Analysis

  • max time kernel
    142s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 00:59

General

  • Target

    Orcus RAT 1.9.1/Orcus.Administration/Orcus.Administration.exe

  • Size

    3.9MB

  • MD5

    37349777df1cc9c8d3d62eb733f7cd45

  • SHA1

    456233fa947ab155dbe5636eda0a77346197bb4c

  • SHA256

    0121f2d7ddc074ffa05619dbb2a4b555a4b550168a765b57fa8bd9298a7e4b52

  • SHA512

    ca4e1a39dbb0fa0c6bbef7142cf457856cc2db14c03b5b9ea5c28811a3a70cc05505320f50e133e166aad25d779ac043b0f29b09bb34a342f5111603cc5dd074

  • SSDEEP

    49152:VZV/t1QLjeVxAl40NVANW8cyTXTG1H66VbTWnepAl4:VZVDVxAl40NG48cyTKjVbTWnepAl4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Orcus RAT 1.9.1\Orcus.Administration\Orcus.Administration.exe
    "C:\Users\Admin\AppData\Local\Temp\Orcus RAT 1.9.1\Orcus.Administration\Orcus.Administration.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=Orcus.Administration.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cdbdf3f94ff36a7e4dec354faeaf29b9

    SHA1

    53ea4f7a706c0f5ae9275a3961517c87104ebf47

    SHA256

    179b2d6b18d73e916e19c8c7112ce594a557bbaea0fa65fcf16e25607dd5ed70

    SHA512

    0f80cbe990c902eda20d52154c28e8c225bbd47782ea26d8a0f3a0d2cf46d414783e07a5f26d8a93f5c256c78199a7bfa27c8c3de2f57ac99d3d63f5a7523338

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1e907945555965270eece0008025a75

    SHA1

    5b7a07f0761f3956c231c0bc4a90307208c1bbb6

    SHA256

    55746ea3c546496ec5f8cfeeed818bd195e24473c3b52cc1b319f13a868ded10

    SHA512

    ee05d1bd4fc3c67f3fe60a4ea6f366d85e56204092da1602c1fc68dc4e4fc00f17dda170f8cfc3613d8cbef547bb710ad8abd591e2d0f7f0bfc3378d48c5a8ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ff5957f457b0e744b17b36c5bffdb81c

    SHA1

    7f6b7f9ee0d265805a489d26d4abe21aee98f66c

    SHA256

    05e120febac06b6178e54f82c214bc42088f1b77e581a0ec7345b795ab412704

    SHA512

    c94cd71e171615543d47e5bec20408de980bb0efc753517e9997945c943b2991127aa00fec4ab0e2881ea265932210430413542159564b0f5deff7323c6c3563

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8e0597d1e434d43543aecaff7ed8337

    SHA1

    ede0687750fb23cf107cf105b04b7448a9a93d40

    SHA256

    894408fe520ba8dd30024f96e4c5e5a88bceae4a9758acbb6184ed4b12ba047c

    SHA512

    3a8b64771f3dd2998360dffd3f8ac27eafe5d40ce888bf91315b616372235eea8619c3788d5e73077e38294ce6a7ce3ce50a886c32eb6378558185ea769e919d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    05ac1f2fbcff48002bc3273d84814b41

    SHA1

    56bb4d59f0c35cdf42e181fa52b86145d3efb186

    SHA256

    942dbb3310fb4ad01b6520a4fce2390ee43a574ffae407deab8bb9f2074a6d98

    SHA512

    e34eed56f7b73c12c1377ba229d80b91f9f53f4f47b713558c34d4353d15eb811a384d722707631cdc448c8dd36f4a288d910266e5ae886b063612d0da03274c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17eef6b30d19afa6d2f49a6d164a3158

    SHA1

    854029c7370ffc32eb47a722d293ad094176e252

    SHA256

    124f68cf3941e2ed2615fc0fb1f981e9042d2eb1ff52785412da77911d444abd

    SHA512

    0a74c2d9303050e17d2741b44df6bbebdbc4f64645429fa325f6fe247ea2e6b049e279bf578087fad50bb80c7ef24edc47ba39703d60888f46e1672bec373a4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39a168f58bd58a82f1ec5304e1526112

    SHA1

    e1c1eb295bc5f2d5e3264df2a00cfa7a1642d859

    SHA256

    d2be81b6a358cf98afcc0e53cda4265690cf0e44e4a34392fa7a70953af3f941

    SHA512

    85a4e579aadf5091abfc6390846abb5d20dc9bc5355415b35f969e35b6017ebd5947399d637bbba4cec9f42b4573840b6382716bdf6360f65114636d93e5f8e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c8df2e4e81f724abe754cce997a3ab8

    SHA1

    2990f76dba1b271870e35812203c6c5865217624

    SHA256

    fadf54fea244fa8fa5abf841f0c955d7d67a043fd542149e6d95e81f6faee013

    SHA512

    8dacf7422629fbaa50cc1cf01db88e7dadd18cdcecc767c6ebfaadfc1c245d7718aedd5298ac4128115660082b9c9567828033759f3e49ec741aed66d95fd975

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    219d64b0b147dee6fe677e0dcbc2736b

    SHA1

    c7a91a45392f808342d8eb513a60962bf1daf838

    SHA256

    590099e8cbc8872c6042df2676a121a73adcb9c5836372db85d1a9bd6d68e0b8

    SHA512

    15e639d557eea1462171bd30121ccc9c51f97a876967ba56b803d0c3ff134fbff8a8461cbabda56de6b6247730e2df89a5a61d09c860ddc92b13b08f514607ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d4b6cc7d31f2221ddc6f5ea598e0ed9

    SHA1

    c327700f170cf0487d93c1f07014c2aed31016fe

    SHA256

    ea96dc2e43ed950833efe805b2ea40c92275caa4be69779ffbfc5fe1b5aeb0bd

    SHA512

    a80babc7a68c354ee0bb04e91a2cba885ddb8c77c301e2a5e4716bee5088e54fb873bc97dd86695f74f819f4a191ac2d5f4f6dc80a964da1a2c606dbef2efd11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0752c1e610cb92340283d0c13299182f

    SHA1

    557be8ae028430777bdf9283d6151bb45c38316f

    SHA256

    61b71b635d34338f572536dc88e3e196d508b5d450276b93d51562f009ab41b0

    SHA512

    721727cbc793b2297993d7ef546bf1232fa5360085b1f6b65e5c62ea5a22a0efd81873e557424749f99868535cd04203fa0f5a5d9e2819810b92a1696218ce89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5791fcc06768e49906dacce04783285

    SHA1

    7565227cedd579de0e0a7245b2bb45992733d94f

    SHA256

    3c37c1ae912de4ae51758dc5d486d2bc181dd9e67bb484466be4a53d5ce09210

    SHA512

    d6b78a50f453716c87c2db755aca2a56cacaf23299038b762c076b4be6902859bdfdae86bef8467a11b81c36a20f9777b147d9d6548ebe0429f8d481bfea504f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32c13204d9fd7322e0b78e64345bbd23

    SHA1

    69c9fa7f34cb1e5c1a31945838e55478c3de82c9

    SHA256

    b53e65ceb2684c5380f086b6d8a1782b4950c1027682aa5fd3087cc633305238

    SHA512

    ce1889b0a6f5292dafbc8668787e384e1db3061a1a48dee97a4be4d7fb40af39a3faf56ae7926163c65e8e57042ebbf4b4d953635547c61136dd6170960f5c07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3be4b5f77af033191496ff242f07b39

    SHA1

    9abe78c132c995f6f83323e5a546e0cbc0384c02

    SHA256

    ab77d6575cf2391104b16203e9ddaae06d05c77ce378de31fa119acd91d87f0c

    SHA512

    302688b7442d2dfd081d03e9fdb8db67919ba77d5b18a08655a8cb0a258854daf7c8baab0383316e9afad8022b5e9555a0423ce1bb0aead915721511224f8234

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b997364d56c07506ed4f1c09743c9b8c

    SHA1

    405c699631309700a91bf0ec716af685c680bf2b

    SHA256

    c29906354fb2cb8075532af879fff96de2cf368b795d31e9d9919f6fba477e87

    SHA512

    3e3d0af0cc8300559b86b6aef06ed2bdb6b371d47cc96d9859503be1ac4a6ee34873581397294d8714509c339f36387df71b5a91592b75eddfee2a08432adbfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b9e6c1630dbc9393c6bd22d8c32839e

    SHA1

    754beb172fc4d5588721ddde3503681574739fe0

    SHA256

    8bde7db4307fcfade6e87462c03cdc7c584ccf42a67819a915ae15444fe1fc9b

    SHA512

    f341caf2b4d5e0c4e218fd10b1fc64c1481743bfee6d5df4716b45122d5efed38d73387cca531d2d39a9da53ca29d1da07311548a8b9bc3ef29747b49aa4dc76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89fc95f186caaea309e2c365ce7fe98a

    SHA1

    e70df088d0b4ee7ded685618d394f2f2deae94f3

    SHA256

    e7b625f1e4d47e1ff04c67fc45e78fa543ff565eafd4220de0bec4dc93a10b8d

    SHA512

    9bd3a1bd4c0b4664368287c93096cbd026c1d197b59f732e60a66a7d5e375a8a081367b36cd90ea6a7b2ff4888f882d606231133822349bf5b0321019a5be74f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5779f53b3117638d6d0194c3626009d3

    SHA1

    bcd494c1eefbe64cc0e902ddbb61dd1ef13e4edb

    SHA256

    cf29dbee8e548cca48e21a261e9c6015ab115ae55becb77662299bccaf539e3c

    SHA512

    a65021162c47a00fe146079377deecb9ffcef025a8a29fe49d9ef94d4f8c80619f89f1cbea8a7d0edd40045c7f5ed3c77e46a46cf19c0d4bfdfd0c8cfeb83767

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c80758070b4955949a986bbe787decb7

    SHA1

    baa1e4a1d862951eb5c75061916ff9d8d08e89ff

    SHA256

    4edf06b23b211753187fdcd5e9de44f9e5c0f9897c677f3c154bbd406a56bb9c

    SHA512

    2ce2160e5bb47bcce09adc497cfe4dd0a9ef5624fe6579506d232e6bbf258847798cbba691860a7ef4092c48502d579f88d0139397d063f45ea76142bd3dfbaa

  • C:\Users\Admin\AppData\Local\Temp\Tar31A2.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc