d:\Data\cPp\Deception\Deception\Release\Deception.pdb
Behavioral task
behavioral1
Sample
84219374f172ea99bebe9fd7dc98710725d4db38949cf1031acb13e135f0d530.exe
Resource
win7-20240903-en
General
-
Target
84219374f172ea99bebe9fd7dc98710725d4db38949cf1031acb13e135f0d530
-
Size
940KB
-
MD5
349136bb636b9cfb47d8933041cf72c1
-
SHA1
eddfa1e216a0a72333b0ce79046d72f010063af8
-
SHA256
84219374f172ea99bebe9fd7dc98710725d4db38949cf1031acb13e135f0d530
-
SHA512
b0f7ba45275b40a42e74bdc684b74409f444f4ff9a63e2f63000ed4b1f6aad1f432bc60f5e69e739db7c44718499d2c263e834c25f6cf852e8a94659a5dc1953
-
SSDEEP
24576:vsz3s4MROxnF9LqrZlI0AilFEvxHi8b8om:0z3/Mi7qrZlI0AilFEvxHi7
Malware Config
Signatures
-
Orcurs Rat Executable 1 IoCs
resource yara_rule sample orcus -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule sample family_orcus -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84219374f172ea99bebe9fd7dc98710725d4db38949cf1031acb13e135f0d530
Files
-
84219374f172ea99bebe9fd7dc98710725d4db38949cf1031acb13e135f0d530.exe windows:4 windows x86 arch:x86
767b0e1db58672d1cffbbedefc10d095
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetWindowsDirectoryA
GetTempPathA
FreeResource
CloseHandle
WriteFile
SizeofResource
CreateFileA
LockResource
LoadResource
FindResourceA
SetFileTime
SetFileAttributesA
GetFileTime
GetSystemDirectoryA
ReadFile
CopyFileA
Sleep
DeleteFileA
CreateThread
GetModuleFileNameA
SetLastError
OpenProcess
GetPriorityClass
ResumeThread
HeapSize
LCMapStringW
LCMapStringA
GetLocalTime
LoadLibraryA
GetModuleHandleA
GetProcAddress
WaitForSingleObject
CreateProcessA
WriteProcessMemory
GetSystemInfo
VirtualProtect
ExitProcess
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
GetLocaleInfoA
CreateRemoteThread
user32
GetParent
GetWindowThreadProcessId
ShowWindow
MessageBoxA
GetWindow
FindWindowA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegSetValueExA
shell32
ShellExecuteA
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 904KB - Virtual size: 903KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ