Analysis

  • max time kernel
    98s
  • max time network
    145s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    28-12-2024 18:38

General

  • Target

    OrcusRAT-main/Uninstall.exe

  • Size

    101KB

  • MD5

    4143d3bb52f6ca4aea06d4ae15db611f

  • SHA1

    be6b949ed7be8ce752b7343d56d9c3f96b25a0d3

  • SHA256

    1ff448e9e456f5ad022c2bffb16e0e94eeb6346e8befab695ec0f369349a1a0a

  • SHA512

    2a9befa77e042ea32358c8e3c40e67b3ebf618744634878393a7f7121484371dd62f5d981d0aaef2280bb1a574379271abaf249708ed49b893924fb521cbd2d2

  • SSDEEP

    1536:zO/z6hPABUjO/Zd1716EoLiL4l1HdIaqQPDm0xK8i6f0Zn9PRVW8sW45o7Nkn:kzgjO/Zd1RePDmZ8tf05iW4uM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OrcusRAT-main\Uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\OrcusRAT-main\Uninstall.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
      "C:\Users\Admin\AppData\Local\Temp\Uninstall.exe" end
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.exe

    Filesize

    101KB

    MD5

    4143d3bb52f6ca4aea06d4ae15db611f

    SHA1

    be6b949ed7be8ce752b7343d56d9c3f96b25a0d3

    SHA256

    1ff448e9e456f5ad022c2bffb16e0e94eeb6346e8befab695ec0f369349a1a0a

    SHA512

    2a9befa77e042ea32358c8e3c40e67b3ebf618744634878393a7f7121484371dd62f5d981d0aaef2280bb1a574379271abaf249708ed49b893924fb521cbd2d2

  • memory/3968-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4976-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB