Analysis
-
max time kernel
19s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 12:56
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Aura.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Aura.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Aura.exe
-
Size
2.2MB
-
MD5
7c9ee8c189f40e2f9ebd2660a2d2f65d
-
SHA1
5f71be645e8ac995555a891087b46ed357386dbe
-
SHA256
8d963d220e968362d66ebae80e2849dbfb184cc57b6dbb1200c61f217f232326
-
SHA512
7b120ed02236604a162d9a4b33a9d9607bc77dd0fd22b9da8491263a14ded73da4d2240338cda844bc0958aa08658e577034962b95ef1cf841b5004d2688d345
-
SSDEEP
49152:Up+iN+FctfFTJ1fHo7OnfPd5wydwRBLH0Uz+2X:Up+d01fI7AfPSlzlX
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trojan-Ransom.Win32.Aura.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trojan-Ransom.Win32.Aura.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Trojan-Ransom.Win32.Aura.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4972 set thread context of 5048 4972 Trojan-Ransom.Win32.Aura.exe 80 -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0920D0C3-0920-D0C3-0920-D0C30920D0C3}\ = "Installed Apps Enumerator" Trojan-Ransom.Win32.Aura.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0920D0C3-0920-D0C3-0920-D0C30920D0C3}\InProcServer32 Trojan-Ransom.Win32.Aura.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0920D0C3-0920-D0C3-0920-D0C30920D0C3}\InProcServer32\ = "%SystemRoot%\\SysWow64\\appwiz.cpl" Trojan-Ransom.Win32.Aura.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0920D0C3-0920-D0C3-0920-D0C30920D0C3}\InProcServer32\ThreadingModel = "Apartment" Trojan-Ransom.Win32.Aura.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0920D0C3-0920-D0C3-0920-D0C30920D0C3} Trojan-Ransom.Win32.Aura.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:43FE6B9B Trojan-Ransom.Win32.Aura.exe File opened for modification C:\ProgramData\TEMP:43FE6B9B Trojan-Ransom.Win32.Aura.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4972 Trojan-Ransom.Win32.Aura.exe Token: SeIncBasePriorityPrivilege 4972 Trojan-Ransom.Win32.Aura.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4972 wrote to memory of 5048 4972 Trojan-Ransom.Win32.Aura.exe 80 PID 4972 wrote to memory of 5048 4972 Trojan-Ransom.Win32.Aura.exe 80 PID 4972 wrote to memory of 5048 4972 Trojan-Ransom.Win32.Aura.exe 80 PID 4972 wrote to memory of 5048 4972 Trojan-Ransom.Win32.Aura.exe 80 PID 4972 wrote to memory of 5048 4972 Trojan-Ransom.Win32.Aura.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Aura.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Aura.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Aura.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Aura.exe"2⤵PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5048 -ip 50481⤵PID:4980