Analysis
-
max time kernel
94s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2023, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
ad64a6e6e563e0aa8afcf4ce2e001363a20d8fcd5b6f6b0003329ce1f543f5bc.exe
Resource
win7-20221111-en
3 signatures
300 seconds
General
-
Target
ad64a6e6e563e0aa8afcf4ce2e001363a20d8fcd5b6f6b0003329ce1f543f5bc.exe
-
Size
268KB
-
MD5
50a3cdeb5ecd78be788dd9232db6fa79
-
SHA1
baef08dfe4b9ec5abc00aefa81d3656952e07b37
-
SHA256
ad64a6e6e563e0aa8afcf4ce2e001363a20d8fcd5b6f6b0003329ce1f543f5bc
-
SHA512
255bb8133a62a9bc49fea8933217639fb3191648c5403cb4972865ecc53cccda4f1a3f90278a9e08d78e7cc3376047472cfae364184b8ef8b9d420f10a7aaf3d
-
SSDEEP
3072:gpE5D8eEcnqm7h+UpV4Uqdd84sIDSQKyYyPuev/9LmAx7wAoBtgsWrYkgx1IPP:twcnqpU0dduIDAyPug/9LmAx7wRH1IPP
Malware Config
Extracted
Family
aurora
C2
45.15.156.242:8081
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 8 2756 powershell.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2756 set thread context of 4592 2756 powershell.exe 85 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2756 powershell.exe Token: SeIncreaseQuotaPrivilege 4384 wmic.exe Token: SeSecurityPrivilege 4384 wmic.exe Token: SeTakeOwnershipPrivilege 4384 wmic.exe Token: SeLoadDriverPrivilege 4384 wmic.exe Token: SeSystemProfilePrivilege 4384 wmic.exe Token: SeSystemtimePrivilege 4384 wmic.exe Token: SeProfSingleProcessPrivilege 4384 wmic.exe Token: SeIncBasePriorityPrivilege 4384 wmic.exe Token: SeCreatePagefilePrivilege 4384 wmic.exe Token: SeBackupPrivilege 4384 wmic.exe Token: SeRestorePrivilege 4384 wmic.exe Token: SeShutdownPrivilege 4384 wmic.exe Token: SeDebugPrivilege 4384 wmic.exe Token: SeSystemEnvironmentPrivilege 4384 wmic.exe Token: SeRemoteShutdownPrivilege 4384 wmic.exe Token: SeUndockPrivilege 4384 wmic.exe Token: SeManageVolumePrivilege 4384 wmic.exe Token: 33 4384 wmic.exe Token: 34 4384 wmic.exe Token: 35 4384 wmic.exe Token: 36 4384 wmic.exe Token: SeIncreaseQuotaPrivilege 4384 wmic.exe Token: SeSecurityPrivilege 4384 wmic.exe Token: SeTakeOwnershipPrivilege 4384 wmic.exe Token: SeLoadDriverPrivilege 4384 wmic.exe Token: SeSystemProfilePrivilege 4384 wmic.exe Token: SeSystemtimePrivilege 4384 wmic.exe Token: SeProfSingleProcessPrivilege 4384 wmic.exe Token: SeIncBasePriorityPrivilege 4384 wmic.exe Token: SeCreatePagefilePrivilege 4384 wmic.exe Token: SeBackupPrivilege 4384 wmic.exe Token: SeRestorePrivilege 4384 wmic.exe Token: SeShutdownPrivilege 4384 wmic.exe Token: SeDebugPrivilege 4384 wmic.exe Token: SeSystemEnvironmentPrivilege 4384 wmic.exe Token: SeRemoteShutdownPrivilege 4384 wmic.exe Token: SeUndockPrivilege 4384 wmic.exe Token: SeManageVolumePrivilege 4384 wmic.exe Token: 33 4384 wmic.exe Token: 34 4384 wmic.exe Token: 35 4384 wmic.exe Token: 36 4384 wmic.exe Token: SeIncreaseQuotaPrivilege 4976 WMIC.exe Token: SeSecurityPrivilege 4976 WMIC.exe Token: SeTakeOwnershipPrivilege 4976 WMIC.exe Token: SeLoadDriverPrivilege 4976 WMIC.exe Token: SeSystemProfilePrivilege 4976 WMIC.exe Token: SeSystemtimePrivilege 4976 WMIC.exe Token: SeProfSingleProcessPrivilege 4976 WMIC.exe Token: SeIncBasePriorityPrivilege 4976 WMIC.exe Token: SeCreatePagefilePrivilege 4976 WMIC.exe Token: SeBackupPrivilege 4976 WMIC.exe Token: SeRestorePrivilege 4976 WMIC.exe Token: SeShutdownPrivilege 4976 WMIC.exe Token: SeDebugPrivilege 4976 WMIC.exe Token: SeSystemEnvironmentPrivilege 4976 WMIC.exe Token: SeRemoteShutdownPrivilege 4976 WMIC.exe Token: SeUndockPrivilege 4976 WMIC.exe Token: SeManageVolumePrivilege 4976 WMIC.exe Token: 33 4976 WMIC.exe Token: 34 4976 WMIC.exe Token: 35 4976 WMIC.exe Token: 36 4976 WMIC.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2756 3144 ad64a6e6e563e0aa8afcf4ce2e001363a20d8fcd5b6f6b0003329ce1f543f5bc.exe 82 PID 3144 wrote to memory of 2756 3144 ad64a6e6e563e0aa8afcf4ce2e001363a20d8fcd5b6f6b0003329ce1f543f5bc.exe 82 PID 3144 wrote to memory of 2756 3144 ad64a6e6e563e0aa8afcf4ce2e001363a20d8fcd5b6f6b0003329ce1f543f5bc.exe 82 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 2756 wrote to memory of 4592 2756 powershell.exe 85 PID 4592 wrote to memory of 4384 4592 aspnet_compiler.exe 92 PID 4592 wrote to memory of 4384 4592 aspnet_compiler.exe 92 PID 4592 wrote to memory of 4384 4592 aspnet_compiler.exe 92 PID 4592 wrote to memory of 3212 4592 aspnet_compiler.exe 94 PID 4592 wrote to memory of 3212 4592 aspnet_compiler.exe 94 PID 4592 wrote to memory of 3212 4592 aspnet_compiler.exe 94 PID 3212 wrote to memory of 4976 3212 cmd.exe 96 PID 3212 wrote to memory of 4976 3212 cmd.exe 96 PID 3212 wrote to memory of 4976 3212 cmd.exe 96 PID 4592 wrote to memory of 2224 4592 aspnet_compiler.exe 97 PID 4592 wrote to memory of 2224 4592 aspnet_compiler.exe 97 PID 4592 wrote to memory of 2224 4592 aspnet_compiler.exe 97 PID 2224 wrote to memory of 4364 2224 cmd.exe 99 PID 2224 wrote to memory of 4364 2224 cmd.exe 99 PID 2224 wrote to memory of 4364 2224 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad64a6e6e563e0aa8afcf4ce2e001363a20d8fcd5b6f6b0003329ce1f543f5bc.exe"C:\Users\Admin\AppData\Local\Temp\ad64a6e6e563e0aa8afcf4ce2e001363a20d8fcd5b6f6b0003329ce1f543f5bc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"4⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"4⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name5⤵PID:4364
-
-
-
-