Analysis
-
max time kernel
18s -
max time network
21s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06-02-2025 15:50
Static task
static1
General
-
Target
SlammysMonkeModLoader.exe
-
Size
3.3MB
-
MD5
a6463b7f24d1114f142bc7eeef859e95
-
SHA1
7dea038f0bfb76be98d5a4c32958f3e066fe6a22
-
SHA256
eb905e93f90d65b25a5e441caf23fbf4d78c762ae71dcb732d9486870983e73c
-
SHA512
9a51355a6359e287e3a8383f3aca26397ac8494c24981bcf347e64e39ba2be59b030f255ee470cec7496a74b097cd24dc417aa68593b080e6426146e79431995
-
SSDEEP
98304:VwdKqu6ak9WXQ14pnx427k5utO0tabX2xuy:mdKquZk9WXQ2nRw5KuGxu
Malware Config
Extracted
orcus
Monkemodmanager
31.44.184.52:29846
sudo_cpktc6baomgolt2t3oa6l3h94z9nzjps
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\requesttemp\downloadsapi.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Signatures
-
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000027dac-20.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/files/0x0008000000027dac-20.dat orcus behavioral1/memory/1952-34-0x0000000000AE0000-0x0000000000DDE000-memory.dmp orcus -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000\Control Panel\International\Geo\Nation SlammysMonkeModLoader.exe Key value queried \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000\Control Panel\International\Geo\Nation SlammysMonkeLoader.exe -
Executes dropped EXE 7 IoCs
pid Process 320 MonkeModManager.exe 1952 SlammysMonkeLoader.exe 2812 downloadsapi.exe 4272 downloadsapi.exe 4688 downloadsapi.exe 4864 downloadsapi.exe 4336 downloadsapi.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2812 set thread context of 4200 2812 downloadsapi.exe 85 PID 4272 set thread context of 3388 4272 downloadsapi.exe 87 PID 4688 set thread context of 3564 4688 downloadsapi.exe 89 PID 4864 set thread context of 5020 4864 downloadsapi.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloadsapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloadsapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloadsapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caspol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SlammysMonkeLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloadsapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloadsapi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msbuild.exe -
Modifies registry class 32 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 MonkeModManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 MonkeModManager.exe Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 MonkeModManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" MonkeModManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" MonkeModManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings MonkeModManager.exe Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} MonkeModManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" MonkeModManager.exe Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 14002e80922b16d365937a46956b92703aca08af0000 MonkeModManager.exe Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff MonkeModManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Documents" MonkeModManager.exe Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff MonkeModManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 MonkeModManager.exe Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 MonkeModManager.exe Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell MonkeModManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ MonkeModManager.exe Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 MonkeModManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell MonkeModManager.exe Key created \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg MonkeModManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" MonkeModManager.exe Set value (data) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 MonkeModManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" MonkeModManager.exe Set value (int) \REGISTRY\USER\S-1-5-21-556946243-3021397321-2334405592-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" MonkeModManager.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1952 SlammysMonkeLoader.exe 2812 downloadsapi.exe 2812 downloadsapi.exe 2812 downloadsapi.exe 2812 downloadsapi.exe 4272 downloadsapi.exe 4272 downloadsapi.exe 4688 downloadsapi.exe 4688 downloadsapi.exe 4864 downloadsapi.exe 4864 downloadsapi.exe 4864 downloadsapi.exe 4864 downloadsapi.exe 3388 msbuild.exe 3388 msbuild.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1952 SlammysMonkeLoader.exe Token: SeDebugPrivilege 2812 downloadsapi.exe Token: SeDebugPrivilege 4272 downloadsapi.exe Token: SeDebugPrivilege 4688 downloadsapi.exe Token: SeDebugPrivilege 4864 downloadsapi.exe Token: SeDebugPrivilege 3388 msbuild.exe Token: SeDebugPrivilege 320 MonkeModManager.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 320 MonkeModManager.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2004 wrote to memory of 320 2004 SlammysMonkeModLoader.exe 80 PID 2004 wrote to memory of 320 2004 SlammysMonkeModLoader.exe 80 PID 2004 wrote to memory of 1952 2004 SlammysMonkeModLoader.exe 81 PID 2004 wrote to memory of 1952 2004 SlammysMonkeModLoader.exe 81 PID 2004 wrote to memory of 1952 2004 SlammysMonkeModLoader.exe 81 PID 1952 wrote to memory of 2812 1952 SlammysMonkeLoader.exe 82 PID 1952 wrote to memory of 2812 1952 SlammysMonkeLoader.exe 82 PID 1952 wrote to memory of 2812 1952 SlammysMonkeLoader.exe 82 PID 2812 wrote to memory of 1968 2812 downloadsapi.exe 84 PID 2812 wrote to memory of 1968 2812 downloadsapi.exe 84 PID 2812 wrote to memory of 1968 2812 downloadsapi.exe 84 PID 2812 wrote to memory of 4200 2812 downloadsapi.exe 85 PID 2812 wrote to memory of 4200 2812 downloadsapi.exe 85 PID 2812 wrote to memory of 4200 2812 downloadsapi.exe 85 PID 2812 wrote to memory of 4200 2812 downloadsapi.exe 85 PID 2812 wrote to memory of 4200 2812 downloadsapi.exe 85 PID 2812 wrote to memory of 4200 2812 downloadsapi.exe 85 PID 2812 wrote to memory of 4200 2812 downloadsapi.exe 85 PID 2812 wrote to memory of 4200 2812 downloadsapi.exe 85 PID 4272 wrote to memory of 3388 4272 downloadsapi.exe 87 PID 4272 wrote to memory of 3388 4272 downloadsapi.exe 87 PID 4272 wrote to memory of 3388 4272 downloadsapi.exe 87 PID 4272 wrote to memory of 3388 4272 downloadsapi.exe 87 PID 4272 wrote to memory of 3388 4272 downloadsapi.exe 87 PID 4272 wrote to memory of 3388 4272 downloadsapi.exe 87 PID 4272 wrote to memory of 3388 4272 downloadsapi.exe 87 PID 4272 wrote to memory of 3388 4272 downloadsapi.exe 87 PID 4688 wrote to memory of 3564 4688 downloadsapi.exe 89 PID 4688 wrote to memory of 3564 4688 downloadsapi.exe 89 PID 4688 wrote to memory of 3564 4688 downloadsapi.exe 89 PID 4688 wrote to memory of 3564 4688 downloadsapi.exe 89 PID 4688 wrote to memory of 3564 4688 downloadsapi.exe 89 PID 4688 wrote to memory of 3564 4688 downloadsapi.exe 89 PID 4688 wrote to memory of 3564 4688 downloadsapi.exe 89 PID 4688 wrote to memory of 3564 4688 downloadsapi.exe 89 PID 4864 wrote to memory of 3844 4864 downloadsapi.exe 93 PID 4864 wrote to memory of 3844 4864 downloadsapi.exe 93 PID 4864 wrote to memory of 3844 4864 downloadsapi.exe 93 PID 4864 wrote to memory of 5020 4864 downloadsapi.exe 94 PID 4864 wrote to memory of 5020 4864 downloadsapi.exe 94 PID 4864 wrote to memory of 5020 4864 downloadsapi.exe 94 PID 4864 wrote to memory of 5020 4864 downloadsapi.exe 94 PID 4864 wrote to memory of 5020 4864 downloadsapi.exe 94 PID 4864 wrote to memory of 5020 4864 downloadsapi.exe 94 PID 4864 wrote to memory of 5020 4864 downloadsapi.exe 94 PID 4864 wrote to memory of 5020 4864 downloadsapi.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\SlammysMonkeModLoader.exe"C:\Users\Admin\AppData\Local\Temp\SlammysMonkeModLoader.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\MonkeModManager.exe"C:\Users\Admin\AppData\Roaming\MonkeModManager.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:320
-
-
C:\Users\Admin\AppData\Roaming\SlammysMonkeLoader.exe"C:\Users\Admin\AppData\Roaming\SlammysMonkeLoader.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"4⤵PID:1968
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4200
-
-
-
-
C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3564
-
-
C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"2⤵PID:3844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c68a2e976c1f2f378d322b9a73864ae9
SHA1c5fcbe5512f04aef44e3003965525b11b19d090b
SHA2567d1eb548705640194f5dd9935645dedfdf928a365d6131273ca1f0e85fb860e5
SHA512e978e1281c015597d9b6616a3216ff3597219915e990b0d080a41f6218d7f2fb470d016591fd7a9d4833e3ac31a2855320899af3b4204d175d5a3be012808f1b
-
Filesize
217KB
MD51d62aa3d19462f3d5575fc54159911b4
SHA1b37eab86c0075245fcc517a280f0705f6dffb852
SHA2566acaae0fb470790102a338e23dfe2263f31e529288e4efe51b34bca30371cb36
SHA51278a9501d7920920577a586396e5d9e2278a7c926448c9a98d7844db9032dbd887df90d2f389fe1754bf5a2071a19dfd5d40315624923e903ef9ef6cbb214b1df
-
Filesize
3.0MB
MD56f69820bc23d0e66339375eb128d53b8
SHA176fe60d0f916f70a355b9bb73189162adef3c8fe
SHA2562cb762773823aeb9fa80904996155d63a7f2f60f588a1b973715ac7b3ea9d437
SHA5120a132498c9ac850826cb37ff7aaf1fbfe43c49b1230f78c2de820cf4964b6c18215b8bc124ae91fef272c54294a095bb6bed7270477fa2933724a6873dc0d1a9
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad