Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/01/2025, 10:01

General

  • Target

    UZI.exe

  • Size

    1.1MB

  • MD5

    53438f13efec4841b7182bdcebc4410b

  • SHA1

    9483c1614dbf6e133c92a1d355a017eff4eeed2b

  • SHA256

    6e5aa4eae614ca049a1b2c8b803e6610b2b176a8e009ddad8df221c5899bb0ac

  • SHA512

    363eb26746cc536a351f176d17205305ac84c18f151d608eb3f6543bed9db9e6d6104b90babde74d780873ef092bb2628493b5486f4521d0f9e8d26b5b33de8b

  • SSDEEP

    24576:Fam4MROxnF4HrrcI0AilFEvxHPRZoo1jXbh:FOMiaHrrcI0AilFEvxHPjr

Malware Config

Extracted

Family

orcus

C2

195.88.218.126:10134

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcurs Rat Executable 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 62 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:640
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:468
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:696
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:988
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:444
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:908
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1060
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1072
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1144
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                        PID:1196
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                        1⤵
                          PID:1304
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1316
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1364
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                              1⤵
                                PID:1448
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                    PID:3008
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                  1⤵
                                  • Indicator Removal: Clear Windows Event Logs
                                  PID:1552
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1624
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                    1⤵
                                      PID:1636
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k NetworkService -p
                                      1⤵
                                        PID:1688
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1720
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1776
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1840
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                              1⤵
                                                PID:1860
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1912
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1920
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:2004
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:1832
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2060
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2204
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                            1⤵
                                                              PID:2392
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2532
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                1⤵
                                                                  PID:2540
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                  1⤵
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:2576
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                  1⤵
                                                                    PID:2672
                                                                  • C:\Windows\sysmon.exe
                                                                    C:\Windows\sysmon.exe
                                                                    1⤵
                                                                      PID:2680
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                      1⤵
                                                                        PID:2724
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2736
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                        1⤵
                                                                          PID:2764
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:3064
                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                            1⤵
                                                                              PID:3096
                                                                            • C:\Windows\Explorer.EXE
                                                                              C:\Windows\Explorer.EXE
                                                                              1⤵
                                                                                PID:3224
                                                                                • C:\Users\Admin\AppData\Local\Temp\UZI.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\UZI.exe"
                                                                                  2⤵
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:4780
                                                                                  • C:\Users\Admin\AppData\Local\Temp\n3eeylod.ptu.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\n3eeylod.ptu.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:4888
                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                    "SCHTASKS.exe" /create /tn "MasonUZI.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\UZI.exe'" /sc onlogon /rl HIGHEST
                                                                                    3⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:4832
                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                    "SCHTASKS.exe" /create /tn "MasonUZI.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\UZI.exe'" /sc onlogon /rl HIGHEST
                                                                                    3⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:340
                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      4⤵
                                                                                        PID:1976
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                  1⤵
                                                                                    PID:3392
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                    1⤵
                                                                                      PID:3436
                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                      1⤵
                                                                                        PID:3792
                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                        1⤵
                                                                                          PID:3872
                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                          1⤵
                                                                                            PID:3940
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                            1⤵
                                                                                              PID:3964
                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                              C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                              1⤵
                                                                                                PID:4292
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                1⤵
                                                                                                  PID:4352
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                  1⤵
                                                                                                    PID:4220
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                    1⤵
                                                                                                      PID:4992
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                      1⤵
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:784
                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                      1⤵
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:2144
                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:4768
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                        1⤵
                                                                                                          PID:1632
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                          1⤵
                                                                                                            PID:1980
                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                            1⤵
                                                                                                              PID:4544
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                              1⤵
                                                                                                                PID:2348
                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                1⤵
                                                                                                                • Checks processor information in registry
                                                                                                                • NTFS ADS
                                                                                                                PID:1812

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\n3eeylod.ptu.exe

                                                                                                                Filesize

                                                                                                                161KB

                                                                                                                MD5

                                                                                                                94f1ab3a068f83b32639579ec9c5d025

                                                                                                                SHA1

                                                                                                                38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                SHA256

                                                                                                                879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                SHA512

                                                                                                                44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                              • memory/444-40-0x000001CFE41A0000-0x000001CFE41CB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/444-288-0x000001CFE41A0000-0x000001CFE41CB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/444-37-0x000001CFE41A0000-0x000001CFE41CB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/444-38-0x00007FF815C10000-0x00007FF815C20000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/468-25-0x0000024178000000-0x000002417802B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/468-26-0x00007FF815C10000-0x00007FF815C20000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/468-31-0x0000024178000000-0x000002417802B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/640-29-0x00007FF855C24000-0x00007FF855C25000-memory.dmp

                                                                                                                Filesize

                                                                                                                4KB

                                                                                                              • memory/640-15-0x000001CF38C00000-0x000001CF38C25000-memory.dmp

                                                                                                                Filesize

                                                                                                                148KB

                                                                                                              • memory/640-28-0x000001CF38C30000-0x000001CF38C5B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/640-17-0x00007FF815C10000-0x00007FF815C20000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/640-16-0x000001CF38C30000-0x000001CF38C5B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/696-20-0x0000028ED4FD0000-0x0000028ED4FFB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/696-30-0x0000028ED4FD0000-0x0000028ED4FFB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/696-21-0x00007FF815C10000-0x00007FF815C20000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/908-81-0x00000210EF590000-0x00000210EF5BB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/908-82-0x00007FF815C10000-0x00007FF815C20000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/988-32-0x00000277BA4D0000-0x00000277BA4FB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/988-33-0x00007FF815C10000-0x00007FF815C20000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/988-283-0x00000277BA4D0000-0x00000277BA4FB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/988-35-0x00000277BA4D0000-0x00000277BA4FB000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/3224-77-0x0000000002E20000-0x0000000002E4B000-memory.dmp

                                                                                                                Filesize

                                                                                                                172KB

                                                                                                              • memory/3224-78-0x00007FF815C10000-0x00007FF815C20000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/4780-279-0x000002406C2F0000-0x000002406C308000-memory.dmp

                                                                                                                Filesize

                                                                                                                96KB

                                                                                                              • memory/4780-278-0x000002406C2E0000-0x000002406C2F2000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/4780-296-0x000002406B4F0000-0x000002406B500000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/4780-0-0x00007FF834CF3000-0x00007FF834CF5000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/4780-295-0x000002406E2D0000-0x000002406E492000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.8MB

                                                                                                              • memory/4780-294-0x000002406C740000-0x000002406C84A000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.0MB

                                                                                                              • memory/4780-272-0x000002406B700000-0x000002406B7E8000-memory.dmp

                                                                                                                Filesize

                                                                                                                928KB

                                                                                                              • memory/4780-275-0x000002406B4F0000-0x000002406B500000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/4780-293-0x000002406C5F0000-0x000002406C62C000-memory.dmp

                                                                                                                Filesize

                                                                                                                240KB

                                                                                                              • memory/4780-276-0x000002406B7F0000-0x000002406B84C000-memory.dmp

                                                                                                                Filesize

                                                                                                                368KB

                                                                                                              • memory/4780-277-0x000002406B4E0000-0x000002406B4EE000-memory.dmp

                                                                                                                Filesize

                                                                                                                56KB

                                                                                                              • memory/4780-2-0x000002406AB20000-0x000002406AB4C000-memory.dmp

                                                                                                                Filesize

                                                                                                                176KB

                                                                                                              • memory/4780-292-0x000002406C590000-0x000002406C5A2000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/4780-280-0x000002406C2D0000-0x000002406C2E0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/4780-150-0x00007FF834CF3000-0x00007FF834CF5000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/4780-1-0x0000024068D20000-0x0000024068E3A000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.1MB

                                                                                                              • memory/4888-12-0x00007FF854B00000-0x00007FF854BBD000-memory.dmp

                                                                                                                Filesize

                                                                                                                756KB

                                                                                                              • memory/4888-274-0x00007FF855B80000-0x00007FF855D89000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/4888-14-0x00007FF855B80000-0x00007FF855D89000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                              • memory/4888-13-0x00007FF855B81000-0x00007FF855CAA000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.2MB

                                                                                                              • memory/4888-11-0x00007FF855B80000-0x00007FF855D89000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.0MB