Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2025 15:00
Behavioral task
behavioral1
Sample
RamBoost.exe
Resource
win7-20240729-en
General
-
Target
RamBoost.exe
-
Size
11.1MB
-
MD5
a5c93db4c83dab084d6d4ae80ce1e527
-
SHA1
e90866ae65781058b98cb155e35b7ce1445d6139
-
SHA256
d9dc36b7bedf2632fe0a7ca99478b20406d288a69bd7b65e5da2c9d748a5b81f
-
SHA512
e61fdcabc99dbef705ac83dfa347c5f12b584ceec8b4f2fa7997a3f12722944987e65620d2f8764174e2145e7b3e7cf31372f4a591a38e4fc4496063f03e35b7
-
SSDEEP
24576:CuQ4MROxnFD3+74S4xrZlI0AilFEvxHiVq7:CuzMiJxrZlI0AilFEvxHi4
Malware Config
Extracted
orcus
dandev.us.to:1015
33346576134e432b900bfc3fb9baec32
-
autostart_method
TaskScheduler
-
enable_keylogger
true
-
install_path
%temp%\Updater.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\Watchdog.exe
Signatures
-
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral2/files/0x000400000001e64b-54.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral2/files/0x000400000001e64b-54.dat orcus behavioral2/memory/516-64-0x0000000000F70000-0x0000000001088000-memory.dmp orcus -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation RamBoost.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Updater.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Watchdog.exe -
Executes dropped EXE 6 IoCs
pid Process 3100 WindowsInput.exe 624 WindowsInput.exe 516 Updater.exe 4720 Updater.exe 2272 Watchdog.exe 3012 Watchdog.exe -
Loads dropped DLL 1 IoCs
pid Process 516 Updater.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini RamBoost.exe File opened for modification C:\Windows\assembly\Desktop.ini RamBoost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsInput.InstallState WindowsInput.exe File created C:\Windows\SysWOW64\WindowsInput.exe RamBoost.exe File created C:\Windows\SysWOW64\WindowsInput.exe.config RamBoost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly RamBoost.exe File created C:\Windows\assembly\Desktop.ini RamBoost.exe File opened for modification C:\Windows\assembly\Desktop.ini RamBoost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Watchdog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Watchdog.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 Updater.exe 516 Updater.exe 516 Updater.exe 3012 Watchdog.exe 3012 Watchdog.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe 516 Updater.exe 3012 Watchdog.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 516 Updater.exe Token: SeDebugPrivilege 2272 Watchdog.exe Token: SeDebugPrivilege 3012 Watchdog.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 516 Updater.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2104 wrote to memory of 4036 2104 RamBoost.exe 86 PID 2104 wrote to memory of 4036 2104 RamBoost.exe 86 PID 4036 wrote to memory of 860 4036 csc.exe 88 PID 4036 wrote to memory of 860 4036 csc.exe 88 PID 2104 wrote to memory of 3100 2104 RamBoost.exe 89 PID 2104 wrote to memory of 3100 2104 RamBoost.exe 89 PID 2104 wrote to memory of 516 2104 RamBoost.exe 91 PID 2104 wrote to memory of 516 2104 RamBoost.exe 91 PID 516 wrote to memory of 2272 516 Updater.exe 93 PID 516 wrote to memory of 2272 516 Updater.exe 93 PID 516 wrote to memory of 2272 516 Updater.exe 93 PID 2272 wrote to memory of 3012 2272 Watchdog.exe 94 PID 2272 wrote to memory of 3012 2272 Watchdog.exe 94 PID 2272 wrote to memory of 3012 2272 Watchdog.exe 94 PID 516 wrote to memory of 1496 516 Updater.exe 98 PID 516 wrote to memory of 1496 516 Updater.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RamBoost.exe"C:\Users\Admin\AppData\Local\Temp\RamBoost.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zsd9vi2x.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8F12.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8F11.tmp"3⤵PID:860
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe" --install2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\Updater.exe"C:\Users\Admin\AppData\Local\Temp\Updater.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Roaming\Watchdog.exe"C:\Users\Admin\AppData\Roaming\Watchdog.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Local\Temp\Updater.exe" 516 /protectFile3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Roaming\Watchdog.exe"C:\Users\Admin\AppData\Roaming\Watchdog.exe" /watchProcess "C:\Users\Admin\AppData\Local\Temp\Updater.exe" 516 "/protectFile"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
-
C:\Windows\SYSTEM32\shutdown.exe"shutdown.exe" /l /t 03⤵PID:1496
-
-
-
C:\Windows\SysWOW64\WindowsInput.exe"C:\Windows\SysWOW64\WindowsInput.exe"1⤵
- Executes dropped EXE
PID:624
-
C:\Users\Admin\AppData\Local\Temp\Updater.exeC:\Users\Admin\AppData\Local\Temp\Updater.exe1⤵
- Executes dropped EXE
PID:4720
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
1KB
MD5311e420b91787ef888a4e01880365de3
SHA170bc7ce364bd8cab8be1a8d0b8d643bb5f274402
SHA256ea24c3570b17e3ced39aea6f081b00b6447bf086dbbef7464eea6dca034575fa
SHA5122a2e7c4d52438365df849d2e8fdc935f5937f5041b8a1b795290f67511154ea80acb787b769e903afcada07504f42dfb6a1813c265f0ff31b36796c3a39bfe88
-
Filesize
11.1MB
MD5a5c93db4c83dab084d6d4ae80ce1e527
SHA1e90866ae65781058b98cb155e35b7ce1445d6139
SHA256d9dc36b7bedf2632fe0a7ca99478b20406d288a69bd7b65e5da2c9d748a5b81f
SHA512e61fdcabc99dbef705ac83dfa347c5f12b584ceec8b4f2fa7997a3f12722944987e65620d2f8764174e2145e7b3e7cf31372f4a591a38e4fc4496063f03e35b7
-
Filesize
76KB
MD5e7875cbdbd78653e051c29bdf85a156a
SHA11a80394edf73165c033890983cd2d08254f9143b
SHA256d9b069606e9506d7ac55c98726fb67e42e8729e9fc5a936dc16b2b0975b05a1e
SHA51277644264d97601d8d53b408a1f2e073e2b667ab78cd6a0d46e94f1284b4da2aeeb0294e9e0b99540ac0316524cd3f7fc1fe244d575510ca19b84ae5f510abaec
-
Filesize
662KB
MD5b36cc7f7c7148a783fbed3493bc27954
SHA144b39651949a00cf2a5cbba74c3210b980ae81b4
SHA256c1ce9a872d33fb8757c59b5cd1f26c93b9eeec3e3cf57162c29a0783e6222a38
SHA512c987c689ecc2cc57350c74ee22b66cb543535bc17b790016ec6407c3d02c539a727f5c38e1451a201e8e7ccfcb4d4639780b6e68cd38b7e67b1b28034ad738a2
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33
-
Filesize
21KB
MD5e6fcf516d8ed8d0d4427f86e08d0d435
SHA1c7691731583ab7890086635cb7f3e4c22ca5e409
SHA2568dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
676B
MD54e188cca06fb8b996835dca991c23f06
SHA151a990bd25cf7354d5372437fa81b4d5bf8c2a79
SHA256ff192fc3b277a4b3c26feaa3484d5313d7e05e5753cccf3710dbcaaaf0d97667
SHA512206f0682040bdc086fb965a6a250d8cef2ca08843d68131d11f3dac4eaeeda4896a270e0fb3c501bddaea1409752d3ac28b3f25bb3b3a62c292cbfef5e6506c7
-
Filesize
208KB
MD59d73b1d8cec7c2480c8a06d5b8405f3e
SHA16058c355a73133f80bc10f162b77d0a9968137a1
SHA2568fbc5c88eb32acdce163dea7eea20e823d3ccad7f03e48f647ce061c24542265
SHA51219591cb83932432f17a1e20fd300d3e66d11e2406d8a6e62078b38c42dbb3e57e8473fbb44708fe7b712ab3b7637cd64bde556209e302dd72db339fd4238b075
-
Filesize
349B
MD517d1d65bdeee6c8b8a3b8a1c7f3ac31f
SHA11fac349461b2aacecded02882fd7c584839103c2
SHA25693e637717eba82b87e9e591ebe40c94ee76c2a4012700212745136f2474ab5fd
SHA5120bbbe85c34d5d841281c06312c4959943aeb2c4fd54c0adc899145c75037af747868b4cb51149d2b24c3faa4ee9d52d30c32707e7b8f9c6d46fbc3415ac44315