Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2025, 14:35

General

  • Target

    OrcusRAT/server/Orcus.Server.exe

  • Size

    3.2MB

  • MD5

    700a14ba55fb47f9b8a99ffa92267125

  • SHA1

    43ef6ab246ba72d39cd1a72dd83fee68aceba493

  • SHA256

    594f18a0b5b83c1c64c75830f8e9b2bd4d4629c9c5b9c70b3aa5f0f17b22789a

  • SHA512

    c4ab308a65f267edee887085d358df1ddf83e55fa8f3507209cebc5b44e755f17d583956d170e57e6644d70505a175d58a17f1cdaab13ba7431c4185594804b4

  • SSDEEP

    49152:VB+4yPRRGCvw2/986nZGeE9gwPs+vnEoXevXCdJsur8BF0xXIHnqww5VCkkhQIGa:VB+4mRF42/986wgzMEop+OxXIKZExc8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OrcusRAT\server\Orcus.Server.exe
    "C:\Users\Admin\AppData\Local\Temp\OrcusRAT\server\Orcus.Server.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Costura\21E29AD7CD88FD3C37963FFA4C49AEB2\32\sqlite3.dll

    Filesize

    626KB

    MD5

    d8aec01ff14e3e7ad43a4b71e30482e4

    SHA1

    e3015f56f17d845ec7eef11d41bbbc28cc16d096

    SHA256

    da1d608be064555ab3d3d35e6db64527b8c44f3fa5ddd7c3ec723f80fc99736e

    SHA512

    f5b2f4bda0cc13e1d1c541fb0caea14081ee4daffd497e31a3d4d55d5f9d85a61158b4891a6527efe623b2f32b697ac912320d9be5c0303812ca98dcc8866fcf

  • memory/644-19-0x0000000007D70000-0x0000000007DBC000-memory.dmp

    Filesize

    304KB

  • memory/644-37-0x000000007495E000-0x000000007495F000-memory.dmp

    Filesize

    4KB

  • memory/644-7-0x0000000005BC0000-0x0000000005BFE000-memory.dmp

    Filesize

    248KB

  • memory/644-8-0x0000000005F30000-0x0000000005FC8000-memory.dmp

    Filesize

    608KB

  • memory/644-9-0x0000000074950000-0x0000000075100000-memory.dmp

    Filesize

    7.7MB

  • memory/644-10-0x0000000006580000-0x0000000006B24000-memory.dmp

    Filesize

    5.6MB

  • memory/644-11-0x0000000006150000-0x00000000063E6000-memory.dmp

    Filesize

    2.6MB

  • memory/644-12-0x0000000007150000-0x0000000007768000-memory.dmp

    Filesize

    6.1MB

  • memory/644-13-0x0000000006B30000-0x0000000006E84000-memory.dmp

    Filesize

    3.3MB

  • memory/644-14-0x0000000007770000-0x0000000007802000-memory.dmp

    Filesize

    584KB

  • memory/644-15-0x0000000007810000-0x000000000786C000-memory.dmp

    Filesize

    368KB

  • memory/644-18-0x0000000007D40000-0x0000000007D70000-memory.dmp

    Filesize

    192KB

  • memory/644-1-0x0000000000D40000-0x0000000001078000-memory.dmp

    Filesize

    3.2MB

  • memory/644-17-0x0000000008540000-0x0000000008A6C000-memory.dmp

    Filesize

    5.2MB

  • memory/644-16-0x0000000007E40000-0x0000000008002000-memory.dmp

    Filesize

    1.8MB

  • memory/644-21-0x0000000007DF0000-0x0000000007E11000-memory.dmp

    Filesize

    132KB

  • memory/644-20-0x0000000008110000-0x000000000814C000-memory.dmp

    Filesize

    240KB

  • memory/644-29-0x00000000084D0000-0x00000000084DA000-memory.dmp

    Filesize

    40KB

  • memory/644-30-0x0000000074950000-0x0000000075100000-memory.dmp

    Filesize

    7.7MB

  • memory/644-31-0x0000000074950000-0x0000000075100000-memory.dmp

    Filesize

    7.7MB

  • memory/644-32-0x000000000B810000-0x000000000B82E000-memory.dmp

    Filesize

    120KB

  • memory/644-33-0x000000000CC40000-0x000000000CCBC000-memory.dmp

    Filesize

    496KB

  • memory/644-35-0x0000000007070000-0x000000000707A000-memory.dmp

    Filesize

    40KB

  • memory/644-34-0x0000000007050000-0x000000000705C000-memory.dmp

    Filesize

    48KB

  • memory/644-0-0x000000007495E000-0x000000007495F000-memory.dmp

    Filesize

    4KB

  • memory/644-38-0x0000000074950000-0x0000000075100000-memory.dmp

    Filesize

    7.7MB

  • memory/644-39-0x0000000060900000-0x0000000060992000-memory.dmp

    Filesize

    584KB