Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 01:20

General

  • Target

    43e36fd935092b8ac4c90d77c5fc81ef31b0e917aea3e081f246341ff7532ae3.exe

  • Size

    5.0MB

  • MD5

    a846562bd184159534ac6b3d620ca797

  • SHA1

    a6b359a0c8b73437cd9e767dca3c235879efc61d

  • SHA256

    43e36fd935092b8ac4c90d77c5fc81ef31b0e917aea3e081f246341ff7532ae3

  • SHA512

    7a5d8d56d04bab387234e6b7cc09166d57f9e2c3afd45c5fa8d72ac34e61b36bd071c3f9978ada031c5b15262ae9818dd173fa527a6a6b404b2927a13c6a45ad

  • SSDEEP

    12288:roHWszy2LkjKgEX0pq5g7dG1lFlWcYT70pxnnaaoaw1m9cfpCt6IV641rZNrI0A:feu4MROxnF0qrZlI0AilFEvxHiii3

Malware Config

Extracted

Family

orcus

Botnet

лох

C2

0.0.0.0:1268

Mutex

2238131840d049628c048d3c6288c463

Attributes
  • autostart_method

    TaskScheduler

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\43e36fd935092b8ac4c90d77c5fc81ef31b0e917aea3e081f246341ff7532ae3.exe
    "C:\Users\Admin\AppData\Local\Temp\43e36fd935092b8ac4c90d77c5fc81ef31b0e917aea3e081f246341ff7532ae3.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\aqwu8qvr.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB59A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB599.tmp"
        3⤵
          PID:2096
      • C:\Windows\SysWOW64\WindowsInput.exe
        "C:\Windows\SysWOW64\WindowsInput.exe" --install
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        PID:2708
      • C:\Program Files\Orcus\Orcus.exe
        "C:\Program Files\Orcus\Orcus.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2624
    • C:\Windows\SysWOW64\WindowsInput.exe
      "C:\Windows\SysWOW64\WindowsInput.exe"
      1⤵
      • Executes dropped EXE
      PID:2712
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {8DB95D66-56AD-4C39-97A4-C1EAB5FD9CB7} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files\Orcus\Orcus.exe
        "C:\Program Files\Orcus\Orcus.exe"
        2⤵
        • Executes dropped EXE
        PID:2216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Orcus\Orcus.exe

      Filesize

      5.0MB

      MD5

      a846562bd184159534ac6b3d620ca797

      SHA1

      a6b359a0c8b73437cd9e767dca3c235879efc61d

      SHA256

      43e36fd935092b8ac4c90d77c5fc81ef31b0e917aea3e081f246341ff7532ae3

      SHA512

      7a5d8d56d04bab387234e6b7cc09166d57f9e2c3afd45c5fa8d72ac34e61b36bd071c3f9978ada031c5b15262ae9818dd173fa527a6a6b404b2927a13c6a45ad

    • C:\Users\Admin\AppData\Local\Temp\RESB59A.tmp

      Filesize

      1KB

      MD5

      f7fa7cd19960648dbd4cba20ff6754df

      SHA1

      03461e06025911683937fc3582aca7315c39ebf2

      SHA256

      99bde0817e66de05d0a09ae086f8784d895fb0c198396b2d020f47d9ed7b29d5

      SHA512

      4936a27df21307b4b38a4a3276ae01c1d60a981d757c231fba793a4bf3637fd2f94588fc167c2c9fc43115bbb105a8e158d4aeaed3c75a77b77bd64f7f66045b

    • C:\Users\Admin\AppData\Local\Temp\aqwu8qvr.dll

      Filesize

      76KB

      MD5

      f1d60b499461a6e35ff21b11048d7aa2

      SHA1

      3da961f7fa9cfedba1d7becd9498906473dd01d8

      SHA256

      80e76535337b6c442e3602288981025440c6ddaf3010f3a742a86c21b9ea9609

      SHA512

      b5e7bdaad4a640ccd2999d6d7a42ff1b42c8876c99f4e1feb87025cbab1de06730626102206e3c8f7f188aad365e5c2ba84e1d6cfbb062c8b1ce7dcf2e14d599

    • C:\Windows\SysWOW64\WindowsInput.exe

      Filesize

      21KB

      MD5

      e6fcf516d8ed8d0d4427f86e08d0d435

      SHA1

      c7691731583ab7890086635cb7f3e4c22ca5e409

      SHA256

      8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

      SHA512

      c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

    • C:\Windows\SysWOW64\WindowsInput.exe.config

      Filesize

      357B

      MD5

      a2b76cea3a59fa9af5ea21ff68139c98

      SHA1

      35d76475e6a54c168f536e30206578babff58274

      SHA256

      f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

      SHA512

      b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCB599.tmp

      Filesize

      676B

      MD5

      e74ae453671704e7b2b4c80f6efd3fd7

      SHA1

      5f700c2ca842694f61d405f7b298b92a1348e95e

      SHA256

      7bdbfa1d50748b95c265833fdb5c8611ad166384468a7a392c8b8b2c2a136374

      SHA512

      2fd82abbf3b77bdfa38de73b82417f9484903386bec6d89f281bdf389f6f41b67f1c76013869ce616bb3fbc833f26fde3f33afc9603d39d1ec0d014993981129

    • \??\c:\Users\Admin\AppData\Local\Temp\aqwu8qvr.0.cs

      Filesize

      208KB

      MD5

      2b14ae8b54d216abf4d228493ceca44a

      SHA1

      d134351498e4273e9d6391153e35416bc743adef

      SHA256

      4e1cc3da1f7bf92773aae6cffa6d61bfc3e25aead3ad947f6215f93a053f346c

      SHA512

      5761b605add10ae3ef80f3b8706c8241b4e8abe4ac3ce36b7be8a97d08b08da5a72fedd5e976b3c9e1c463613a943ebb5d323e6a075ef6c7c3b1abdc0d53ac05

    • \??\c:\Users\Admin\AppData\Local\Temp\aqwu8qvr.cmdline

      Filesize

      349B

      MD5

      62bd4cef12809b6c5f2ca87911281f87

      SHA1

      1ae243c05323ba94224e00138e3e7b2451f5a2af

      SHA256

      cf68678857681e2c09b829c36c7d585fab1d8d062b0a4d10cbe6547c7ecff50d

      SHA512

      6264e345e9fc90436f1d1d2ca0f8b6f6a82358bbbac1f546da0a45bd474cc2fca844aad24c04b52a68c85bef60e45685a3c8e7f472dc201501f51b42befd6840

    • memory/1696-19-0x0000000000F20000-0x0000000000F36000-memory.dmp

      Filesize

      88KB

    • memory/1696-44-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1696-2-0x0000000000290000-0x000000000029E000-memory.dmp

      Filesize

      56KB

    • memory/1696-4-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1696-0-0x000007FEF58AE000-0x000007FEF58AF000-memory.dmp

      Filesize

      4KB

    • memory/1696-21-0x00000000002C0000-0x00000000002D2000-memory.dmp

      Filesize

      72KB

    • memory/1696-22-0x00000000003D0000-0x00000000003D8000-memory.dmp

      Filesize

      32KB

    • memory/1696-3-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

      Filesize

      9.6MB

    • memory/1696-1-0x0000000000690000-0x00000000006EC000-memory.dmp

      Filesize

      368KB

    • memory/2624-43-0x0000000000C80000-0x0000000000D6A000-memory.dmp

      Filesize

      936KB

    • memory/2624-45-0x0000000002180000-0x00000000021CE000-memory.dmp

      Filesize

      312KB

    • memory/2624-46-0x00000000023C0000-0x00000000023D8000-memory.dmp

      Filesize

      96KB

    • memory/2624-47-0x00000000023E0000-0x00000000023F0000-memory.dmp

      Filesize

      64KB

    • memory/2708-30-0x0000000000AC0000-0x0000000000ACC000-memory.dmp

      Filesize

      48KB

    • memory/2712-34-0x00000000010F0000-0x00000000010FC000-memory.dmp

      Filesize

      48KB

    • memory/3040-17-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

      Filesize

      9.6MB

    • memory/3040-10-0x000007FEF55F0000-0x000007FEF5F8D000-memory.dmp

      Filesize

      9.6MB