Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 01:14
Behavioral task
behavioral1
Sample
5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe
Resource
win7-20240903-en
General
-
Target
5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe
-
Size
914KB
-
MD5
5b5b175704862b6d7675ad95a503d056
-
SHA1
857b403387f342d97762ff1003caddc256344b70
-
SHA256
5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5
-
SHA512
d8a3e94ae47314133b2a573ba0eec1ffa6272a5e47cc981520f5b4cecb5deeaf1f2e252947eed0ad881fe3cb2a358d7e58d6781b719d47618d1a260941c18dcd
-
SSDEEP
24576:2yW4MROxnFD3gEsYxrZlI0AilFEvxHinbi:2yVMiJ1rZlI0AilFEvxHin
Malware Config
Extracted
orcus
127.0.0.1:10134
536687950add43dc8aa32b2e37b39361
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\uzu.exe
-
reconnect_delay
10000
-
registry_keyname
uzu
-
taskscheduler_taskname
uzu
-
watchdog_path
AppData\uzu.exe
Signatures
-
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000167ea-38.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/files/0x00080000000167ea-38.dat orcus behavioral1/memory/2548-41-0x00000000002F0000-0x00000000003DA000-memory.dmp orcus -
Executes dropped EXE 6 IoCs
pid Process 2760 WindowsInput.exe 2800 WindowsInput.exe 2548 uzu.exe 2536 uzu.exe 236 uzu.exe 1484 uzu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\uzu = "\"C:\\Program Files\\Orcus\\uzu.exe\"" uzu.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Orcus\uzu.exe 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe File opened for modification C:\Program Files\Orcus\uzu.exe 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe File created C:\Program Files\Orcus\uzu.exe.config 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzu.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2548 uzu.exe 2548 uzu.exe 2548 uzu.exe 1484 uzu.exe 1484 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe 2548 uzu.exe 1484 uzu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2548 uzu.exe Token: SeDebugPrivilege 236 uzu.exe Token: SeDebugPrivilege 1484 uzu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 uzu.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2548 uzu.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 uzu.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2408 2988 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe 31 PID 2988 wrote to memory of 2408 2988 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe 31 PID 2988 wrote to memory of 2408 2988 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe 31 PID 2408 wrote to memory of 2832 2408 csc.exe 33 PID 2408 wrote to memory of 2832 2408 csc.exe 33 PID 2408 wrote to memory of 2832 2408 csc.exe 33 PID 2988 wrote to memory of 2760 2988 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe 34 PID 2988 wrote to memory of 2760 2988 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe 34 PID 2988 wrote to memory of 2760 2988 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe 34 PID 2988 wrote to memory of 2548 2988 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe 36 PID 2988 wrote to memory of 2548 2988 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe 36 PID 2988 wrote to memory of 2548 2988 5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe 36 PID 2592 wrote to memory of 2536 2592 taskeng.exe 38 PID 2592 wrote to memory of 2536 2592 taskeng.exe 38 PID 2592 wrote to memory of 2536 2592 taskeng.exe 38 PID 2548 wrote to memory of 236 2548 uzu.exe 39 PID 2548 wrote to memory of 236 2548 uzu.exe 39 PID 2548 wrote to memory of 236 2548 uzu.exe 39 PID 2548 wrote to memory of 236 2548 uzu.exe 39 PID 236 wrote to memory of 1484 236 uzu.exe 40 PID 236 wrote to memory of 1484 236 uzu.exe 40 PID 236 wrote to memory of 1484 236 uzu.exe 40 PID 236 wrote to memory of 1484 236 uzu.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe"C:\Users\Admin\AppData\Local\Temp\5d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\quexkgez.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7CA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD7C9.tmp"3⤵PID:2832
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2760
-
-
C:\Program Files\Orcus\uzu.exe"C:\Program Files\Orcus\uzu.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Roaming\uzu.exe"C:\Users\Admin\AppData\Roaming\uzu.exe" /launchSelfAndExit "C:\Program Files\Orcus\uzu.exe" 2548 /protectFile3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Roaming\uzu.exe"C:\Users\Admin\AppData\Roaming\uzu.exe" /watchProcess "C:\Program Files\Orcus\uzu.exe" 2548 "/protectFile"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:2800
-
C:\Windows\system32\taskeng.exetaskeng.exe {759DFD48-EC6A-4586-BEE2-CD49652771D7} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Orcus\uzu.exe"C:\Program Files\Orcus\uzu.exe"2⤵
- Executes dropped EXE
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914KB
MD55b5b175704862b6d7675ad95a503d056
SHA1857b403387f342d97762ff1003caddc256344b70
SHA2565d9c2aacef0e45162ffd241d73048cf76daac78ce229df9638d363a982ef20b5
SHA512d8a3e94ae47314133b2a573ba0eec1ffa6272a5e47cc981520f5b4cecb5deeaf1f2e252947eed0ad881fe3cb2a358d7e58d6781b719d47618d1a260941c18dcd
-
Filesize
1KB
MD5480de4016feaa513fa063424b2a16cb3
SHA147efd1f761822175a266aa3da6a2b77839df1cf6
SHA256452e635d3d145529ccacb82872eef145b5509bf91ca6c13c8a0c2dd4797ed14d
SHA512ddae6f8363e59451d83641a69b1b4dd03d419fbec024e7d9e4ac11f8c547b57a29966977476738e5c4986ad5f816bba916cc905e1f1a304351ee6a6ca6da0752
-
Filesize
76KB
MD5327dfe15d320d99e2561ae587701aebc
SHA1171946c3d4a43b38da7b17906b4e3d57633f7f90
SHA25643793030d0603a952e09031d775f3934ce4a4070b638a730e6789a1d708a4dfd
SHA5125987a74f7b0bbb4da8858ed96f76ba008767695d019f5d09c931401fb20129e01fe179ce8927578a6c4a0d3f1c1e474ef25785fe08e76e5770d7ca200cb22774
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
676B
MD5ddbfcd571df71d25713f863a6d529350
SHA1ebaee361cb26ce4e52387556cd645b3c06de5c12
SHA2564e37489f498c9f4b43e6aa1ad75bdd533ba465de2ac665106a70720a58a13863
SHA512cdab2f90a77d097f52ab2c1ad149f4056db0d37e70e69a574564d9517881a95fb8d2664000ca5d558523d39260161bdb4d81ed24adfb9bce22e569d2f4d2bf7b
-
Filesize
208KB
MD56011503497b1b9250a05debf9690e52c
SHA1897aea61e9bffc82d7031f1b3da12fb83efc6d82
SHA25608f42b8d57bb61bc8f9628c8a80953b06ca4149d50108083fca6dc26bdd49434
SHA512604c33e82e8b5bb5c54389c2899c81e5482a06e69db08268173a5b4574327ee5de656d312011d07e50a2e398a4c9b0cd79029013f76e05e18cf67ce5a916ffd9
-
Filesize
349B
MD5bfd153db863db967c7f6dfaf72a6188f
SHA19c20f4b2b5fa6e4abc15edd359590a7b8df3b099
SHA256aeb16d68996af67d1b1226cf6dec1f3b42f790e18207ba10c7262cebdc2934d5
SHA512b4584022d527930d4efa68ba8e58c4756ed516b271150904b69218424d44857ebd6e3cd84730d651ee3ef4fa187f2882e69333d611a3f66ccc3fa2acb865f1ed