Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2025 08:04
Behavioral task
behavioral1
Sample
tar.exe
Resource
win7-20241010-en
General
-
Target
tar.exe
-
Size
3.0MB
-
MD5
bf7895e063d2bc2e2df12a0808369f74
-
SHA1
c0b6158b47aee66cbe68885e582f20a388b0b146
-
SHA256
53ef45215a305cdeb6a25dcb51c691af9f4d545534d78e102d125536baa608b7
-
SHA512
e664d6a6e763c27738ef5472bab2fdf6334083756e2bbb8a92b43f29bac7f557e548f53a16c2f2d28df713744b3d9d88911ae75ca55acd8af24110641bbf1ffa
-
SSDEEP
49152:gAkDf7+QSLqZeM9/04zgaMWUljQfJgVXkKAypQxb0/o9JnCmYWncFf0I74gu3yM:gPyb2MnjQBEUNypSb6o9JCm
Malware Config
Extracted
orcus
108.231.94.28:10134
2c09a108509b4d9aa6f48e001c264c91
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcus family
-
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/memory/4312-1-0x000001F6B6980000-0x000001F6B6C7C000-memory.dmp orcus behavioral2/files/0x000a000000023b6c-37.dat orcus -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation tar.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Orcus.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation OrcusWatchdog.exe -
Executes dropped EXE 6 IoCs
pid Process 3860 WindowsInput.exe 3784 WindowsInput.exe 4876 Orcus.exe 3928 Orcus.exe 1540 OrcusWatchdog.exe 4972 OrcusWatchdog.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.exe.config tar.exe File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe tar.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Orcus\Orcus.exe tar.exe File created C:\Program Files\Orcus\Orcus.exe.config tar.exe File created C:\Program Files\Orcus\Orcus.exe tar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OrcusWatchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OrcusWatchdog.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4876 Orcus.exe 4876 Orcus.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4972 OrcusWatchdog.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe 4876 Orcus.exe 4972 OrcusWatchdog.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4876 Orcus.exe Token: SeDebugPrivilege 1540 OrcusWatchdog.exe Token: SeDebugPrivilege 4972 OrcusWatchdog.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4876 Orcus.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4312 wrote to memory of 3860 4312 tar.exe 82 PID 4312 wrote to memory of 3860 4312 tar.exe 82 PID 4312 wrote to memory of 4876 4312 tar.exe 84 PID 4312 wrote to memory of 4876 4312 tar.exe 84 PID 4876 wrote to memory of 1540 4876 Orcus.exe 86 PID 4876 wrote to memory of 1540 4876 Orcus.exe 86 PID 4876 wrote to memory of 1540 4876 Orcus.exe 86 PID 1540 wrote to memory of 4972 1540 OrcusWatchdog.exe 87 PID 1540 wrote to memory of 4972 1540 OrcusWatchdog.exe 87 PID 1540 wrote to memory of 4972 1540 OrcusWatchdog.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tar.exe"C:\Users\Admin\AppData\Local\Temp\tar.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3860
-
-
C:\Program Files\Orcus\Orcus.exe"C:\Program Files\Orcus\Orcus.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /launchSelfAndExit "C:\Program Files\Orcus\Orcus.exe" 4876 /protectFile3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe"C:\Users\Admin\AppData\Roaming\OrcusWatchdog.exe" /watchProcess "C:\Program Files\Orcus\Orcus.exe" 4876 "/protectFile"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:3784
-
C:\Program Files\Orcus\Orcus.exe"C:\Program Files\Orcus\Orcus.exe"1⤵
- Executes dropped EXE
PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5bf7895e063d2bc2e2df12a0808369f74
SHA1c0b6158b47aee66cbe68885e582f20a388b0b146
SHA25653ef45215a305cdeb6a25dcb51c691af9f4d545534d78e102d125536baa608b7
SHA512e664d6a6e763c27738ef5472bab2fdf6334083756e2bbb8a92b43f29bac7f557e548f53a16c2f2d28df713744b3d9d88911ae75ca55acd8af24110641bbf1ffa
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
9KB
MD5dee9d0fe14b2c0426ab9dec8a38ce4b9
SHA1692bb4d3af30b03d368892e76291896565d5bc4b
SHA256a5a2e90c471b394ea725c868580e2461a40be7a567ed917fc15cde1766239c5f
SHA51284ce407731f13ab272e1a98c5c56c968f17b342c89cf525b1506af35c2096e249cf7929e3fc143a670f7d3c5b87e52d9349025f95ce993349e6ebc572d25a29c
-
Filesize
157B
MD57efa291047eb1202fde7765adac4b00d
SHA122d4846caff5e45c18e50738360579fbbed2aa8d
SHA256807fb6eeaa7c77bf53831d8a4422a53a5d8ccd90e6bbc17c655c0817460407b6
SHA512159c95eb1e817ba2d281f39c3939dd963ab62c0cd29bf66ca3beb0aff53f4617d47f48474e58319130ae4146a044a42fc75f63c343330c1b6d2be7034b9fa724
-
Filesize
21KB
MD5c849d33051fa1082063ea849eb073017
SHA19ad0af3cf679778aca3fd0b33b112aef80190eae
SHA256a270d21a6abcf2c1178e73838d9ca9acf2cc36b174821a679fae759bc51ad500
SHA51274742cca96531afe004ddfbeb1c6850e9698848b6beec24fd90b52c2c5084b289172eaf593b4491bcdfd9b2da5ea82f5adfb90ef2dcdad2443dbb23492c84a9a
-
Filesize
349B
MD589817519e9e0b4e703f07e8c55247861
SHA14636de1f6c997a25c3190f73f46a3fd056238d78
SHA256f40dfaa50dcbff93611d45607009158f798e9cd845170939b1d6088a7d10ee13
SHA512b017cb7a522b9c6794f3691cb7266ec82f565a90d7d07cc9beb53b939d2e9bf34275bc25f6f32d9a9c7136a0aab2189d9556af7244450c610d11ed7a4f584ba3