Analysis

  • max time kernel
    391s
  • max time network
    399s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    19-02-2025 12:33

General

  • Target

    m56v9hcw.exe

  • Size

    7.5MB

  • MD5

    2b05de0510522c7ad36572eabc93c268

  • SHA1

    3ecdf3df398138156d82b3706efdfb4318710fe4

  • SHA256

    7ecd8b3a96f79a437837466c772cb384ae4fe1e9ab52b673611dbe55c2fe67a6

  • SHA512

    e26d33bf757ac23427209aba85c2176faa218e43c6882551c6e3001f75424ab68adf6e54acb32e242b321a0ede5e28bf365ab50e4b9873f31c4dd7a6be590050

  • SSDEEP

    196608:pn683kdQkXMCHGLLc54i1wN+DrRRu7NtbFRKnZMZDYhmh1wlxN8:16/TXMCHWUj7rRQ7XbFsn6ZUEWN

Malware Config

Extracted

Family

orcus

C2

dandev.us.to:10134

Mutex

fb6a52b489b9487e813d904c53c3e426

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\m56v9hcw.exe
    "C:\Users\Admin\AppData\Local\Temp\m56v9hcw.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\m56v9hcw.exe
      "C:\Users\Admin\AppData\Local\Temp\m56v9hcw.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Users\Admin\AppData\Local\Temp\_MEI24482\law.exe
        C:\Users\Admin\AppData\Local\Temp\_MEI24482\law.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:560
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2ec 0x3e4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\VCRUNTIME140.dll

    Filesize

    117KB

    MD5

    862f820c3251e4ca6fc0ac00e4092239

    SHA1

    ef96d84b253041b090c243594f90938e9a487a9a

    SHA256

    36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

    SHA512

    2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\_bz2.pyd

    Filesize

    83KB

    MD5

    c17dcb7fc227601471a641ec90e6237f

    SHA1

    c93a8c2430e844f40f1d9c880aa74612409ffbb9

    SHA256

    55894b2b98d01f37b9a8cf4daf926d0161ff23c2fb31c56f9dbbac3a61932712

    SHA512

    38851cbd234a51394673a7514110eb43037b4e19d2a6fb79471cc7d01dbcf2695e70df4ba2727c69f1fed56fc7980e3ca37fddff73cc3294a2ea44facdeb0fa9

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\_decimal.pyd

    Filesize

    274KB

    MD5

    ad4324e5cc794d626ffccda544a5a833

    SHA1

    ef925e000383b6cad9361430fc38264540d434a5

    SHA256

    040f361f63204b55c17a100c260c7ddfadd00866cc055fbd641b83a6747547d5

    SHA512

    0a002b79418242112600b9246da66a5c04651aecb2e245f0220b2544d7b7df67a20139f45ddf2d4e7759ce8cc3d6b4be7f98b0a221c756449eb1b6d7af602325

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\_hashlib.pyd

    Filesize

    63KB

    MD5

    422e214ca76421e794b99f99a374b077

    SHA1

    58b24448ab889948303cdefe28a7c697687b7ebc

    SHA256

    78223aef72777efc93c739f5308a3fc5de28b7d10e6975b8947552a62592772b

    SHA512

    03fcccc5a300cc029bef06c601915fa38604d955995b127b5b121cb55fb81752a8a1eec4b1b263ba12c51538080335dabaef9e2b8259b4bf02af84a680552fa0

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\_lzma.pyd

    Filesize

    155KB

    MD5

    66a9028efd1bb12047dafce391fd6198

    SHA1

    e0b61ce28ea940f1f0d5247d40abe61ae2b91293

    SHA256

    e44dea262a24df69fd9b50b08d09ae6f8b051137ce0834640c977091a6f9fca8

    SHA512

    3c2a4e2539933cbeb1d0b3c8ef14f0563675fd53b6ef487c7a5371dfe2ee1932255f91db598a61aaadacd8dc2fe2486a91f586542c52dfc054b22ad843831d1e

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\_socket.pyd

    Filesize

    82KB

    MD5

    abf998769f3cba685e90fa06e0ec8326

    SHA1

    daa66047cf22b6be608127f8824e59b30c9026bf

    SHA256

    62d0493ced6ca33e2fd8141649dd9889c23b2e9afc5fdf56edb4f888c88fb823

    SHA512

    08c6b3573c596a15accf4936533567415198a0daab5b6e9824b820fd1f078233bbc3791fde6971489e70155f7c33c1242b0b0a3a17fe2ec95b9fadae555ed483

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\base_library.zip

    Filesize

    1.3MB

    MD5

    18c3f8bf07b4764d340df1d612d28fad

    SHA1

    fc0e09078527c13597c37dbea39551f72bbe9ae8

    SHA256

    6e30043dfa5faf9c31bd8fb71778e8e0701275b620696d29ad274846676b7175

    SHA512

    135b97cd0284424a269c964ed95b06d338814e5e7b2271b065e5eabf56a8af4a213d863dd2a1e93c1425fadb1b20e6c63ffa6e8984156928be4a9a2fbbfd5e93

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\law.exe

    Filesize

    903KB

    MD5

    80f316e9b42b99821182226e2b32887b

    SHA1

    92ae7497e977530dd697573772af62530ac54c1d

    SHA256

    63edaa4ba283705b25a0a22a2108e52a148d3978dec033da520320a096e02d7e

    SHA512

    23815b396a5a8f5fb9db7c497186311d3b365e66fb47bcf90c3b6dae4e5c87b3f50e46d6fa1a75204200f75b9707a84d809a05a19154ac5667b487153bc0b708

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\libcrypto-3.dll

    Filesize

    5.0MB

    MD5

    123ad0908c76ccba4789c084f7a6b8d0

    SHA1

    86de58289c8200ed8c1fc51d5f00e38e32c1aad5

    SHA256

    4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

    SHA512

    80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\python313.dll

    Filesize

    5.8MB

    MD5

    3aad23292404a7038eb07ce5a6348256

    SHA1

    35cac5479699b28549ebe36c1d064bfb703f0857

    SHA256

    78b1dd211c0e66a0603df48da2c9b67a915ab3258701b9285d3faa255ed8dc25

    SHA512

    f5b6ef04e744d2c98c1ef9402d7a8ce5cda3b008837cf2c37a8b6d0cd1b188ca46585a40b2db7acf019f67e6ced59eff5bc86e1aaf48d3c3b62fecf37f3aec6b

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\select.pyd

    Filesize

    31KB

    MD5

    62fe3761d24b53d98cc9b0cbbd0feb7c

    SHA1

    317344c9edf2fcfa2b9bc248a18f6e6acedafffb

    SHA256

    81f124b01a85882e362a42e94a13c0eff2f4ccd72d461821dc5457a789554413

    SHA512

    a1d3da17937087af4e5980d908ed645d4ea1b5f3ebfab5c572417df064707cae1372b331c7096cc8e2e041db9315172806d3bc4bb425c6bb4d2fa55e00524881

  • C:\Users\Admin\AppData\Local\Temp\_MEI24482\unicodedata.pyd

    Filesize

    695KB

    MD5

    43b8b61debbc6dd93124a00ddd922d8c

    SHA1

    5dee63d250ac6233aac7e462eee65c5326224f01

    SHA256

    3f462ee6e7743a87e5791181936539642e3761c55de3de980a125f91fe21f123

    SHA512

    dd4791045cf887e6722feae4442c38e641f19ec994a8eaf7667e9df9ea84378d6d718caf3390f92443f6bbf39840c150121bb6fa896c4badd3f78f1ffe4de19d

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_fb6a52b489b9487e813d904c53c3e426\SharpDX.DXGI.dll

    Filesize

    125KB

    MD5

    2b44c70c49b70d797fbb748158b5d9bb

    SHA1

    93e00e6527e461c45c7868d14cf05c007e478081

    SHA256

    3762d43c83af69cd38c9341a927ca6bd00f6bae8217c874d693047d6df4705bf

    SHA512

    faced62f6ecbfa2ee0d7a47e300302d23030d1f28758cbe9c442e9d8d4f8359c59088aa6237a28103e43d248c8efc7eeaf2c184028701b752df6cce92d6854d0

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_fb6a52b489b9487e813d904c53c3e426\SharpDX.Direct3D11.dll

    Filesize

    271KB

    MD5

    98eb5ba5871acdeaebf3a3b0f64be449

    SHA1

    c965284f60ef789b00b10b3df60ee682b4497de3

    SHA256

    d7617d926648849cbfef450b8f48e458ee52e2793fb2251a30094b778aa8848c

    SHA512

    a60025e304713d333e4b82b2d0be28087950688b049c98d2db5910c00b8d45b92e16d25ac8a58ff1318de019de3a9a00c7cbf8a6ad4b5bb1cb175dafa1b9bea2

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_fb6a52b489b9487e813d904c53c3e426\SharpDX.Direct3D9.dll

    Filesize

    338KB

    MD5

    934da0e49208d0881c44fe19d5033840

    SHA1

    a19c5a822e82e41752a08d3bd9110db19a8a5016

    SHA256

    02da4af8cd4a8de19d816000caaae885e676b9e52f136ff071a279c2b8ad34c7

    SHA512

    de62f629c2299b50af62893244a28895d63b78138c8632449984306f45de16bd01076eadbb0d75a700215e970c1df731e202ea640236c0f0da6ed15146193b59

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_fb6a52b489b9487e813d904c53c3e426\SharpDX.dll

    Filesize

    247KB

    MD5

    ffb4b61cc11bec6d48226027c2c26704

    SHA1

    fa8b9e344accbdc4dffa9b5d821d23f0716da29e

    SHA256

    061542ff3fb36039b7bbffdf3e07b66176b264c1dfd834a14b09c08620717303

    SHA512

    48aa6130bf1f5bd6de19256bbdf754c0158b43dd122cec47bb801a7a7b56f2da268bfdec24d135621764a23278ead3dcc35911a057e2dfa55a348bae8ef7b8a9

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_fb6a52b489b9487e813d904c53c3e426\TurboJpegWrapper.dll

    Filesize

    1.3MB

    MD5

    ac6acc235ebef6374bed71b37e322874

    SHA1

    a267baad59cd7352167636836bad4b971fcd6b6b

    SHA256

    047b042cebf4c851f0d14f85f16ce952f03e48c20362d4ed9390875d4900fe96

    SHA512

    72ac8b8c8f27264cc261297c325d14a0be2084d007c6132ab8402d87f912fe9189cb074db11625d9f86d29a6188f22a89e58ae45c9131fac4522473567017081

  • C:\Users\Admin\AppData\Roaming\Orcus\lib_fb6a52b489b9487e813d904c53c3e426\x86\turbojpeg.dll

    Filesize

    646KB

    MD5

    82898ed19da89d7d44e280a3ced95e9b

    SHA1

    eec0af5733c642eac8c5e08479f462d1ec1ed4db

    SHA256

    5f4b9f8360764d75c9faaecd94f6d200c54611b33064cd216e363d973dae7c29

    SHA512

    ee7b884ce7d7366ee28fb17721b6c89bd4eba8fb373cdbb483e26a4ed7a74ab5db847513c54704d753d77a7e18b1fb9fee90ed6bbc0540bff702273fda36b682

  • C:\Users\Admin\AppData\Roaming\Orcus\stp_fb6a52b489b9487e813d904c53c3e426\dd9a7a06fe254008b460fd91e101726d

    Filesize

    1.5MB

    MD5

    d49bbcf52fe93e9123ca4db9456ea3c5

    SHA1

    0dc2169eb1ee61315abe432d465c4028ec58d199

    SHA256

    8b245e0499064d33e7797b88246ad7ade7382f1700b550c8cdf2cf146b2e0b57

    SHA512

    1ec9116369357886522b07ed587be44cf0f4a2899fddd676d3223567fe07fd40f74bfcd84f656c558b188d3c09ad8054aa2461e4b4e236eb0e551a245539249c

  • memory/560-42-0x0000000006020000-0x000000000602A000-memory.dmp

    Filesize

    40KB

  • memory/560-38-0x0000000005080000-0x0000000005112000-memory.dmp

    Filesize

    584KB

  • memory/560-41-0x0000000005CE0000-0x0000000005CF0000-memory.dmp

    Filesize

    64KB

  • memory/560-39-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/560-43-0x00000000065B0000-0x0000000006616000-memory.dmp

    Filesize

    408KB

  • memory/560-44-0x0000000006E40000-0x0000000007458000-memory.dmp

    Filesize

    6.1MB

  • memory/560-45-0x0000000006850000-0x0000000006862000-memory.dmp

    Filesize

    72KB

  • memory/560-46-0x00000000068B0000-0x00000000068EC000-memory.dmp

    Filesize

    240KB

  • memory/560-47-0x00000000068F0000-0x000000000693C000-memory.dmp

    Filesize

    304KB

  • memory/560-48-0x0000000006A80000-0x0000000006B8A000-memory.dmp

    Filesize

    1.0MB

  • memory/560-49-0x0000000007460000-0x0000000007622000-memory.dmp

    Filesize

    1.8MB

  • memory/560-50-0x000000007484E000-0x000000007484F000-memory.dmp

    Filesize

    4KB

  • memory/560-51-0x0000000074840000-0x0000000074FF1000-memory.dmp

    Filesize

    7.7MB

  • memory/560-40-0x00000000055C0000-0x00000000055D8000-memory.dmp

    Filesize

    96KB

  • memory/560-56-0x0000000005F80000-0x0000000005FC4000-memory.dmp

    Filesize

    272KB

  • memory/560-37-0x0000000005630000-0x0000000005BD6000-memory.dmp

    Filesize

    5.6MB

  • memory/560-66-0x0000000005FD0000-0x000000000601A000-memory.dmp

    Filesize

    296KB

  • memory/560-36-0x0000000004EF0000-0x0000000004F4C000-memory.dmp

    Filesize

    368KB

  • memory/560-76-0x0000000006C90000-0x0000000006CEA000-memory.dmp

    Filesize

    360KB

  • memory/560-35-0x0000000074840000-0x0000000074FF1000-memory.dmp

    Filesize

    7.7MB

  • memory/560-86-0x0000000005560000-0x0000000005586000-memory.dmp

    Filesize

    152KB

  • memory/560-34-0x0000000004E10000-0x0000000004E1E000-memory.dmp

    Filesize

    56KB

  • memory/560-96-0x0000000007790000-0x00000000078E4000-memory.dmp

    Filesize

    1.3MB

  • memory/560-33-0x0000000000490000-0x0000000000578000-memory.dmp

    Filesize

    928KB

  • memory/560-105-0x00000000660C0000-0x000000006614F000-memory.dmp

    Filesize

    572KB

  • memory/560-32-0x000000007484E000-0x000000007484F000-memory.dmp

    Filesize

    4KB

  • memory/560-122-0x000000000AA30000-0x000000000ABAA000-memory.dmp

    Filesize

    1.5MB