2752 wrote to memory of 2580 2752 rundll32.exe 37 PID 2752 wrote to memory of 2580 2752 rundll32.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe"C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\385j69xi.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA7E4.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA7E3.tmp"3⤵PID:2628
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2944
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Program Files\Windows Academy\quard.ai2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Program Files\Windows Academy\quard.ai"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58031ba7c7db878cb3ddd3bf3f9bea80b
SHA158bff6171067acc0b51c5c61c04de60b036bbb5c
SHA256fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd
SHA512581fa0775baca47a48c4b14f186d085ea8c8f37e52faa516b4bcf5bd4958b3fbde0df8dcd5ed65163a928e58ef1c4ac2938d476920be7fd8e72d90f494658d11
-
Filesize
76KB
MD5314fb31a53cf3155072eaa5f556855d1
SHA11078e8afcb689c8149746dc17a777f9f38643899
SHA2564e893180f5d80406f70c5e9ff8030efd3222add9c4f11efdd61bb540e73b96a8
SHA51253130ed8dcc9613af892348e4ad21f25174bb3bff479ab17a7076e348db5fe93447cb148851fc9e8a3a550ac41f9f46d8edc52f9f13eb11c11c8fff57a695f99
-
Filesize
1KB
MD58d2ecbdbb315d16fda4ca842795b41bc
SHA1ba69c8c2bd2b0622578051bf06f1eee7b3d229bb
SHA256ba1c02bd097ff060af0d8f00c2c2c2958a77462d851bf334eeb8eaf5dc7c02f4
SHA512edd9e46eb01ac13de567a01b156c384cd7c8e7effd16f5b8db84dc50745bbc561e3cb2a3d4bffe73a8455403bec8849f619d3b4cf6c18cf01f3ee223b6c2cf25
-
Filesize
3KB
MD522602bb8bef44a1e91c89246f5778f27
SHA1d4be97b3887a5c5ac04232ba4051d5a7712e9b28
SHA2565c1bfbc42f42c745fe4df6f90ece84c33dc959d097e15729f571111b95b4a445
SHA512f2c45818e6bdfa4efe55c222a5b380afa034d9311d2600c58d6c0f0aacd62bf105b333dfc9230524f93edd603426049d150d6795fe97e50986fef95d8cde6846
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
208KB
MD5c555d9796194c1d9a1310a05a2264e08
SHA182641fc4938680519c3b2e925e05e1001cbd71d7
SHA256ccbb8fd27ab2f27fbbd871793886ff52ff1fbd9117c98b8d190c1a96b67e498a
SHA5120b85ca22878998c7697c589739905b218f9b264a32c8f99a9f9dd73d0687a5de46cc7e851697ee16424baf94d301e411648aa2d061ac149a6d2e06b085e07090
-
Filesize
349B
MD52e58a533d6312c43272e7293d47c2689
SHA19b2c7ab77171c1f0ac8ba5a11be9fe023a6833fd
SHA2569fc7da0f817f04392e19aafe037cb9279c2ac39377885c06cf503827d68e58a7
SHA5120addf9c973ed6708fd4c66263c7ce1c8c18bb340220ef07630c5e338f661ebfea21a04d714dcd56b5b6aefc3eada209d701f171a3f1701f716b620ed26e68aaf
-
Filesize
676B
MD509a8b94c2a3d6093af37df5d31801ce1
SHA1f05901c4932e979a3353b17f23df1e50e88f59ef
SHA256284aa7fa6cd9f7e68e39d611d6c1dd72e4669507778980ccf181fce244b55e7d
SHA5129d9060142dc2047ae36cf0b5619f56c06eabc9027dfb04f17d57944189028872f3b8dbb854ea9a115edb5688d6c7bbfebd74dace699cd917706f5bec82d72e77