Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 16:35
Behavioral task
behavioral1
Sample
Orcus.Administration.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Orcus.Administration.exe
-
Size
16.2MB
-
MD5
a6347e4e194adb6d2a3fae52598d8cdd
-
SHA1
aa06c496c20d6e04142d4a5205a032680a452a0d
-
SHA256
911e3e95efddbae9d1c2f4b04027567c76823116755097b5868b7241c7e30cbc
-
SHA512
2ee24604c0edbc09096e2344ca6c1f74b1067b9aff7f077d0b4e42cd8f51dd1116e98016e34f0a1d951fcdbc8bfed33b1709a9692ba95b3ea3cd84d9ce080922
-
SSDEEP
393216:3pC4606R60B8vYfZ9DfZ9DSK7SftLaeH+:sJOcPLPte
Malware Config
Signatures
-
Orcus family
-
Orcurs Rat Executable 1 IoCs
resource yara_rule behavioral1/memory/2280-1-0x0000000000310000-0x000000000134E000-memory.dmp orcus -
Program crash 1 IoCs
pid pid_target Process procid_target 2160 2280 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Orcus.Administration.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2160 2280 Orcus.Administration.exe 31 PID 2280 wrote to memory of 2160 2280 Orcus.Administration.exe 31 PID 2280 wrote to memory of 2160 2280 Orcus.Administration.exe 31 PID 2280 wrote to memory of 2160 2280 Orcus.Administration.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Orcus.Administration.exe"C:\Users\Admin\AppData\Local\Temp\Orcus.Administration.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 5482⤵
- Program crash
PID:2160
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2992