Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-02-2025 03:16
Static task
static1
Behavioral task
behavioral1
Sample
OrcusRAT.exe
Resource
win7-20241010-en
General
-
Target
OrcusRAT.exe
-
Size
16.3MB
-
MD5
bec4a5b0b6db81ce39d6f2e3721911e3
-
SHA1
4d5cff870c8012f0978ecb6d4a579dc84a4f2ad3
-
SHA256
9b52478f24a02f622d71fc14c484e03dd240f0ac0b9166e0b58defa0edfc0404
-
SHA512
8990173964cd8ff719ac3f524e0ba6c5a99c815ecf6549cf67b126e7d581b8a2a8bc1432fc7d844f5e4b590b3554ee320370968be3fc5b7c623d3e8b29d8b1c6
-
SSDEEP
196608:CI6JYPVMxrZbapOU4SxTtn52dQ2CIierfBrec1CoHktdsXNPIawd4D3jtg4neJx0:C9JYaxrckZxQ2I431HHiWE63ju4en
Malware Config
Extracted
xworm
5.0
127.0.0.1:32934
skidderhay-32934.portmap.host:32934
lbyKzAzevfD9uOTG
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x00070000000120fc-2.dat family_xworm behavioral1/memory/2920-7-0x0000000001270000-0x0000000001282000-memory.dmp family_xworm behavioral1/memory/3012-52-0x0000000000F60000-0x0000000000F72000-memory.dmp family_xworm -
Orcus family
-
Xworm family
-
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/files/0x0003000000018334-10.dat orcus behavioral1/memory/2904-15-0x0000000000D60000-0x0000000001D9E000-memory.dmp orcus -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2824 powershell.exe 2660 powershell.exe 1640 powershell.exe 1260 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\program.lnk 23232.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\program.lnk 23232.exe -
Executes dropped EXE 5 IoCs
pid Process 2920 23232.exe 2904 Orcus.Administration.exe 3012 program 928 program 2260 program -
Loads dropped DLL 7 IoCs
pid Process 572 OrcusRAT.exe 572 OrcusRAT.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe 2788 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\program = "C:\\ProgramData\\program" 23232.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2788 2904 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OrcusRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Orcus.Administration.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2824 powershell.exe 2660 powershell.exe 1640 powershell.exe 1260 powershell.exe 2920 23232.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2920 23232.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeDebugPrivilege 2920 23232.exe Token: SeDebugPrivilege 3012 program Token: SeDebugPrivilege 928 program Token: SeDebugPrivilege 2260 program -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2920 23232.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 572 wrote to memory of 2920 572 OrcusRAT.exe 29 PID 572 wrote to memory of 2920 572 OrcusRAT.exe 29 PID 572 wrote to memory of 2920 572 OrcusRAT.exe 29 PID 572 wrote to memory of 2920 572 OrcusRAT.exe 29 PID 572 wrote to memory of 2904 572 OrcusRAT.exe 30 PID 572 wrote to memory of 2904 572 OrcusRAT.exe 30 PID 572 wrote to memory of 2904 572 OrcusRAT.exe 30 PID 572 wrote to memory of 2904 572 OrcusRAT.exe 30 PID 2904 wrote to memory of 2788 2904 Orcus.Administration.exe 31 PID 2904 wrote to memory of 2788 2904 Orcus.Administration.exe 31 PID 2904 wrote to memory of 2788 2904 Orcus.Administration.exe 31 PID 2904 wrote to memory of 2788 2904 Orcus.Administration.exe 31 PID 2920 wrote to memory of 2824 2920 23232.exe 32 PID 2920 wrote to memory of 2824 2920 23232.exe 32 PID 2920 wrote to memory of 2824 2920 23232.exe 32 PID 2920 wrote to memory of 2660 2920 23232.exe 34 PID 2920 wrote to memory of 2660 2920 23232.exe 34 PID 2920 wrote to memory of 2660 2920 23232.exe 34 PID 2920 wrote to memory of 1640 2920 23232.exe 36 PID 2920 wrote to memory of 1640 2920 23232.exe 36 PID 2920 wrote to memory of 1640 2920 23232.exe 36 PID 2920 wrote to memory of 1260 2920 23232.exe 38 PID 2920 wrote to memory of 1260 2920 23232.exe 38 PID 2920 wrote to memory of 1260 2920 23232.exe 38 PID 2920 wrote to memory of 640 2920 23232.exe 40 PID 2920 wrote to memory of 640 2920 23232.exe 40 PID 2920 wrote to memory of 640 2920 23232.exe 40 PID 2472 wrote to memory of 3012 2472 taskeng.exe 43 PID 2472 wrote to memory of 3012 2472 taskeng.exe 43 PID 2472 wrote to memory of 3012 2472 taskeng.exe 43 PID 2472 wrote to memory of 928 2472 taskeng.exe 45 PID 2472 wrote to memory of 928 2472 taskeng.exe 45 PID 2472 wrote to memory of 928 2472 taskeng.exe 45 PID 2472 wrote to memory of 2260 2472 taskeng.exe 46 PID 2472 wrote to memory of 2260 2472 taskeng.exe 46 PID 2472 wrote to memory of 2260 2472 taskeng.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\OrcusRAT.exe"C:\Users\Admin\AppData\Local\Temp\OrcusRAT.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\23232.exe"C:\Users\Admin\AppData\Local\Temp\23232.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\23232.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '23232.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\program'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'program'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "program" /tr "C:\ProgramData\program"3⤵
- Scheduled Task/Job: Scheduled Task
PID:640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Orcus.Administration.exe"C:\Users\Admin\AppData\Local\Temp\Orcus.Administration.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 5483⤵
- Loads dropped DLL
- Program crash
PID:2788
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {60D7F379-7CC0-4973-B75A-AE9DEE65BB96} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\ProgramData\programC:\ProgramData\program2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\ProgramData\programC:\ProgramData\program2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\ProgramData\programC:\ProgramData\program2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c10397f78c1822eb78f98a4a4a8ecb23
SHA11a6285e69211c52875071cc1b361ff6702504125
SHA256dafa02ccc02c30e9e77ddcb184212d6afd64090eec4e05968b96ebfedced3339
SHA512bf9b898670020bba732d54ce66d71f4634ea3d0d3581c806ba2ea4ada8e1cfeddc04bf94ca769704230b81b9f5c6b965738e55d733853205b9688c061e0bb9b7
-
Filesize
43KB
MD5eb6c2368d07caa4598c0f72272771459
SHA11ea1f56535c3d3f9b5842903bb7c74acbfc9cba6
SHA256a6924534ab62ca1d4b1ba033346761aa1d8146f969ca1be80e9c94587a9569aa
SHA512905d2bf25b2c92293002c46d711705888c892aa94a39440cf25e367ecf2265a0c4ccb8e5c778acc00e7c3bd5bf0d10957efd7fc8d2bc73d60f0f0eb365da4dd6
-
Filesize
16.2MB
MD5a6347e4e194adb6d2a3fae52598d8cdd
SHA1aa06c496c20d6e04142d4a5205a032680a452a0d
SHA256911e3e95efddbae9d1c2f4b04027567c76823116755097b5868b7241c7e30cbc
SHA5122ee24604c0edbc09096e2344ca6c1f74b1067b9aff7f077d0b4e42cd8f51dd1116e98016e34f0a1d951fcdbc8bfed33b1709a9692ba95b3ea3cd84d9ce080922