File name:

1.exe

Full analysis: https://app.any.run/tasks/52ee6027-480e-4b1b-af44-4258fbfa60c6
Verdict: Malicious activity
Threats:

Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.

Analysis date: October 22, 2023, 14:04:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
orcus
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

C02308EF085B976898FA42B065254AA2

SHA1:

95E03E7644A56AF5FEFC12C32B2C86B2C20FE5AF

SHA256:

6B4ADC3F05B6F7968D826B26B6A472AD3906A5B659EAE167BD3A922415C6133D

SSDEEP:

24576:AeQ3d3P51k22nQE7Wj6wogps/+LLjhAddddGPQF5YXrZlI0AilFEvxHicf:AeKd3P51k22nQE7Wj6wogps/+L/hUF5c

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Orcus is detected

      • 1.exe (PID: 2628)
      • 1.exe (PID: 2212)
    • Starts Visual C# compiler

      • 1.exe (PID: 2628)
      • 1.exe (PID: 2212)
    • Drops the executable file immediately after the start

      • csc.exe (PID: 3560)
      • csc.exe (PID: 2460)
    • ORCUS has been detected (YARA)

      • 1.exe (PID: 2212)
  • SUSPICIOUS

    • Uses .NET C# to load dll

      • 1.exe (PID: 2628)
      • 1.exe (PID: 2212)
    • Reads the Internet Settings

      • 1.exe (PID: 2628)
      • eventvwr.exe (PID: 2264)
      • 1.exe (PID: 2212)
  • INFO

    • Create files in a temporary directory

      • 1.exe (PID: 2628)
      • cvtres.exe (PID: 1860)
      • csc.exe (PID: 3560)
      • 1.exe (PID: 2212)
      • csc.exe (PID: 2460)
      • cvtres.exe (PID: 3968)
    • Checks supported languages

      • 1.exe (PID: 2628)
      • csc.exe (PID: 3560)
      • cvtres.exe (PID: 1860)
      • 1.exe (PID: 2212)
      • csc.exe (PID: 2460)
      • cvtres.exe (PID: 3968)
    • Reads the machine GUID from the registry

      • 1.exe (PID: 2628)
      • csc.exe (PID: 3560)
      • cvtres.exe (PID: 1860)
      • 1.exe (PID: 2212)
      • csc.exe (PID: 2460)
      • cvtres.exe (PID: 3968)
    • Reads the computer name

      • 1.exe (PID: 2628)
      • 1.exe (PID: 2212)
    • Reads Environment values

      • 1.exe (PID: 2212)
    • Creates files or folders in the user directory

      • 1.exe (PID: 2212)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Orcus

(PID) Process(2212) 1.exe
C2 (1)192.168.171.129:10134
Keys
AES8601972730630084fbef2856bd652994bdb43896794d4f1e4939f1e38f67f2ae
Salt
Options
AutostartBuilderProperty
AutostartMethodDisable
TaskSchedulerTaskNameOrcus
TaskHighestPrivilegestrue
RegistryHiddenStarttrue
RegistryKeyNameOrcus
TryAllAutostartMethodsOnFailtrue
ChangeAssemblyInformationBuilderProperty
ChangeAssemblyInformationfalse
AssemblyTitlenull
AssemblyDescriptionnull
AssemblyCompanyNamenull
AssemblyProductNamenull
AssemblyCopyrightnull
AssemblyTrademarksnull
AssemblyProductVersion1.0.0.0
AssemblyFileVersion1.0.0.0
ChangeCreationDateBuilderProperty
IsEnabledfalse
NewCreationDate2023-10-22T21:04:57.5154033+07:00
ChangeIconBuilderProperty
ChangeIconfalse
IconPathnull
ClientTagBuilderProperty
ClientTagnull
DataFolderBuilderProperty
Path%appdata%\Orcus
DefaultPrivilegesBuilderProperty
RequireAdministratorRightsfalse
DisableInstallationPromptBuilderProperty
IsDisabledfalse
FrameworkVersionBuilderProperty
FrameworkVersionNET35
HideFileBuilderProperty
HideFilefalse
InstallationLocationBuilderProperty
Path%programfiles%\Orcus\Orcus.exe
InstallBuilderProperty
Installtrue
KeyloggerBuilderProperty
IsEnabledfalse
MutexBuilderProperty
Mutex186d21ec80e143edb3384fa80d4ee7f8
ProxyBuilderProperty
ProxyOptionNone
ProxyAddressnull
ProxyPort1080
ProxyType2
ReconnectDelayProperty
Delay10000
RequireAdministratorPrivilegesInstallerBuilderProperty
RequireAdministratorPrivilegestrue
RespawnTaskBuilderProperty
IsEnabledfalse
TaskNameOrcus Respawner
ServiceBuilderProperty
Installfalse
SetRunProgramAsAdminFlagBuilderProperty
SetFlagfalse
WatchdogBuilderProperty
IsEnabledfalse
NameOrcusWatchdog.exe
WatchdogLocationAppData
PreventFileDeletionfalse
Plugins
PluginNameBSoD Protection
PluginVersion2.0
ResourceName06d297dd28034bf185c054365b1b5c69
ResourceTypeClientPlugin
Guiddccbc1db-f7d1-413d-bba4-72611d485d3a
PluginNameDisable Webcam Lights
PluginVersion1.0
ResourceNamed642017b128b419c8990e83dfdf1ddf4
ResourceTypeClientPlugin
Guide6ee5674-bb94-46c7-8bbc-5729af6e2c28
PluginNameSilent Elevation
PluginVersion1.5
ResourceName4a5052c298ac4ad2b41f8f16a1437acd
ResourceTypeClientPlugin
Guid0a189c79-87ca-4d8d-bfb5-fac811f4048e
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:10:22 16:05:14+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 930304
InitializedDataSize: 4608
UninitializedDataSize: -
EntryPoint: 0xe506e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: Orcus.exe
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: Orcus.exe
ProductName: -
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
8
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ORCUS 1.exe no specs csc.exe no specs cvtres.exe no specs eventvwr.exe no specs eventvwr.exe #ORCUS 1.exe no specs csc.exe no specs cvtres.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1860C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESC88E.tmp" "c:\Users\admin\AppData\Local\Temp\CSCC87E.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
2212"C:\Users\admin\AppData\Local\Temp\1.exe" C:\Users\admin\AppData\Local\Temp\1.exe
eventvwr.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\users\admin\appdata\local\temp\1.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Orcus
(PID) Process(2212) 1.exe
C2 (1)192.168.171.129:10134
Keys
AES8601972730630084fbef2856bd652994bdb43896794d4f1e4939f1e38f67f2ae
Salt
Options
AutostartBuilderProperty
AutostartMethodDisable
TaskSchedulerTaskNameOrcus
TaskHighestPrivilegestrue
RegistryHiddenStarttrue
RegistryKeyNameOrcus
TryAllAutostartMethodsOnFailtrue
ChangeAssemblyInformationBuilderProperty
ChangeAssemblyInformationfalse
AssemblyTitlenull
AssemblyDescriptionnull
AssemblyCompanyNamenull
AssemblyProductNamenull
AssemblyCopyrightnull
AssemblyTrademarksnull
AssemblyProductVersion1.0.0.0
AssemblyFileVersion1.0.0.0
ChangeCreationDateBuilderProperty
IsEnabledfalse
NewCreationDate2023-10-22T21:04:57.5154033+07:00
ChangeIconBuilderProperty
ChangeIconfalse
IconPathnull
ClientTagBuilderProperty
ClientTagnull
DataFolderBuilderProperty
Path%appdata%\Orcus
DefaultPrivilegesBuilderProperty
RequireAdministratorRightsfalse
DisableInstallationPromptBuilderProperty
IsDisabledfalse
FrameworkVersionBuilderProperty
FrameworkVersionNET35
HideFileBuilderProperty
HideFilefalse
InstallationLocationBuilderProperty
Path%programfiles%\Orcus\Orcus.exe
InstallBuilderProperty
Installtrue
KeyloggerBuilderProperty
IsEnabledfalse
MutexBuilderProperty
Mutex186d21ec80e143edb3384fa80d4ee7f8
ProxyBuilderProperty
ProxyOptionNone
ProxyAddressnull
ProxyPort1080
ProxyType2
ReconnectDelayProperty
Delay10000
RequireAdministratorPrivilegesInstallerBuilderProperty
RequireAdministratorPrivilegestrue
RespawnTaskBuilderProperty
IsEnabledfalse
TaskNameOrcus Respawner
ServiceBuilderProperty
Installfalse
SetRunProgramAsAdminFlagBuilderProperty
SetFlagfalse
WatchdogBuilderProperty
IsEnabledfalse
NameOrcusWatchdog.exe
WatchdogLocationAppData
PreventFileDeletionfalse
Plugins
PluginNameBSoD Protection
PluginVersion2.0
ResourceName06d297dd28034bf185c054365b1b5c69
ResourceTypeClientPlugin
Guiddccbc1db-f7d1-413d-bba4-72611d485d3a
PluginNameDisable Webcam Lights
PluginVersion1.0
ResourceNamed642017b128b419c8990e83dfdf1ddf4
ResourceTypeClientPlugin
Guide6ee5674-bb94-46c7-8bbc-5729af6e2c28
PluginNameSilent Elevation
PluginVersion1.5
ResourceName4a5052c298ac4ad2b41f8f16a1437acd
ResourceTypeClientPlugin
Guid0a189c79-87ca-4d8d-bfb5-fac811f4048e
2216"C:\Windows\System32\eventvwr.exe" C:\Windows\System32\eventvwr.exe1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Event Viewer Snapin Launcher
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\eventvwr.exe
c:\windows\system32\ntdll.dll
2264"C:\Windows\System32\eventvwr.exe" C:\Windows\System32\eventvwr.exe
1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Event Viewer Snapin Launcher
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\eventvwr.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
2460"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\xdxu6gw4.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.5483 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\csc.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\user32.dll
2628"C:\Users\admin\AppData\Local\Temp\1.exe" C:\Users\admin\AppData\Local\Temp\1.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3560"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\km6st6y2.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.5483 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\microsoft.net\framework\v2.0.50727\csc.exe
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
3968C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESCB5D.tmp" "c:\Users\admin\AppData\Local\Temp\CSCCB5C.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
Total events
1 143
Read events
1 126
Write events
16
Delete events
1

Modification events

(PID) Process:(2628) 1.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2628) 1.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2628) 1.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2628) 1.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2264) eventvwr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2264) eventvwr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2264) eventvwr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2264) eventvwr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2212) 1.exeKey:HKEY_CLASSES_ROOT\mscfile\shell\open\command
Operation:delete keyName:(default)
Value:
Executable files
2
Suspicious files
4
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
26281.exeC:\Users\admin\AppData\Local\Temp\km6st6y2.cmdlinetext
MD5:DABA9F1F3BCA8A818CBFE487C70598F6
SHA256:AFB25121DBC1524D0E94CADD35FB1A5AB2411F8F24DA4F4D63D4974D576553B8
3560csc.exeC:\Users\admin\AppData\Local\Temp\CSCC87E.tmpbinary
MD5:F0804F2988A43D5C632A3704B99FFEBE
SHA256:4AC4D0A8CDE3B80C7D6862AF1532BD0DC8163809E7263A31A69BE7371A4B4B93
1860cvtres.exeC:\Users\admin\AppData\Local\Temp\RESC88E.tmpbinary
MD5:6A5897B88BD32CD871DE8C57CEA525AC
SHA256:4C657C6EFEC49127FDB0F7937A677F5999A09A20465B97221B348E126A1460F9
3560csc.exeC:\Users\admin\AppData\Local\Temp\km6st6y2.dllexecutable
MD5:EE2D721788C3565141811F3A79C8E106
SHA256:3E104C634EAE12D9E2A141F209D4C94E90FF5BA0B11E8BF38F64E2E08DFC91A4
22121.exeC:\Users\admin\AppData\Local\Temp\xdxu6gw4.cmdlinetext
MD5:913A1EAC9CC98EDB33CD82C5298F993F
SHA256:691C6BAF43FF3063A445C7CDF43218A7740100D31B186370C158A00E60E64E58
26281.exeC:\Users\admin\AppData\Local\Temp\km6st6y2.0.cstext
MD5:69B80BA422B0D205E21CD1F9AFB512F4
SHA256:A284675C365CB2D685AA5CFEDC968B650FC34EA0CD1EA69F466E29B64B99E88B
3560csc.exeC:\Users\admin\AppData\Local\Temp\km6st6y2.outtext
MD5:1E344B58B0D2D113D56810E439482866
SHA256:8C810FBB6036C606A576CFA50B93908C4563662F360C326F2C7263619930876C
22121.exeC:\Users\admin\AppData\Roaming\Orcus\err_186d21ec80e143edb3384fa80d4ee7f8.dattext
MD5:B432CAE5DE31160A59A27DE012F1A145
SHA256:7C571C6AAF3AA076C22CDE45AAA55F3C21F04379E0BAE21171CC70F625B9C432
2460csc.exeC:\Users\admin\AppData\Local\Temp\xdxu6gw4.outtext
MD5:664AE327604866E716D34D2C0EF79F89
SHA256:2B4F5B3D09F80997983CD4E71E11A9A707024DB847755989C2994947E94316F6
3968cvtres.exeC:\Users\admin\AppData\Local\Temp\RESCB5D.tmpbinary
MD5:603A4C042FA7CFE94B7CEDD2324608DA
SHA256:0DB31F59661B0317E0171FA0139240629CA2B5F75A515BBDEA7F71FB1263664D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
dl.n1ckna.me
unknown

Threats

No threats detected
No debug info