Analysis
-
max time kernel
106s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2023, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
tmp780A.tmp.exe
Resource
win7-20221111-en
General
-
Target
tmp780A.tmp.exe
-
Size
4.0MB
-
MD5
58f86d3f8a1f981a7c7bf541c3bc787b
-
SHA1
a6b43c84c1b79551b39fc7c589deec969de84227
-
SHA256
5ec2cb39e7538c4c2eaedcd2c2ce1ea79665260e14ff5b6579e33829c06c0235
-
SHA512
88dd8807bbc2ad6f93eacc729489d4a859edf310becfafb788c69de80b716780dde739604d53656be8cbec160c940392d24344d2737ff9d25e064f29989b7719
-
SSDEEP
98304:j5p0FLvYwv0qdE+T/6dBVeAhy5zhLaHtZO3jB9L0l3nHQvvw4:j5KpvNJHj6dXEnLuZOr0Znw
Malware Config
Extracted
aurora
79.137.133.225:8081
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp780A.tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3556 set thread context of 1816 3556 tmp780A.tmp.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3028 powershell.exe 3028 powershell.exe 3556 tmp780A.tmp.exe 3556 tmp780A.tmp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3556 tmp780A.tmp.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeIncreaseQuotaPrivilege 2476 wmic.exe Token: SeSecurityPrivilege 2476 wmic.exe Token: SeTakeOwnershipPrivilege 2476 wmic.exe Token: SeLoadDriverPrivilege 2476 wmic.exe Token: SeSystemProfilePrivilege 2476 wmic.exe Token: SeSystemtimePrivilege 2476 wmic.exe Token: SeProfSingleProcessPrivilege 2476 wmic.exe Token: SeIncBasePriorityPrivilege 2476 wmic.exe Token: SeCreatePagefilePrivilege 2476 wmic.exe Token: SeBackupPrivilege 2476 wmic.exe Token: SeRestorePrivilege 2476 wmic.exe Token: SeShutdownPrivilege 2476 wmic.exe Token: SeDebugPrivilege 2476 wmic.exe Token: SeSystemEnvironmentPrivilege 2476 wmic.exe Token: SeRemoteShutdownPrivilege 2476 wmic.exe Token: SeUndockPrivilege 2476 wmic.exe Token: SeManageVolumePrivilege 2476 wmic.exe Token: 33 2476 wmic.exe Token: 34 2476 wmic.exe Token: 35 2476 wmic.exe Token: 36 2476 wmic.exe Token: SeIncreaseQuotaPrivilege 2476 wmic.exe Token: SeSecurityPrivilege 2476 wmic.exe Token: SeTakeOwnershipPrivilege 2476 wmic.exe Token: SeLoadDriverPrivilege 2476 wmic.exe Token: SeSystemProfilePrivilege 2476 wmic.exe Token: SeSystemtimePrivilege 2476 wmic.exe Token: SeProfSingleProcessPrivilege 2476 wmic.exe Token: SeIncBasePriorityPrivilege 2476 wmic.exe Token: SeCreatePagefilePrivilege 2476 wmic.exe Token: SeBackupPrivilege 2476 wmic.exe Token: SeRestorePrivilege 2476 wmic.exe Token: SeShutdownPrivilege 2476 wmic.exe Token: SeDebugPrivilege 2476 wmic.exe Token: SeSystemEnvironmentPrivilege 2476 wmic.exe Token: SeRemoteShutdownPrivilege 2476 wmic.exe Token: SeUndockPrivilege 2476 wmic.exe Token: SeManageVolumePrivilege 2476 wmic.exe Token: 33 2476 wmic.exe Token: 34 2476 wmic.exe Token: 35 2476 wmic.exe Token: 36 2476 wmic.exe Token: SeIncreaseQuotaPrivilege 1876 WMIC.exe Token: SeSecurityPrivilege 1876 WMIC.exe Token: SeTakeOwnershipPrivilege 1876 WMIC.exe Token: SeLoadDriverPrivilege 1876 WMIC.exe Token: SeSystemProfilePrivilege 1876 WMIC.exe Token: SeSystemtimePrivilege 1876 WMIC.exe Token: SeProfSingleProcessPrivilege 1876 WMIC.exe Token: SeIncBasePriorityPrivilege 1876 WMIC.exe Token: SeCreatePagefilePrivilege 1876 WMIC.exe Token: SeBackupPrivilege 1876 WMIC.exe Token: SeRestorePrivilege 1876 WMIC.exe Token: SeShutdownPrivilege 1876 WMIC.exe Token: SeDebugPrivilege 1876 WMIC.exe Token: SeSystemEnvironmentPrivilege 1876 WMIC.exe Token: SeRemoteShutdownPrivilege 1876 WMIC.exe Token: SeUndockPrivilege 1876 WMIC.exe Token: SeManageVolumePrivilege 1876 WMIC.exe Token: 33 1876 WMIC.exe Token: 34 1876 WMIC.exe Token: 35 1876 WMIC.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3556 wrote to memory of 3028 3556 tmp780A.tmp.exe 83 PID 3556 wrote to memory of 3028 3556 tmp780A.tmp.exe 83 PID 3556 wrote to memory of 3028 3556 tmp780A.tmp.exe 83 PID 3556 wrote to memory of 4560 3556 tmp780A.tmp.exe 91 PID 3556 wrote to memory of 4560 3556 tmp780A.tmp.exe 91 PID 3556 wrote to memory of 4560 3556 tmp780A.tmp.exe 91 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 3556 wrote to memory of 1816 3556 tmp780A.tmp.exe 92 PID 1816 wrote to memory of 2476 1816 tmp780A.tmp.exe 94 PID 1816 wrote to memory of 2476 1816 tmp780A.tmp.exe 94 PID 1816 wrote to memory of 2476 1816 tmp780A.tmp.exe 94 PID 1816 wrote to memory of 1792 1816 tmp780A.tmp.exe 95 PID 1816 wrote to memory of 1792 1816 tmp780A.tmp.exe 95 PID 1816 wrote to memory of 1792 1816 tmp780A.tmp.exe 95 PID 1792 wrote to memory of 1876 1792 cmd.exe 97 PID 1792 wrote to memory of 1876 1792 cmd.exe 97 PID 1792 wrote to memory of 1876 1792 cmd.exe 97 PID 1816 wrote to memory of 1956 1816 tmp780A.tmp.exe 99 PID 1816 wrote to memory of 1956 1816 tmp780A.tmp.exe 99 PID 1816 wrote to memory of 1956 1816 tmp780A.tmp.exe 99 PID 1956 wrote to memory of 3064 1956 cmd.exe 101 PID 1956 wrote to memory of 3064 1956 cmd.exe 101 PID 1956 wrote to memory of 3064 1956 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp780A.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp780A.tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\tmp780A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp780A.tmp.exe2⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\tmp780A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp780A.tmp.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name4⤵PID:3064
-
-
-