Analysis

  • max time kernel
    68s
  • max time network
    73s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2023 01:03

General

  • Target

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe

  • Size

    3.6MB

  • MD5

    36fd273ea7607d3a203f257f4e2649ed

  • SHA1

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48

  • SHA256

    471d501162e2a5cb6aab3f4f5362ff843d05ef9f20d9fd7ea29733d3a9875747

  • SHA512

    cf81163bc6d1f1141130fbe70944387b97d322afe837ad21a88a0be8f9fd87615bd7022cc572b1783871cc99f224258bae75855e805c733793b723ba0483597d

  • SSDEEP

    98304:VQF9SqUKUehGS26Ish7MUTjA+1VFnqWXvqaY4:VSSzMGS26x1MUTM+/Fh

Malware Config

Extracted

Family

aurora

C2

45.9.74.11:8081

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Detect PureCrypter injector 1 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe
    "C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
        "C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:276
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1524
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1512
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:988
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1968
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic os get Caption
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:876
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C "wmic path win32_VideoController get name"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1892
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic path win32_VideoController get name
              6⤵
                PID:2004
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C "wmic cpu get name"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1744
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic cpu get name
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1128

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      Filesize

      147.7MB

      MD5

      51105c756b27962310a292f5d9b3e9b2

      SHA1

      89c236f3e8105b4a4b78f19618b9017f7ba82d8c

      SHA256

      4e776d518df2553c051229bf982929a5f4df68a9dbe19ee6f1336b899fb540df

      SHA512

      c49046342bf29b9dffab0c757fc42921f1f3bc939ca3351a0606f27d7caa3927a0a1ab67c45c20d45db5be2532b198264a1a5b69e6fc23e0ce5b8f4a0afe5107

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      Filesize

      147.6MB

      MD5

      e341a6ce51fcdf4fffe3ae37d4ed65f0

      SHA1

      2121b6c2be173c8a4a5bea8c2dfd210f7f562468

      SHA256

      6bb8c5f13381d37ba84ac6aed5d33ea39794610b0d31641cc73fe9486b456acb

      SHA512

      ee4c6d2c0b9e9a4cd9585e953b744fad86fd7b34566cb7eb492e660ee1c1b38bbefd9dd30520c1585be2cdd988b52575d5bb8e3067e6204a9521d2682369d863

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      34047cb0c7d778eeb417628c9530fd6c

      SHA1

      d7c84657b6648d226c259c46a72606e59f596a5c

      SHA256

      11d1eda337724ffef73afb86e40580b965e5c5e258c0bdceb999dfbf500658e4

      SHA512

      4701739074715842f3236baa542d5bc4b64a3836be205b983460058ff0943c855c8fe4bc959eac8047471126cfb834540104d88131d02f1ff4608939017db265

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      142.1MB

      MD5

      fba176145f59b1d0ba0a6f3119a70dee

      SHA1

      679baa19d26de5cea55291311c6c223cbb0dd084

      SHA256

      243b94ef037b7d9e12c30765f7e6063a883db29d1715acc95fd71cda652595ee

      SHA512

      17337efcd91bb325532f72cf424a48de9e562ec7e3df012128bff017ca19e01b75dc54cce807de1007d0476ea0a236a67176c6d157ea9cd2e78a38dd81eeef55

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      138.3MB

      MD5

      06926bed73a888d263ae6fa8fe45b6f2

      SHA1

      66a6d722ce640e22740e4e66bf065bcab5d3c52f

      SHA256

      1a58a0e8bf14d9d364ff62202c4429b7ea227621f8697c5fc3e322e42179087f

      SHA512

      af7a84d08f4bc2faf4ec2bd09920c0f992c56b078e365805a2cb7185a241fe88f2a9f27acd81eeb90dc6cbc1fde276d8fb0e2ef711077f2b10afdedf7d866255

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      96.6MB

      MD5

      aa4137f9a1532fa3f733337f6960c8bd

      SHA1

      ce624fd6f8e1bdc0ac89d60b8cc945bf0201c342

      SHA256

      467375ec2d7f6bf36f99e82164931e9a40592f69c829ec73c9bed8d0ebb1d83e

      SHA512

      2adcfa88da4639f75e53b43d68714fa3f1dc37c77ebe0d81c74937941863957711dc4adc30c23ce76109c62a7ed63beb71613cab1f7d63c5f6fee866f6255101

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      91.8MB

      MD5

      a617210bbe00d6ad341afa8c462766d6

      SHA1

      17697fce863a8d681e24e43ef42a7b4d8e763054

      SHA256

      5a44f8f76292dbc45b21649754721dedfe41feed31e94c8e9a9fbde151184620

      SHA512

      ba9e0320995954b12b1e7bdaf3451089808ac8a1efc580e2358ce32fe119040f1718d6da28ea8026cc7d78a3231a93b187322cb93d4abe6b4f687de4e1b8c9af

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      143.1MB

      MD5

      75e4c54c8d3c786616a310647b4b2a49

      SHA1

      f853bcece3f5bf50cdf63121798ed95694affd6d

      SHA256

      ab03dfa47cb22d372c467f31bb959f117f2d3995f6ae45e1b773d58541653b8e

      SHA512

      25f063f9b2de4eb2a244218837356dd619e9b540d92a7cc285d560cffe5d818e9cbcbf03f3dbd9f767cef28d73740f428c5e2c82cb84c4105bee0898ee6b11e3

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      143.1MB

      MD5

      c722f4e31e922b0f130f5651f6222d91

      SHA1

      0fa7b29badcefdc7c22d0d6412fad8794d134f21

      SHA256

      54ac7f6ecc8ca0f60a67393b495b426492d9e5ca12bbb54a7cf21f428c8b5b76

      SHA512

      c97cbd009748593bb618767685a0450d05fe7c2e8a0988c2ff3e936c0441c6c4252b0687c8221ffaf7ab03dc6f73f96b9e37d2e57ed234cb42a835fc009397fa

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      139.9MB

      MD5

      6e7ab49cbacb4b44edfc7e9e425987fd

      SHA1

      48afb1233d9d88207ec2f3e713a8eeab33c7ccf1

      SHA256

      149f7efd15f0ad87aee80addde21f60cc6f9a01ffa07da08b964f0c1d27d6d2e

      SHA512

      13955b0da966f3093118c9ee04eedaf6ff598f5e9fccde5207d8556cc5ea52ec6ea91e49db1ee7a252536a947b344db2258f62b11da1029dba73fe0a1feda3bb

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      141.6MB

      MD5

      9f7a8c9dbb4aa0c6160db8beae073c91

      SHA1

      0840049f0f6e21d0cab897a8a9ee299b90d188e2

      SHA256

      c278b7f1979686050b16d53070e1adb821b8cf8bc99628b89b57cb3f9fd522b3

      SHA512

      519978498df0ef2934a1a469ecabb377fe6acdb5db376d14e21378ace505742fc0751ddda204f5ede1bd358ee3958a29ede37390a106668db236c13f9b2c97d0

    • memory/276-76-0x0000000005380000-0x00000000054F2000-memory.dmp
      Filesize

      1.4MB

    • memory/276-65-0x00000000011B0000-0x0000000001924000-memory.dmp
      Filesize

      7.5MB

    • memory/276-66-0x0000000006410000-0x00000000067B0000-memory.dmp
      Filesize

      3.6MB

    • memory/276-62-0x0000000000000000-mapping.dmp
    • memory/840-54-0x0000000000000000-mapping.dmp
    • memory/840-56-0x0000000074DE1000-0x0000000074DE3000-memory.dmp
      Filesize

      8KB

    • memory/876-97-0x0000000000000000-mapping.dmp
    • memory/988-77-0x000000006F2C0000-0x000000006F86B000-memory.dmp
      Filesize

      5.7MB

    • memory/988-73-0x0000000000000000-mapping.dmp
    • memory/988-80-0x000000006F2C0000-0x000000006F86B000-memory.dmp
      Filesize

      5.7MB

    • memory/1128-101-0x0000000000000000-mapping.dmp
    • memory/1512-72-0x0000000000000000-mapping.dmp
    • memory/1524-67-0x0000000000000000-mapping.dmp
    • memory/1524-69-0x000000006F530000-0x000000006FADB000-memory.dmp
      Filesize

      5.7MB

    • memory/1524-70-0x000000006F530000-0x000000006FADB000-memory.dmp
      Filesize

      5.7MB

    • memory/1524-71-0x000000006F530000-0x000000006FADB000-memory.dmp
      Filesize

      5.7MB

    • memory/1744-100-0x0000000000000000-mapping.dmp
    • memory/1892-98-0x0000000000000000-mapping.dmp
    • memory/1980-87-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-90-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-91-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-92-0x0000000000464C20-mapping.dmp
    • memory/1980-88-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-95-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-96-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-85-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-83-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-81-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-79-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1980-102-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/2004-99-0x0000000000000000-mapping.dmp