Analysis

  • max time kernel
    18s
  • max time network
    21s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06-02-2025 15:50

General

  • Target

    SlammysMonkeModLoader.exe

  • Size

    3.3MB

  • MD5

    a6463b7f24d1114f142bc7eeef859e95

  • SHA1

    7dea038f0bfb76be98d5a4c32958f3e066fe6a22

  • SHA256

    eb905e93f90d65b25a5e441caf23fbf4d78c762ae71dcb732d9486870983e73c

  • SHA512

    9a51355a6359e287e3a8383f3aca26397ac8494c24981bcf347e64e39ba2be59b030f255ee470cec7496a74b097cd24dc417aa68593b080e6426146e79431995

  • SSDEEP

    98304:VwdKqu6ak9WXQ14pnx427k5utO0tabX2xuy:mdKquZk9WXQ2nRw5KuGxu

Malware Config

Extracted

Family

orcus

Botnet

Monkemodmanager

C2

31.44.184.52:29846

Mutex

sudo_cpktc6baomgolt2t3oa6l3h94z9nzjps

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\requesttemp\downloadsapi.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SlammysMonkeModLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\SlammysMonkeModLoader.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Roaming\MonkeModManager.exe
      "C:\Users\Admin\AppData\Roaming\MonkeModManager.exe"
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:320
    • C:\Users\Admin\AppData\Roaming\SlammysMonkeLoader.exe
      "C:\Users\Admin\AppData\Roaming\SlammysMonkeLoader.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe
        "C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
          4⤵
            PID:1968
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4200
    • C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe
      "C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3388
    • C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe
      "C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3564
    • C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe
      "C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"
        2⤵
          PID:3844
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:5020
      • C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe
        "C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4336

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\downloadsapi.exe.log

        Filesize

        1KB

        MD5

        c68a2e976c1f2f378d322b9a73864ae9

        SHA1

        c5fcbe5512f04aef44e3003965525b11b19d090b

        SHA256

        7d1eb548705640194f5dd9935645dedfdf928a365d6131273ca1f0e85fb860e5

        SHA512

        e978e1281c015597d9b6616a3216ff3597219915e990b0d080a41f6218d7f2fb470d016591fd7a9d4833e3ac31a2855320899af3b4204d175d5a3be012808f1b

      • C:\Users\Admin\AppData\Roaming\MonkeModManager.exe

        Filesize

        217KB

        MD5

        1d62aa3d19462f3d5575fc54159911b4

        SHA1

        b37eab86c0075245fcc517a280f0705f6dffb852

        SHA256

        6acaae0fb470790102a338e23dfe2263f31e529288e4efe51b34bca30371cb36

        SHA512

        78a9501d7920920577a586396e5d9e2278a7c926448c9a98d7844db9032dbd887df90d2f389fe1754bf5a2071a19dfd5d40315624923e903ef9ef6cbb214b1df

      • C:\Users\Admin\AppData\Roaming\SlammysMonkeLoader.exe

        Filesize

        3.0MB

        MD5

        6f69820bc23d0e66339375eb128d53b8

        SHA1

        76fe60d0f916f70a355b9bb73189162adef3c8fe

        SHA256

        2cb762773823aeb9fa80904996155d63a7f2f60f588a1b973715ac7b3ea9d437

        SHA512

        0a132498c9ac850826cb37ff7aaf1fbfe43c49b1230f78c2de820cf4964b6c18215b8bc124ae91fef272c54294a095bb6bed7270477fa2933724a6873dc0d1a9

      • C:\Users\Admin\AppData\Roaming\requesttemp\downloadsapi.exe.config

        Filesize

        357B

        MD5

        a2b76cea3a59fa9af5ea21ff68139c98

        SHA1

        35d76475e6a54c168f536e30206578babff58274

        SHA256

        f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

        SHA512

        b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

      • memory/320-72-0x00007FF9CF2A0000-0x00007FF9CFD62000-memory.dmp

        Filesize

        10.8MB

      • memory/320-22-0x000001BCD1090000-0x000001BCD10CC000-memory.dmp

        Filesize

        240KB

      • memory/320-31-0x00007FF9CF2A0000-0x00007FF9CFD62000-memory.dmp

        Filesize

        10.8MB

      • memory/320-33-0x00007FF9CF2A0000-0x00007FF9CFD62000-memory.dmp

        Filesize

        10.8MB

      • memory/320-77-0x00007FF9CF2A0000-0x00007FF9CFD62000-memory.dmp

        Filesize

        10.8MB

      • memory/1952-35-0x0000000003170000-0x000000000317E000-memory.dmp

        Filesize

        56KB

      • memory/1952-37-0x0000000006090000-0x0000000006636000-memory.dmp

        Filesize

        5.6MB

      • memory/1952-38-0x0000000005AE0000-0x0000000005B72000-memory.dmp

        Filesize

        584KB

      • memory/1952-39-0x0000000005FD0000-0x0000000005FE2000-memory.dmp

        Filesize

        72KB

      • memory/1952-36-0x0000000005990000-0x00000000059EC000-memory.dmp

        Filesize

        368KB

      • memory/1952-34-0x0000000000AE0000-0x0000000000DDE000-memory.dmp

        Filesize

        3.0MB

      • memory/2004-1-0x0000000000AE0000-0x0000000000E28000-memory.dmp

        Filesize

        3.3MB

      • memory/2004-0-0x00007FF9CF2A3000-0x00007FF9CF2A5000-memory.dmp

        Filesize

        8KB

      • memory/2812-47-0x0000000005E60000-0x0000000005EFC000-memory.dmp

        Filesize

        624KB

      • memory/2812-44-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2812-45-0x0000000005BD0000-0x0000000005C1E000-memory.dmp

        Filesize

        312KB

      • memory/3388-70-0x0000000007100000-0x000000000713C000-memory.dmp

        Filesize

        240KB

      • memory/3388-71-0x0000000007140000-0x000000000718C000-memory.dmp

        Filesize

        304KB

      • memory/3388-61-0x00000000066F0000-0x00000000066FA000-memory.dmp

        Filesize

        40KB

      • memory/3388-64-0x0000000006F90000-0x0000000006FF6000-memory.dmp

        Filesize

        408KB

      • memory/3388-68-0x0000000007620000-0x0000000007C38000-memory.dmp

        Filesize

        6.1MB

      • memory/3388-69-0x00000000070A0000-0x00000000070B2000-memory.dmp

        Filesize

        72KB

      • memory/3388-58-0x00000000053A0000-0x00000000053B2000-memory.dmp

        Filesize

        72KB

      • memory/3388-60-0x0000000005A60000-0x0000000005A70000-memory.dmp

        Filesize

        64KB

      • memory/3388-59-0x0000000005A40000-0x0000000005A58000-memory.dmp

        Filesize

        96KB

      • memory/3388-73-0x00000000072D0000-0x00000000073DA000-memory.dmp

        Filesize

        1.0MB

      • memory/3388-74-0x0000000007C40000-0x0000000007E02000-memory.dmp

        Filesize

        1.8MB

      • memory/3388-75-0x0000000007290000-0x000000000729E000-memory.dmp

        Filesize

        56KB

      • memory/3388-76-0x0000000008100000-0x0000000008150000-memory.dmp

        Filesize

        320KB

      • memory/4688-53-0x0000000004D00000-0x0000000004D12000-memory.dmp

        Filesize

        72KB