Analysis

  • max time kernel
    77s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 18:03

General

  • Target

    Extra_Moge.rar

  • Size

    2.6MB

  • MD5

    a123deba315e0b3ad1e18b0990d448da

  • SHA1

    ee7a5da1d184004850118d2bf843680d9e4cc187

  • SHA256

    5607ca389a6be944820b7b4bd30406e3ed83a262da29ccfe15be9238a0c174ec

  • SHA512

    6069f82471d0eefc72056344e1f36abfed65a13eebfc1f680ab6d268b91e01315c828ff616d8c97d47c32c4443b118719dc113cee0aaa8b0e848f107d3be63e3

  • SSDEEP

    49152:sKUQ5CPOePuefaUu+JAcHgRpJBUmDIIYxQFN53KyEn/P0bVNure:sKUQ5CP1PdfWXFMiFLtMRe

Malware Config

Extracted

Family

orcus

Botnet

Extra Moge

C2

31.44.184.52:15288

Mutex

sudo_7p2chwc9jshuy0noeroo9kyd53z5e34p

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\generatoruploadsto\wpbase.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Extra_Moge.rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5084
  • C:\Users\Admin\Desktop\Extra Moge.exe
    "C:\Users\Admin\Desktop\Extra Moge.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Users\Admin\AppData\Roaming\generatoruploadsto\wpbase.exe
      "C:\Users\Admin\AppData\Roaming\generatoruploadsto\wpbase.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3424
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
        3⤵
          PID:2784
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
          3⤵
            PID:2408
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1984
      • C:\Users\Admin\AppData\Roaming\generatoruploadsto\wpbase.exe
        C:\Users\Admin\AppData\Roaming\generatoruploadsto\wpbase.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"
          2⤵
            PID:2088
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:1064
        • C:\Users\Admin\AppData\Roaming\generatoruploadsto\wpbase.exe
          C:\Users\Admin\AppData\Roaming\generatoruploadsto\wpbase.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3676
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:2008
        • C:\Users\Admin\AppData\Roaming\generatoruploadsto\wpbase.exe
          C:\Users\Admin\AppData\Roaming\generatoruploadsto\wpbase.exe
          1⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1972
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /4
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4560
        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
          1⤵
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4468
          • C:\Windows\SysWOW64\unregmp2.exe
            "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3292
            • C:\Windows\system32\unregmp2.exe
              "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
              3⤵
              • Enumerates connected drives
              • Suspicious use of AdjustPrivilegeToken
              PID:852
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
          1⤵
          • Drops file in Windows directory
          PID:1428

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\caspol.exe.log

          Filesize

          1KB

          MD5

          0672db2ef13237d5cb85075ff4915942

          SHA1

          ad8b4d3eb5e40791c47d48b22e273486f25f663f

          SHA256

          0a933408890369b5a178f9c30aa93d2c94f425650815cf8e8310de4e90a3b519

          SHA512

          84ad10ba5b695567d33a52f786405a5544aa49d8d23631ba9edf3afa877c5dbd81570d15bcf74bce5d9fb1afad2117d0a4ef913b396c0d923afefe615619c84b

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wpbase.exe.log

          Filesize

          1KB

          MD5

          663b8d5469caa4489d463aa9bc18124f

          SHA1

          e57123a7d969115853ea631a3b33826335025d28

          SHA256

          7b4fa505452f0b8ac74bb31f5a03b13342836318018fb18d224ae2ff11b1a7e8

          SHA512

          45e373295125a629fcc0b19609608d969c9106514918bfac5d6b8e340e407434577b825741b8fa6a043c8f3f5c1a030ba8857da5f4e8ef15a551ce3c5fe03b55

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          64KB

          MD5

          987a07b978cfe12e4ce45e513ef86619

          SHA1

          22eec9a9b2e83ad33bedc59e3205f86590b7d40c

          SHA256

          f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8

          SHA512

          39b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

          Filesize

          1024KB

          MD5

          664533d240d6e6107e9d879ad060e259

          SHA1

          db48d0d90abfbfff8c4a7aff34e61849470d9553

          SHA256

          23eff4a1262b9885c6c6d2ee79c474ac16005a461adc06147c5f729592205104

          SHA512

          0ae87a4f97c7055cfb7925a9dc5ee561fb03a5c7c510470273320345f19b1d6acd63c78a36e6faf0fe7032bf7a43f7c8b1f29357de59a6e5e76ae0f9f26f23e7

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

          Filesize

          68KB

          MD5

          a252ca192635a90bc939b81efc7e2b2b

          SHA1

          024c20fd8421afd71bec9bb38e59783747febd21

          SHA256

          716cef82b9ff2dc7c521766f531d25a3837d3a201ce21c11586cf5da27717d96

          SHA512

          bfddc262d7d427eca649baa3570f84d4a6b09fd82706d7d8c01d443f1ea2d806a4621afead5284380451f5500b4b560fe0b114e693981bf7a8a31fd88d3fd1c1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

          Filesize

          498B

          MD5

          90be2701c8112bebc6bd58a7de19846e

          SHA1

          a95be407036982392e2e684fb9ff6602ecad6f1e

          SHA256

          644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

          SHA512

          d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

          Filesize

          9KB

          MD5

          7050d5ae8acfbe560fa11073fef8185d

          SHA1

          5bc38e77ff06785fe0aec5a345c4ccd15752560e

          SHA256

          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

          SHA512

          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

        • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

          Filesize

          1KB

          MD5

          6a53e43d70562efcb2aeb2f61319692b

          SHA1

          48efbd8ad12f7fd82f9be9adff3acf638482dd94

          SHA256

          b375d5da78b105a9d88cfe1a58a0681af7f87dc4aa135fe8e4aa17ee0c8e6a1f

          SHA512

          d08e5157dd2fd9084e213d15b77b5997a09b7b119ef601850cc8bfd88e400f85357265d2d2aa1bc0782325b801153e071e5b259223109e7ce6fb9f66d991c903

        • C:\Users\Admin\AppData\Roaming\generatoruploadsto\wpbase.exe.config

          Filesize

          357B

          MD5

          a2b76cea3a59fa9af5ea21ff68139c98

          SHA1

          35d76475e6a54c168f536e30206578babff58274

          SHA256

          f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

          SHA512

          b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

        • C:\Users\Admin\Desktop\Extra Moge.exe

          Filesize

          3.0MB

          MD5

          05ed43bd2c5b96fde7765f9353e8fa88

          SHA1

          6ba4dfa2aaddd6052428d53362e093296817d8ca

          SHA256

          c538b2b2c972b5d45a1eac86eca74ddbc71dd6fded8b2f551b11520cccaac041

          SHA512

          1d62abc291709cc972f45b46a2ccf44d1b4b69b275c6cc4923d2ae20b4089888a5a769582794512b2e392e1a9285c381a59df9cfc463930e4cc698917133d1fe

        • memory/1924-35-0x0000000005130000-0x0000000005142000-memory.dmp

          Filesize

          72KB

        • memory/1984-43-0x0000000006B70000-0x0000000006B7A000-memory.dmp

          Filesize

          40KB

        • memory/1984-42-0x0000000006830000-0x0000000006840000-memory.dmp

          Filesize

          64KB

        • memory/1984-41-0x00000000059D0000-0x00000000059E8000-memory.dmp

          Filesize

          96KB

        • memory/3424-28-0x0000000075270000-0x0000000075A20000-memory.dmp

          Filesize

          7.7MB

        • memory/3424-34-0x0000000075270000-0x0000000075A20000-memory.dmp

          Filesize

          7.7MB

        • memory/3424-31-0x0000000006350000-0x00000000063EC000-memory.dmp

          Filesize

          624KB

        • memory/3424-29-0x00000000059E0000-0x0000000005A2E000-memory.dmp

          Filesize

          312KB

        • memory/4468-101-0x0000000007B90000-0x0000000007BA0000-memory.dmp

          Filesize

          64KB

        • memory/4468-100-0x0000000007B90000-0x0000000007BA0000-memory.dmp

          Filesize

          64KB

        • memory/4468-95-0x0000000007B90000-0x0000000007BA0000-memory.dmp

          Filesize

          64KB

        • memory/4468-97-0x0000000007B90000-0x0000000007BA0000-memory.dmp

          Filesize

          64KB

        • memory/4468-98-0x0000000007B90000-0x0000000007BA0000-memory.dmp

          Filesize

          64KB

        • memory/4468-99-0x0000000007B90000-0x0000000007BA0000-memory.dmp

          Filesize

          64KB

        • memory/4468-96-0x0000000007B90000-0x0000000007BA0000-memory.dmp

          Filesize

          64KB

        • memory/4468-94-0x0000000007B90000-0x0000000007BA0000-memory.dmp

          Filesize

          64KB

        • memory/4468-92-0x0000000007830000-0x0000000007840000-memory.dmp

          Filesize

          64KB

        • memory/4560-54-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4560-58-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4560-56-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4560-53-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4560-46-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4560-55-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4560-47-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4560-48-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4560-57-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4560-52-0x000001A1BBE80000-0x000001A1BBE81000-memory.dmp

          Filesize

          4KB

        • memory/4648-8-0x0000000005920000-0x000000000597C000-memory.dmp

          Filesize

          368KB

        • memory/4648-5-0x0000000000CD0000-0x0000000000FCE000-memory.dmp

          Filesize

          3.0MB

        • memory/4648-6-0x00000000032B0000-0x00000000032BE000-memory.dmp

          Filesize

          56KB

        • memory/4648-7-0x0000000075270000-0x0000000075A20000-memory.dmp

          Filesize

          7.7MB

        • memory/4648-9-0x0000000006310000-0x00000000068B4000-memory.dmp

          Filesize

          5.6MB

        • memory/4648-10-0x0000000005D60000-0x0000000005DF2000-memory.dmp

          Filesize

          584KB

        • memory/4648-11-0x0000000006200000-0x0000000006212000-memory.dmp

          Filesize

          72KB

        • memory/4648-27-0x0000000075270000-0x0000000075A20000-memory.dmp

          Filesize

          7.7MB

        • memory/4648-4-0x000000007527E000-0x000000007527F000-memory.dmp

          Filesize

          4KB