Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2025, 13:46

General

  • Target

    ya nigga.exe

  • Size

    903KB

  • MD5

    6b668db74b3f822a59529f10d11a0d39

  • SHA1

    35cf32c26a2d3e1ad7b9f125db35b7987d8364bb

  • SHA256

    562a88dd72bb03a4e99227652424e2f96b5172007a4331e9f208c4bf5b4b3ef3

  • SHA512

    e1ad8e33a20bd799841f41142e619f5b5ba579d075073ed255e79e20f07a3835167a023328f48a4319cb132f848b0a35e67da69841f4b10567e85eccf4829fec

  • SSDEEP

    12288:90XCGPSX0zbyD+ndg+QCImGYUl9qyzlkE2kUNCBfm9rR6W7BaepBwzo7dG1lFlWi:6am4MROxnF4HrrcI0AilFEvxHPmoo1

Malware Config

Extracted

Family

orcus

C2

79.163.232.122:10134

Mutex

75ca5c5640914a7395cf7a069406fd0e

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcurs Rat Executable 1 IoCs
  • Loads dropped DLL 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ya nigga.exe
    "C:\Users\Admin\AppData\Local\Temp\ya nigga.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:4428
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2376
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\InstallMount.vbe"
      1⤵
        PID:892

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Orcus\lib_75ca5c5640914a7395cf7a069406fd0e\SharpDX.DXGI.dll

        Filesize

        125KB

        MD5

        2b44c70c49b70d797fbb748158b5d9bb

        SHA1

        93e00e6527e461c45c7868d14cf05c007e478081

        SHA256

        3762d43c83af69cd38c9341a927ca6bd00f6bae8217c874d693047d6df4705bf

        SHA512

        faced62f6ecbfa2ee0d7a47e300302d23030d1f28758cbe9c442e9d8d4f8359c59088aa6237a28103e43d248c8efc7eeaf2c184028701b752df6cce92d6854d0

      • C:\Users\Admin\AppData\Roaming\Orcus\lib_75ca5c5640914a7395cf7a069406fd0e\SharpDX.Direct3D11.dll

        Filesize

        271KB

        MD5

        98eb5ba5871acdeaebf3a3b0f64be449

        SHA1

        c965284f60ef789b00b10b3df60ee682b4497de3

        SHA256

        d7617d926648849cbfef450b8f48e458ee52e2793fb2251a30094b778aa8848c

        SHA512

        a60025e304713d333e4b82b2d0be28087950688b049c98d2db5910c00b8d45b92e16d25ac8a58ff1318de019de3a9a00c7cbf8a6ad4b5bb1cb175dafa1b9bea2

      • C:\Users\Admin\AppData\Roaming\Orcus\lib_75ca5c5640914a7395cf7a069406fd0e\SharpDX.Direct3D9.dll

        Filesize

        338KB

        MD5

        934da0e49208d0881c44fe19d5033840

        SHA1

        a19c5a822e82e41752a08d3bd9110db19a8a5016

        SHA256

        02da4af8cd4a8de19d816000caaae885e676b9e52f136ff071a279c2b8ad34c7

        SHA512

        de62f629c2299b50af62893244a28895d63b78138c8632449984306f45de16bd01076eadbb0d75a700215e970c1df731e202ea640236c0f0da6ed15146193b59

      • C:\Users\Admin\AppData\Roaming\Orcus\lib_75ca5c5640914a7395cf7a069406fd0e\SharpDX.dll

        Filesize

        247KB

        MD5

        ffb4b61cc11bec6d48226027c2c26704

        SHA1

        fa8b9e344accbdc4dffa9b5d821d23f0716da29e

        SHA256

        061542ff3fb36039b7bbffdf3e07b66176b264c1dfd834a14b09c08620717303

        SHA512

        48aa6130bf1f5bd6de19256bbdf754c0158b43dd122cec47bb801a7a7b56f2da268bfdec24d135621764a23278ead3dcc35911a057e2dfa55a348bae8ef7b8a9

      • C:\Users\Admin\AppData\Roaming\Orcus\lib_75ca5c5640914a7395cf7a069406fd0e\TurboJpegWrapper.dll

        Filesize

        1.3MB

        MD5

        ac6acc235ebef6374bed71b37e322874

        SHA1

        a267baad59cd7352167636836bad4b971fcd6b6b

        SHA256

        047b042cebf4c851f0d14f85f16ce952f03e48c20362d4ed9390875d4900fe96

        SHA512

        72ac8b8c8f27264cc261297c325d14a0be2084d007c6132ab8402d87f912fe9189cb074db11625d9f86d29a6188f22a89e58ae45c9131fac4522473567017081

      • C:\Users\Admin\AppData\Roaming\Orcus\lib_75ca5c5640914a7395cf7a069406fd0e\x86\turbojpeg.dll

        Filesize

        646KB

        MD5

        82898ed19da89d7d44e280a3ced95e9b

        SHA1

        eec0af5733c642eac8c5e08479f462d1ec1ed4db

        SHA256

        5f4b9f8360764d75c9faaecd94f6d200c54611b33064cd216e363d973dae7c29

        SHA512

        ee7b884ce7d7366ee28fb17721b6c89bd4eba8fb373cdbb483e26a4ed7a74ab5db847513c54704d753d77a7e18b1fb9fee90ed6bbc0540bff702273fda36b682

      • memory/4428-8-0x0000000005F70000-0x0000000005F88000-memory.dmp

        Filesize

        96KB

      • memory/4428-21-0x00000000749D0000-0x0000000075180000-memory.dmp

        Filesize

        7.7MB

      • memory/4428-0-0x00000000749DE000-0x00000000749DF000-memory.dmp

        Filesize

        4KB

      • memory/4428-9-0x0000000005FD0000-0x0000000005FE0000-memory.dmp

        Filesize

        64KB

      • memory/4428-10-0x00000000068C0000-0x00000000068CA000-memory.dmp

        Filesize

        40KB

      • memory/4428-13-0x0000000007250000-0x00000000072B6000-memory.dmp

        Filesize

        408KB

      • memory/4428-14-0x00000000078E0000-0x0000000007EF8000-memory.dmp

        Filesize

        6.1MB

      • memory/4428-15-0x00000000072F0000-0x0000000007302000-memory.dmp

        Filesize

        72KB

      • memory/4428-16-0x0000000007350000-0x000000000738C000-memory.dmp

        Filesize

        240KB

      • memory/4428-17-0x00000000073A0000-0x00000000073EC000-memory.dmp

        Filesize

        304KB

      • memory/4428-18-0x0000000007520000-0x000000000762A000-memory.dmp

        Filesize

        1.0MB

      • memory/4428-19-0x0000000007F00000-0x00000000080C2000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-20-0x00000000749DE000-0x00000000749DF000-memory.dmp

        Filesize

        4KB

      • memory/4428-7-0x0000000005AC0000-0x0000000005AD2000-memory.dmp

        Filesize

        72KB

      • memory/4428-6-0x0000000005AD0000-0x0000000005B62000-memory.dmp

        Filesize

        584KB

      • memory/4428-26-0x0000000006A90000-0x0000000006AD4000-memory.dmp

        Filesize

        272KB

      • memory/4428-5-0x0000000005FE0000-0x0000000006584000-memory.dmp

        Filesize

        5.6MB

      • memory/4428-33-0x0000000006AE0000-0x0000000006B2A000-memory.dmp

        Filesize

        296KB

      • memory/4428-3-0x00000000749D0000-0x0000000075180000-memory.dmp

        Filesize

        7.7MB

      • memory/4428-40-0x0000000006B30000-0x0000000006B8A000-memory.dmp

        Filesize

        360KB

      • memory/4428-4-0x00000000058F0000-0x000000000594C000-memory.dmp

        Filesize

        368KB

      • memory/4428-47-0x00000000066A0000-0x00000000066C6000-memory.dmp

        Filesize

        152KB

      • memory/4428-2-0x0000000005830000-0x000000000583E000-memory.dmp

        Filesize

        56KB

      • memory/4428-54-0x0000000008430000-0x0000000008584000-memory.dmp

        Filesize

        1.3MB

      • memory/4428-1-0x0000000000E60000-0x0000000000F48000-memory.dmp

        Filesize

        928KB

      • memory/4428-60-0x00000000660C0000-0x000000006614F000-memory.dmp

        Filesize

        572KB