Analysis

  • max time kernel
    80s
  • max time network
    84s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2023 13:02

General

  • Target

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe

  • Size

    3.6MB

  • MD5

    36fd273ea7607d3a203f257f4e2649ed

  • SHA1

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48

  • SHA256

    471d501162e2a5cb6aab3f4f5362ff843d05ef9f20d9fd7ea29733d3a9875747

  • SHA512

    cf81163bc6d1f1141130fbe70944387b97d322afe837ad21a88a0be8f9fd87615bd7022cc572b1783871cc99f224258bae75855e805c733793b723ba0483597d

  • SSDEEP

    98304:VQF9SqUKUehGS26Ish7MUTjA+1VFnqWXvqaY4:VSSzMGS26x1MUTM+/Fh

Malware Config

Extracted

Family

aurora

C2

45.9.74.11:8081

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Detect PureCrypter injector 1 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe
    "C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
        "C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:728
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:940
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1044
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:996
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1248
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1652
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic os get Caption
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1096
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C "wmic path win32_VideoController get name"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:652
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic path win32_VideoController get name
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1324
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C "wmic cpu get name"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1668
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic cpu get name
              6⤵
                PID:1572

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      Filesize

      190.0MB

      MD5

      ab898572ce16296f11796a6ddacd0a2d

      SHA1

      550af916faac3321ccf49172debe410ab38b1b2a

      SHA256

      7832a258081c895c6d567e099a06b6372e574bf379516c1373125f472f2690d0

      SHA512

      9822bb3a4930668e6554c16b9b8e49f4ef0fd198c35e3f5a8dac93331329694dc1c640bf9271aeb3293da83a1d02f9624cfa53d5d9eab7471723fc13cb090e8b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      Filesize

      180.8MB

      MD5

      87a377e8985b9b3fa874ce7dbb4c7c92

      SHA1

      4e12147ca153716153674d6b4234d19810a6c0ee

      SHA256

      cec9b49e1a64bd33a5f9175476feea6edf5e4dc60f23daa8434bf1669bff7f91

      SHA512

      67146991fc85773dd235b800e3379f30527f0e354a300be0cad5d52cf6158a2bb40a1e58a2987cef122afc1b53008dd27476144f75abf0c31d06d7ce68596066

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      e415a7fbb76949d2a06a5f8a354a8c0c

      SHA1

      461ee4456dc15faf10dfc1b97699269825e04bda

      SHA256

      f69b6315e1f0c1379640e82aaa6b774fe39b1d12c82e06b8f4442b4439cc44e3

      SHA512

      8f8ff2647b100f7a7f1476d6411277089bbc42b6d325d60e68dd5a4357ae0bdc834fb8ad979b94d74bc15164fb4da30e56565147dcd85e3f69fa3f1acdab89df

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      178.9MB

      MD5

      7dcc985b0ea1cc4b5e6ff389ae54ef5d

      SHA1

      cb1bd9ce28fae692dba78eea6abe71a5dfa27c1b

      SHA256

      a29575686537bce5e7da4159165afc58b374e3a72579428d0d4fe0b8d503e350

      SHA512

      55df9f5085656b312c0c5493252250494b96962030234e2f151855bc10bc4e5ad20f9388ba58927dcf5972c68a4b268631e82b06865f2ad11fb8616c6f6446a1

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      183.9MB

      MD5

      d3512d3f3743b081789ea7527853ff54

      SHA1

      37319cf60e11054dd1d66617fd35bbec136f5318

      SHA256

      62c33e3b8261db1b5e1cf16f21f44594c72c543e41d43619c78a6e784c1cd823

      SHA512

      63daef62a32b37c8230a47f02ebddcd81fb0f3668de111fcba759b6c190caf53b80218a0298ed71bb3d9f29cb9ac1ab7944b204b4c66fd389113a2e0de3bbd03

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      92.9MB

      MD5

      3179f786d036b34a3c02405c88006546

      SHA1

      afdfe9a6c434dba6ca61c93ddea33a9113a72fcd

      SHA256

      d2f51f4d95bebcdd1c554c379c1768f1798ed3963cd1448e87837039a858bd40

      SHA512

      cd57f16764e63a52d9f11571104dbcbc5fab110bc4ef17a77bdc391d1d383c8dfac95b59d5c6878fdbdbc7c3a88f35a5441b68d9c4bac84b7d0f29270e3bfe32

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      92.5MB

      MD5

      79d0995dbfe5db9bdb61fb31ff2068d2

      SHA1

      d7aa6e450a5a3630eb019e3f52061df79175040a

      SHA256

      cc73283efdbfe58e0e21736fdd2178a8830a01d740ce9f6bb4ba8b527914e6db

      SHA512

      bfd644215e5d290d8949b3eb4d78895d7154f0301ddbda3afad459b6b30cf46d8c4f25a852832e0e742037877582a39ed634a0b42ec278a6c1f7e9fd81e6d63b

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      180.9MB

      MD5

      d496c5f1018835573d7d8c0ef28b79dd

      SHA1

      e8cfd908236bc2818200d7121e3ab7a8913f35e3

      SHA256

      30e7e41618ea36fef38963164fd2f7d417adf906609826ee00a9bc5b0811a02c

      SHA512

      929a8f58ef9cc6506a0a5021a23c8c4f5b7febdb2d8261cb6c040a34cca62a91055d4c22476387f7ec56de4509f6ea804ead1961ab2e7620666e153a1ae2a525

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      180.9MB

      MD5

      8202ee1503b6b53dbc0bd1fd98849884

      SHA1

      3ccac60c75a958a2c6d027de37c0bf41fabdb3eb

      SHA256

      3416191d6df4abc6af577cbe7d8c397484d3e7dba904c53cb4a1f00cfb66d806

      SHA512

      0d90898cad1f1d5c34d7a3ae20a497e7551d8ef1440991bdf4426ed4566afbe52ac60e96a7e32b2bd57764cc93c1c71c16be499040213ece5c71861f97588746

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      178.4MB

      MD5

      f9c4cbb9c7d2c74790e0c9b0166f583c

      SHA1

      b7dd3c840d7b6cb7702b72c96a546c8bcdca67d5

      SHA256

      eb56fe1d6dbb3d387312e9e7d9eac251aa2502ad465819a3e51f1b9db60abc18

      SHA512

      d23a74f7681fb196eb76f9285a2b5cfec31e3a5a4ba3bab1a26870f3490f78b0394596f7abca18465166f1c5837aeae7a5172f449437b09c26e3ed7eda392677

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
      Filesize

      178.2MB

      MD5

      8bd78d64da77f8f06d30e9b696c7754b

      SHA1

      856df29d6192f293efd06bdd18b8f79ae12cb0aa

      SHA256

      fff3074c8d638613b9e85509059e62d66ad440276405deb637f97b8be35fe079

      SHA512

      a19e61fc4ed252a484bfcb4d3fafedf2f0e5c70b46e67e878387c4c736b85c3b6ffa5c336862e984416827ad51e67c80988163ed485f8e57d0d4855e9a8f6c81

    • memory/652-98-0x0000000000000000-mapping.dmp
    • memory/728-73-0x00000000054C0000-0x0000000005632000-memory.dmp
      Filesize

      1.4MB

    • memory/728-65-0x0000000000D30000-0x00000000014A4000-memory.dmp
      Filesize

      7.5MB

    • memory/728-66-0x00000000064C0000-0x0000000006860000-memory.dmp
      Filesize

      3.6MB

    • memory/728-62-0x0000000000000000-mapping.dmp
    • memory/940-69-0x000000006F6A0000-0x000000006FC4B000-memory.dmp
      Filesize

      5.7MB

    • memory/940-71-0x000000006F6A0000-0x000000006FC4B000-memory.dmp
      Filesize

      5.7MB

    • memory/940-70-0x000000006F6A0000-0x000000006FC4B000-memory.dmp
      Filesize

      5.7MB

    • memory/940-67-0x0000000000000000-mapping.dmp
    • memory/996-74-0x0000000000000000-mapping.dmp
    • memory/996-96-0x000000006F660000-0x000000006FC0B000-memory.dmp
      Filesize

      5.7MB

    • memory/996-94-0x000000006F660000-0x000000006FC0B000-memory.dmp
      Filesize

      5.7MB

    • memory/1044-72-0x0000000000000000-mapping.dmp
    • memory/1096-97-0x0000000000000000-mapping.dmp
    • memory/1324-99-0x0000000000000000-mapping.dmp
    • memory/1556-54-0x0000000000000000-mapping.dmp
    • memory/1556-56-0x0000000074F41000-0x0000000074F43000-memory.dmp
      Filesize

      8KB

    • memory/1572-101-0x0000000000000000-mapping.dmp
    • memory/1652-77-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-90-0x0000000000464C20-mapping.dmp
    • memory/1652-89-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-93-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-88-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-95-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-86-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-85-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-83-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-81-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-78-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1652-102-0x0000000000400000-0x0000000000731000-memory.dmp
      Filesize

      3.2MB

    • memory/1668-100-0x0000000000000000-mapping.dmp