Analysis
-
max time kernel
24s -
max time network
26s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06-01-2025 13:26
Static task
static1
1 signatures
General
-
Target
Release.rar
-
Size
20.8MB
-
MD5
5cc2b4b8cb72a593f59bd7673519ebd5
-
SHA1
44a44f9c5030ad8b33a96ea96e661e22dc3e40fa
-
SHA256
7035d5b2091822730ef2550e6ae60358bffdfa7cfe88643251d8c8de1883d40b
-
SHA512
8a5499e9f0b727362ecc7021b9865bcd869f2a5864439d3d99c0564bc8956f630698ae55c23e14470af519131720f6c29cfde82a344623664bedaa18e86912f1
-
SSDEEP
393216:hcVM/SrrTB8wq73zdXKlmxB0OjM1OwjFar0knvmmYhB186lAvtszHz/F3g:QwcTB8wEh6lmxyL5BstEdg
Malware Config
Signatures
-
Orcus family
-
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/memory/3052-7-0x0000000140000000-0x000000014258A000-memory.dmp orcus behavioral1/memory/3052-8-0x0000000140000000-0x000000014258A000-memory.dmp orcus -
Executes dropped EXE 1 IoCs
pid Process 3052 Mozilla Firefox.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3052 Mozilla Firefox.exe 3052 Mozilla Firefox.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3052 Mozilla Firefox.exe 3052 Mozilla Firefox.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4236 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4236 7zFM.exe Token: 35 4236 7zFM.exe Token: SeSecurityPrivilege 4236 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4236 7zFM.exe 4236 7zFM.exe 4236 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3052 Mozilla Firefox.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3004 3052 Mozilla Firefox.exe 94 PID 3052 wrote to memory of 3004 3052 Mozilla Firefox.exe 94 PID 3004 wrote to memory of 2212 3004 cmd.exe 95 PID 3004 wrote to memory of 2212 3004 cmd.exe 95 PID 3004 wrote to memory of 2708 3004 cmd.exe 96 PID 3004 wrote to memory of 2708 3004 cmd.exe 96 PID 3004 wrote to memory of 4456 3004 cmd.exe 97 PID 3004 wrote to memory of 4456 3004 cmd.exe 97
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Release.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4236
-
C:\Users\Admin\Desktop\Mozilla Firefox.exe"C:\Users\Admin\Desktop\Mozilla Firefox.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\Desktop\Mozilla Firefox.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\Desktop\Mozilla Firefox.exe" MD53⤵PID:2212
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2708
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4456
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.1MB
MD50d4d250000aa66c43ffe3048c5821c7a
SHA11b899e72723414e17b32bbaf7c4b15ccd0960ed7
SHA256ee8ef780555e9a805671bfa8775c5cbca91a8fe90d757ca380048c2c33d47b53
SHA512595d9b9b704e08cedb0542569b9c0aeb800ba926918ed35ab0e390fad12ff6ebc48111cbfd1063f89969f3f113f12aa4aed35985998bdeb1aa47774a1991a350