Source: Wave.exe | Malware Configuration Extractor: OrcusRAT {"AutostartBuilderProperty": {"AutostartMethod": "Disable", "TaskSchedulerTaskName": "sudik", "TaskHighestPrivileges": "true", "AutoSteal": "true", "Inject": "true", "RegistryHiddenStart": "true", "RegistryKeyName": "Sudik", "TryAllAutostartMethodsOnFail": "true"}, "ChangeAssemblyInformationBuilderProperty": {"ChangeAssemblyInformation": "false", "AssemblyTitle": null, "AssemblyDescription": null, "AssemblyCompanyName": null, "AssemblyProductName": null, "AssemblyCopyright": null, "AssemblyTrademarks": null, "AssemblyProductVersion": "1.0.0.0", "AssemblyFileVersion": "1.0.0.0"}, "ChangeCreationDateBuilderProperty": {"IsEnabled": "false", "NewCreationDate": "2016-11-05T21:17:40"}, "ChangeIconBuilderProperty": {"ChangeIcon": "false", "IconPath": null}, "ClientTagBuilderProperty": {"ClientTag": "Wave"}, "ConnectionBuilderProperty": {"IpAddresses": [{"Ip": "15288.client.sudorat.top", "Port": "15288"}, {"Ip": "15288.client.sudorat.ru", "Port": "15288"}, {"Ip": "31.44.184.52", "Port": "15288"}]}, "DataFolderBuilderProperty": {"Path": "%appdata%\\securedatalifeasync\\"}, "DefaultPrivilegesBuilderProperty": {"RequireAdministratorRights": "true"}, "DisableInstallationPromptBuilderProperty": {"IsDisabled": "true"}, "FrameworkVersionBuilderProperty": {"FrameworkVersion": "NET35"}, "HideFileBuilderProperty": {"HideFile": "true"}, "InstallationLocationBuilderProperty": {"Path": "%appdata%\\securedatalifeasync\\universal_.exe"}, "InstallBuilderProperty": {"Install": "true"}, "KeyloggerBuilderProperty": {"IsEnabled": "false"}, "MutexBuilderProperty": {"Mutex": "sudo_76v3ne68zd8b3j6xeaptqbdkmamvwu08"}, "ProxyBuilderProperty": {"ProxyOption": "None", "ProxyAddress": null, "ProxyPort": "1080", "ProxyType": "2"}, "ReconnectDelayProperty": {"Delay": "10000"}, "RequireAdministratorPrivilegesInstallerBuilderProperty": {"RequireAdministratorPrivileges": "true"}, "RespawnTaskBuilderProperty": {"IsEnabled": "true", "TaskName": "protectjssecure"}, "ServiceBuilderProperty": {"Install": "false"}, "SetRunProgramAsAdminFlagBuilderProperty": {"SetFlag": "true"}, "WatchdogBuilderProperty": {"IsEnabled": "false", "Name": "aga.exe", "WatchdogLocation": "AppData", "PreventFileDeletion": "false"}} |
Source: | Binary string: oC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb\ source: MSBuild.exe, 00000003.00000002.2381687444.0000000006C4C000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: el.pdb source: MSBuild.exe, 00000003.00000002.2364319406.00000000016F9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Orcus-1.9.1-src-main\Orcus.Plugins\obj\Release\Orcus.Plugins.pdb8 source: Wave.exe, 00000000.00000002.1674096769.0000000005390000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdbL source: MSBuild.exe, 00000003.00000002.2380980047.00000000061B0000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: \Orcus-1.9.1-src-main\Orcus.StaticCommands\obj\Release\Orcus.StaticCommands.pdb source: MSBuild.exe, 00000003.00000002.2380794332.0000000006180000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: n0C:\Windows\mscorlib.pdb source: MSBuild.exe, 00000003.00000002.2381687444.0000000006C4C000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: costura.fluentcommandlineparser.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: orcus.plugins;costura.orcus.plugins.dll.zip;costura.orcus.plugins.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: costura.orcus.shared.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: \Orcus-1.9.1-src-main\Orcus.Shared.Utilities\obj\Release\Orcus.Shared.Utilities.pdb source: Wave.exe, 00000000.00000002.1670685146.0000000003083000.00000004.00000800.00020000.00000000.sdmp, Wave.exe, 00000000.00000002.1670685146.0000000002E9A000.00000004.00000800.00020000.00000000.sdmp, Wave.exe, 00000000.00000002.1677518819.0000000005600000.00000004.08000000.00040000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002ACA000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002CB5000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbe4 source: MSBuild.exe, 00000003.00000002.2379629169.0000000005D37000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Orcus-1.9.1-src-main\Orcus.Plugins\obj\Release\Orcus.Plugins.pdb source: Wave.exe, 00000000.00000002.1674096769.0000000005390000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: o.pdb source: MSBuild.exe, 00000003.00000002.2381687444.0000000006C4C000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: costura.orcus.staticcommands.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: %%.pdb source: MSBuild.exe, 00000003.00000002.2381687444.0000000006C4C000.00000004.00000010.00020000.00000000.sdmp |
Source: | Binary string: K:\source\Chrome-Password-Recovery-master\Chrome-Password-Recovery-master\obj\Release\ChromeRecovery.pdbM source: MSBuild.exe, 00000003.00000002.2388704865.00000000077A0000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: directoryinfoex?costura.directoryinfoex.dll.zip?costura.directoryinfoex.pdb.zipUes.microsoft.win32.taskscheduler.resourcesucostura.es.microsoft.win32.taskscheduler.resources.dll.zip/fluentcommandlineparserOcostura.fluentcommandlineparser.dll.zipOcostura.fluentcommandlineparser.pdb.zipUfr.microsoft.win32.taskscheduler.resourcesucostura.fr.microsoft.win32.taskscheduler.resources.dll.zip/icsharpcode.sharpziplibOcostura.icsharpcode.sharpziplib.dll.zipUit.microsoft.win32.taskscheduler.resourcesucostura.it.microsoft.win32.taskscheduler.resources.dll.zip+jetbrains.annotationsKcostura.jetbrains.annotations.dll.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: $^q&costura.orcus.shared.utilities.pdb.zip source: Wave.exe, 00000000.00000002.1670685146.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000002.00000002.1731746246.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000008.00000002.2329000098.00000000029B1000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: costura.shelllibrary.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: orcus.shared9costura.orcus.shared.dll.zip9costura.orcus.shared.pdb.zip-orcus.shared.utilitiesMcostura.orcus.shared.utilities.dll.zipMcostura.orcus.shared.utilities.pdb.zip)orcus.staticcommandsIcostura.orcus.staticcommands.dll.zipIcostura.orcus.staticcommands.pdb.zip%sharpdx.direct3d11Ecostura.sharpdx.direct3d11.dll.zip#sharpdx.direct3d9Ccostura.sharpdx.direct3d9.dll.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: D:\Dokumente\GitHub\starksoft-aspen\Starksoft.Aspen\obj\Release\starksoft.aspen.pdb source: MSBuild.exe, 00000003.00000002.2380980047.00000000061B0000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: MSBuild.exe, 00000003.00000002.2364319406.00000000016F9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: el.pdb.. source: MSBuild.exe, 00000003.00000002.2364319406.00000000016F9000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: $^q$costura.orcus.staticcommands.pdb.zip source: Wave.exe, 00000000.00000002.1670685146.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000002.00000002.1731746246.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000008.00000002.2329000098.00000000029B1000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: C:\Users\dahall\Documents\Visual Studio 2010\Projects\TaskService\obj\Release\Microsoft.Win32.TaskScheduler.pdb source: universal_.exe, 00000001.00000002.1682970469.0000000003B34000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1682970469.0000000003C3B000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002CB5000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1690727858.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2373279351.000000000445C000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.000000000359B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2373279351.00000000043E4000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: costura.directoryinfoex.pdb.zip source: universal_.exe, 00000001.00000002.1681076672.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000002.00000002.1731746246.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000008.00000002.2329000098.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, Wave.exe, universal_.exe.0.dr |
Source: | Binary string: opuswrapper7costura.opuswrapper.dll.zip7costura.opuswrapper.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: costura.directoryinfoex.pdb.zipxp source: Wave.exe, 00000000.00000002.1670685146.0000000002E51000.00000004.00000800.00020000.00000000.sdmp |
Source: | Binary string: \Orcus-1.9.1-src-main\Orcus.Shared\obj\Release\Orcus.Shared.pdb source: Wave.exe, 00000000.00000002.1671238024.0000000003F03000.00000004.00000800.00020000.00000000.sdmp, Wave.exe, 00000000.00000002.1671238024.0000000003FB5000.00000004.00000800.00020000.00000000.sdmp, Wave.exe, 00000000.00000002.1677607852.0000000005610000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: costura.opuswrapper.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: K:\source\Chrome-Password-Recovery-master\Chrome-Password-Recovery-master\obj\Release\ChromeRecovery.pdb source: MSBuild.exe, 00000003.00000002.2388704865.00000000077A0000.00000004.08000000.00040000.00000000.sdmp |
Source: | Binary string: costura.orcus.shared.utilities.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: shelllibrary9costura.shelllibrary.dll.zip9costura.shelllibrary.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: costura.orcus.plugins.pdb.zip source: Wave.exe, universal_.exe.0.dr |
Source: | Binary string: $^q'costura.fluentcommandlineparser.pdb.zip source: Wave.exe, 00000000.00000002.1670685146.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000002.00000002.1731746246.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000008.00000002.2329000098.00000000029B1000.00000004.00000800.00020000.00000000.sdmp |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: MSBuild.exe, 00000003.00000002.2364319406.00000000016C1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: MSBuild.exe, 00000003.00000002.2379629169.0000000005CE4000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.3.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/ |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/Orcus.Shared.Commands.EventLog |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.datacontract.org/2004/07/Orcus.Shared.Commands.Registry |
Source: MSBuild.exe, 00000003.00000002.2366733745.000000000363F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.mLR |
Source: MSBuild.exe, 00000003.00000002.2382690824.0000000007111000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.mic |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: Wave.exe, 00000000.00000002.1670685146.0000000002E9A000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002ACA000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000002.00000002.1731746246.0000000002EC9000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000008.00000002.2329000098.00000000029FF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault$ |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: Wave.exe, 00000000.00000002.1670685146.0000000003083000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002CB5000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Wave.exe, 00000000.00000002.1670685146.0000000002E9A000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002ACA000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000002.00000002.1731746246.0000000002EC9000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000008.00000002.2329000098.0000000002BBA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/ |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/CreateSubKey |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/CreateSubKeyResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/CreateValue |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/CreateValueResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/DeleteFile |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/DeleteFileResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/DeleteSubKey |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/DeleteSubKeyResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/DeleteValue |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/DeleteValueResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/GetPath |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/GetPathResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/GetRegistrySubKeys |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/GetRegistrySubKeysResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/GetRegistryValues |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/GetRegistryValuesResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/GetSecurityEventLog |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/GetSecurityEventLogResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/IsAlive |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/IsAliveResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/StartProcess |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/StartProcessResponse |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/WriteFile |
Source: MSBuild.exe, 00000003.00000002.2366733745.0000000003131000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/IServicePipe/WriteFileResponse |
Source: Wave.exe, universal_.exe.0.dr | String found in binary or memory: https://api.ipify.org/I(. |
Source: MSBuild.exe, 00000003.00000002.2390146914.000000000856C000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2 |
Source: universal_.exe, 00000001.00000002.1682970469.0000000003B34000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1682970469.0000000003C3B000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002CB5000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1690727858.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2373279351.000000000445C000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.000000000359B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2373279351.00000000043E4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://taskscheduler.codeplex.com/ |
Source: universal_.exe, 00000001.00000002.1682970469.0000000003B34000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1682970469.0000000003C3B000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1681076672.0000000002CB5000.00000004.00000800.00020000.00000000.sdmp, universal_.exe, 00000001.00000002.1690727858.0000000005B40000.00000004.08000000.00040000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2373279351.000000000445C000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2366733745.000000000359B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.2373279351.00000000043E4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://taskscheduler.codeplex.com/F |
Source: Wave.exe, type: SAMPLE | Matched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam |
Source: Wave.exe, type: SAMPLE | Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 3.2.MSBuild.exe.77a0000.6.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: 0.0.Wave.exe.710000.0.unpack, type: UNPACKEDPE | Matched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam |
Source: 0.0.Wave.exe.710000.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 1.2.universal_.exe.3f690d0.7.unpack, type: UNPACKEDPE | Matched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam |
Source: 1.2.universal_.exe.3f690d0.7.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 1.2.universal_.exe.3f690d0.7.raw.unpack, type: UNPACKEDPE | Matched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam |
Source: 1.2.universal_.exe.3f690d0.7.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: 00000003.00000002.2388704865.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Quasar RAT Author: Florian Roth |
Source: 00000000.00000000.1660970759.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam |
Source: 00000001.00000002.1682970469.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe, type: DROPPED | Matched rule: RAT_Orcus Author: J from THL <j@techhelplist.com> with thx to MalwareHunterTeam |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe, type: DROPPED | Matched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen |
Source: C:\Users\user\Desktop\Wave.exe | Code function: 0_2_013A8D40 | 0_2_013A8D40 |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Code function: 1_2_02A087F0 | 1_2_02A087F0 |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Code function: 1_2_02A0ED90 | 1_2_02A0ED90 |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Code function: 1_2_05509EE0 | 1_2_05509EE0 |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Code function: 1_2_0550A6EF | 1_2_0550A6EF |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Code function: 2_2_02CD8D40 | 2_2_02CD8D40 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_01669180 | 3_2_01669180 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_05911688 | 3_2_05911688 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_059169C8 | 3_2_059169C8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_05911679 | 3_2_05911679 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_05915B78 | 3_2_05915B78 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_05917A98 | 3_2_05917A98 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_06E382B9 | 3_2_06E382B9 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_06E32B08 | 3_2_06E32B08 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_06E3275C | 3_2_06E3275C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_06E33F7F | 3_2_06E33F7F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_06E30F34 | 3_2_06E30F34 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_072E0710 | 3_2_072E0710 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_072EE2F8 | 3_2_072EE2F8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_072E0FE0 | 3_2_072E0FE0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_072E03C8 | 3_2_072E03C8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_073D3FC8 | 3_2_073D3FC8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_073D5A40 | 3_2_073D5A40 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_073D71F0 | 3_2_073D71F0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_07402700 | 3_2_07402700 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_074006B8 | 3_2_074006B8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_074022C0 | 3_2_074022C0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_07407218 | 3_2_07407218 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_0740B818 | 3_2_0740B818 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | Code function: 3_2_07402B28 | 3_2_07402B28 |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe | Code function: 8_2_00FF87F0 | 8_2_00FF87F0 |
Source: Wave.exe, 00000000.00000000.1661348029.0000000000A0A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilename. vs Wave.exe |
Source: Wave.exe, 00000000.00000002.1670685146.0000000003083000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameOrcus.Shared.Utilities.dllN vs Wave.exe |
Source: Wave.exe, 00000000.00000002.1670685146.0000000002E9A000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameOrcus.Shared.Utilities.dllN vs Wave.exe |
Source: Wave.exe, 00000000.00000002.1674096769.0000000005390000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameOrcus.Plugins.dll< vs Wave.exe |
Source: Wave.exe, 00000000.00000002.1669661864.0000000000FF8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs Wave.exe |
Source: Wave.exe, 00000000.00000002.1671238024.0000000003F03000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameOrcus.Shared.dllB vs Wave.exe |
Source: Wave.exe, 00000000.00000002.1671238024.0000000003FB5000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameOrcus.Shared.dllB vs Wave.exe |
Source: Wave.exe, 00000000.00000002.1677607852.0000000005610000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameOrcus.Shared.dllB vs Wave.exe |
Source: Wave.exe, 00000000.00000002.1677518819.0000000005600000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameOrcus.Shared.Utilities.dllN vs Wave.exe |
Source: Wave.exe | Binary or memory string: OriginalFilename. vs Wave.exe |
Source: Wave.exe, type: SAMPLE | Matched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/ |
Source: Wave.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 3.2.MSBuild.exe.77a0000.6.raw.unpack, type: UNPACKEDPE | Matched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.Wave.exe.710000.0.unpack, type: UNPACKEDPE | Matched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/ |
Source: 0.0.Wave.exe.710000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 1.2.universal_.exe.3f690d0.7.unpack, type: UNPACKEDPE | Matched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/ |
Source: 1.2.universal_.exe.3f690d0.7.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 1.2.universal_.exe.3f690d0.7.raw.unpack, type: UNPACKEDPE | Matched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/ |
Source: 1.2.universal_.exe.3f690d0.7.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |
Source: 00000003.00000002.2388704865.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000000.1660970759.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/ |
Source: 00000001.00000002.1682970469.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/ |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe, type: DROPPED | Matched rule: RAT_Orcus date = 2017/01, filetype = memory, author = J from THL <j@techhelplist.com> with thx to MalwareHunterTeam, version = RAT, reference = https://virustotal.com/en/file/0ef747363828342c184303f2d6fbead054200e9c223e5cfc4777cda03006e317/analysis/ |
Source: C:\Users\user\AppData\Roaming\securedatalifeasync\universal_.exe, type: DROPPED | Matched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers |