Analysis

  • max time kernel
    79s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2023 01:33

General

  • Target

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe

  • Size

    3.6MB

  • MD5

    36fd273ea7607d3a203f257f4e2649ed

  • SHA1

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48

  • SHA256

    471d501162e2a5cb6aab3f4f5362ff843d05ef9f20d9fd7ea29733d3a9875747

  • SHA512

    cf81163bc6d1f1141130fbe70944387b97d322afe837ad21a88a0be8f9fd87615bd7022cc572b1783871cc99f224258bae75855e805c733793b723ba0483597d

  • SSDEEP

    98304:VQF9SqUKUehGS26Ish7MUTjA+1VFnqWXvqaY4:VSSzMGS26x1MUTM+/Fh

Malware Config

Extracted

Family

aurora

C2

45.9.74.11:8081

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe
    "C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4352
      • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
        "C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1680
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4552
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4076
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic os get Caption
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3948
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C "wmic path win32_VideoController get name"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4064
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic path win32_VideoController get name
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2484
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C "wmic cpu get name"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2416
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic cpu get name
              6⤵
                PID:4720

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      Filesize

      1KB

      MD5

      6195a91754effb4df74dbc72cdf4f7a6

      SHA1

      aba262f5726c6d77659fe0d3195e36a85046b427

      SHA256

      3254495a5513b37a2686a876d0040275414699e7ce760e7b5ee05e41a54b96f5

      SHA512

      ed723d15de267390dc93263538428e2c881be3494c996a810616b470d6df7d5acfcc8725687d5c50319ebef45caef44f769bfc32e0dc3abd249dacff4a12cc89

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      Filesize

      53KB

      MD5

      06ad34f9739c5159b4d92d702545bd49

      SHA1

      9152a0d4f153f3f40f7e606be75f81b582ee0c17

      SHA256

      474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

      SHA512

      c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      16KB

      MD5

      c74427c043bea9cdb6e608b4a03fee8f

      SHA1

      491e76a2d2238f9dfb7e9cbbaccd63374b4afc0e

      SHA256

      e914d792652d8c41397fa5f083368cabf90665bcc0b971f8cd0175e68792db34

      SHA512

      aec01c1cbf71d3b26bdfbd1a36cdb4012d4bca85d77e430cf1c7c14caa561ace94bdc26015d5b6014b4a2f0e4d28328a592f89e0133650205b1fb877843fa9e8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      Filesize

      329.5MB

      MD5

      9615379a6594fc53787b8f8010271f17

      SHA1

      a26b28ce92ffd1203f449660b4ccdd0313238595

      SHA256

      3a36472842cc825b171b73c7cdc594ef9d75852d2b0d3eb55881c4f261dfe7ca

      SHA512

      6ee05b596d07039a7a7c04d0cf12175a4784321847df7503b0ed2c732af078d9d7cc8a6ebe0d599d4ef6b43cc8631eeb03c3bb52310998fdb88a363497de4a4b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      Filesize

      329.0MB

      MD5

      c35fe6646759afbc26df4a4279099a71

      SHA1

      484497ea48669606ac46d2473ca50d5a442f747e

      SHA256

      bf9d318a5f3d1713e79138202b5d03de59f36a79053bc55c079fe59efb2bcf04

      SHA512

      1a701f84a42e7899495fe4a915217d69c6d8c03f62638ef8f875d1b3bd9ce6178be6e2d3cd4a6892b5fe531bac45073028d429c531d2cd22325973061eab9c2e

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      303.9MB

      MD5

      964750f45003e69c4d6c78a23f5eacf2

      SHA1

      8680f3ae88ef5f9e9a800b99912a8f49c9059f68

      SHA256

      8327deacb5eb8b901f82f3e0c88581c60cd77aa619aa5c1bc86bf310e6e5033d

      SHA512

      4c7e83af9754b08c514376d5ba29255d13753c7f75093fe13ef5c87cdc168f83efeafd94ac552113255da9be8961a79e6f3496f916706c919ea96ad403156931

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      309.4MB

      MD5

      ead1cadad67b946e26cadf245dfd6b70

      SHA1

      2b1faa70dc3605668e4333ed7c8f7fc4df6cc5de

      SHA256

      4af75367d561731549481a04dcdeeed30eadcf0be1bce8545b1a351ff9d154f1

      SHA512

      64f39c0da86f21219decb28f6afefe31b648fd6069858a008bf2630f928baeab9e94102d7ed88b59a9422f72eb1fd290e37f2b64bd1ab689fed4670f02f766d9

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      221.6MB

      MD5

      7fad85a51a95f2b2695ed1bf86f787f4

      SHA1

      3188deea2cf708931445751ab604164c063fe595

      SHA256

      de6b66c0584abf8cdb354fd2cfe041d051a7ce802d5521bd8d563a8e6530fbe4

      SHA512

      e7d1535e798aa47880c896e51dfd0f4dd08c836dfcecc122d24d0e6ec72dbc6db89b26bb78a7e1ce92f54a5424434c3ac385e0a7a7865a0674f8a9d548cf3f50

    • memory/1680-144-0x0000000005730000-0x0000000005796000-memory.dmp
      Filesize

      408KB

    • memory/1680-147-0x0000000006270000-0x000000000628A000-memory.dmp
      Filesize

      104KB

    • memory/1680-142-0x0000000005050000-0x0000000005678000-memory.dmp
      Filesize

      6.2MB

    • memory/1680-143-0x0000000004FC0000-0x0000000005026000-memory.dmp
      Filesize

      408KB

    • memory/1680-140-0x0000000000000000-mapping.dmp
    • memory/1680-145-0x0000000005D60000-0x0000000005D7E000-memory.dmp
      Filesize

      120KB

    • memory/1680-146-0x00000000075B0000-0x0000000007C2A000-memory.dmp
      Filesize

      6.5MB

    • memory/1680-141-0x0000000002490000-0x00000000024C6000-memory.dmp
      Filesize

      216KB

    • memory/2416-171-0x0000000000000000-mapping.dmp
    • memory/2484-170-0x0000000000000000-mapping.dmp
    • memory/2848-148-0x0000000000000000-mapping.dmp
    • memory/2992-139-0x0000000007460000-0x0000000007482000-memory.dmp
      Filesize

      136KB

    • memory/2992-138-0x0000000000DA0000-0x0000000001514000-memory.dmp
      Filesize

      7.5MB

    • memory/2992-135-0x0000000000000000-mapping.dmp
    • memory/3948-168-0x0000000000000000-mapping.dmp
    • memory/4064-169-0x0000000000000000-mapping.dmp
    • memory/4076-152-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/4076-167-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/4076-173-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/4076-151-0x0000000000000000-mapping.dmp
    • memory/4076-158-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/4076-155-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/4352-132-0x0000000000000000-mapping.dmp
    • memory/4552-162-0x0000000007BF0000-0x0000000007BFA000-memory.dmp
      Filesize

      40KB

    • memory/4552-165-0x0000000007DC0000-0x0000000007DDA000-memory.dmp
      Filesize

      104KB

    • memory/4552-166-0x0000000007D80000-0x0000000007D88000-memory.dmp
      Filesize

      32KB

    • memory/4552-164-0x00000000066B0000-0x00000000066BE000-memory.dmp
      Filesize

      56KB

    • memory/4552-163-0x0000000007E40000-0x0000000007ED6000-memory.dmp
      Filesize

      600KB

    • memory/4552-161-0x0000000006D90000-0x0000000006DAE000-memory.dmp
      Filesize

      120KB

    • memory/4552-160-0x0000000075640000-0x000000007568C000-memory.dmp
      Filesize

      304KB

    • memory/4552-149-0x0000000000000000-mapping.dmp
    • memory/4552-159-0x0000000006DF0000-0x0000000006E22000-memory.dmp
      Filesize

      200KB

    • memory/4720-172-0x0000000000000000-mapping.dmp