Analysis

  • max time kernel
    43s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/01/2023, 17:36

General

  • Target

    e41b7fabc955a219901ab142402f9fb1c1c81e1923240fbe7ea1f9e4f57e46ad.exe

  • Size

    470.0MB

  • MD5

    3ee5dfca3eadc77f2bf61894d582cc66

  • SHA1

    17f5f51c3439e54b22df194968977653104298d2

  • SHA256

    e41b7fabc955a219901ab142402f9fb1c1c81e1923240fbe7ea1f9e4f57e46ad

  • SHA512

    c3ecef9bc6b51e430264a494bb3e9237ca539c7e3f1d4b3f18988e2953bee7cf46b06a2f24ca1535e8cbf514c6059e5c444c74dace355f845b08d8d7ad4bb239

  • SSDEEP

    49152:LhK10rlzIwe6he+dM1ckuKqMm1kdCabcUwoTnfyL6gNLh65eDm0drmjKoSuMelqi:cirlzMIdHvbMCacUFKbNo8DmGOpMwqPq

Malware Config

Extracted

Family

aurora

C2

45.15.156.210:8081

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e41b7fabc955a219901ab142402f9fb1c1c81e1923240fbe7ea1f9e4f57e46ad.exe
    "C:\Users\Admin\AppData\Local\Temp\e41b7fabc955a219901ab142402f9fb1c1c81e1923240fbe7ea1f9e4f57e46ad.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic os get Caption
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1124
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "wmic path win32_VideoController get name"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic path win32_VideoController get name
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:896
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "wmic cpu get name"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic cpu get name
        3⤵
          PID:1576
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "" "start-process C:\Users\Admin\AppData\Local\Temp\TI2xR0m7pr.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Users\Admin\AppData\Local\Temp\TI2xR0m7pr.exe
          "C:\Users\Admin\AppData\Local\Temp\TI2xR0m7pr.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2036

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\TI2xR0m7pr.exe

            Filesize

            4.1MB

            MD5

            fd3921d7f42c4a42115ce88d1c9fe031

            SHA1

            30d5b2cd633667a340047e1ff1ce44628555eba0

            SHA256

            0ea7ac01f7c8cb0ad3574688fd83265cceb7c3c16f89f29799b8be1b3a314a6a

            SHA512

            8216ba2c9da3e6021f8f90c824a9da14632069477e508117948d841fd7dcc7fe28e1fb3d9cae854afe32db3ed46c6ba9cc49b3840ec875f66f3fa252ae11fb70

          • C:\Users\Admin\AppData\Local\Temp\TI2xR0m7pr.exe

            Filesize

            4.1MB

            MD5

            fd3921d7f42c4a42115ce88d1c9fe031

            SHA1

            30d5b2cd633667a340047e1ff1ce44628555eba0

            SHA256

            0ea7ac01f7c8cb0ad3574688fd83265cceb7c3c16f89f29799b8be1b3a314a6a

            SHA512

            8216ba2c9da3e6021f8f90c824a9da14632069477e508117948d841fd7dcc7fe28e1fb3d9cae854afe32db3ed46c6ba9cc49b3840ec875f66f3fa252ae11fb70

          • \Users\Admin\AppData\Local\Temp\TI2xR0m7pr.exe

            Filesize

            4.1MB

            MD5

            fd3921d7f42c4a42115ce88d1c9fe031

            SHA1

            30d5b2cd633667a340047e1ff1ce44628555eba0

            SHA256

            0ea7ac01f7c8cb0ad3574688fd83265cceb7c3c16f89f29799b8be1b3a314a6a

            SHA512

            8216ba2c9da3e6021f8f90c824a9da14632069477e508117948d841fd7dcc7fe28e1fb3d9cae854afe32db3ed46c6ba9cc49b3840ec875f66f3fa252ae11fb70

          • memory/1356-58-0x0000000000820000-0x0000000001191000-memory.dmp

            Filesize

            9.4MB

          • memory/1356-60-0x0000000000820000-0x0000000001191000-memory.dmp

            Filesize

            9.4MB

          • memory/1356-62-0x0000000076FB0000-0x0000000077130000-memory.dmp

            Filesize

            1.5MB

          • memory/1356-61-0x0000000000820000-0x0000000001191000-memory.dmp

            Filesize

            9.4MB

          • memory/1356-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

            Filesize

            8KB

          • memory/1356-59-0x0000000000820000-0x0000000001191000-memory.dmp

            Filesize

            9.4MB

          • memory/1356-57-0x0000000000820000-0x0000000001191000-memory.dmp

            Filesize

            9.4MB

          • memory/1356-80-0x0000000000820000-0x0000000001191000-memory.dmp

            Filesize

            9.4MB

          • memory/1356-56-0x0000000000820000-0x0000000001191000-memory.dmp

            Filesize

            9.4MB

          • memory/1356-55-0x0000000000820000-0x0000000001191000-memory.dmp

            Filesize

            9.4MB

          • memory/1976-70-0x0000000073850000-0x0000000073DFB000-memory.dmp

            Filesize

            5.7MB

          • memory/1976-76-0x0000000073850000-0x0000000073DFB000-memory.dmp

            Filesize

            5.7MB

          • memory/2036-77-0x0000000000BE0000-0x00000000012C3000-memory.dmp

            Filesize

            6.9MB