Malware Analysis Report

2024-11-30 22:58

Sample ID 230224-ytbjfsaf42
Target python-3.11.2.exe
SHA256 aa349ad45bb48e85b5cd1b55308ae835353859219f28ece9685c8ae552e8e63a
Tags
aurora stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

aa349ad45bb48e85b5cd1b55308ae835353859219f28ece9685c8ae552e8e63a

Threat Level: Known bad

The file python-3.11.2.exe was found to be: Known bad.

Malicious Activity Summary

aurora stealer

Aurora

Suspicious use of SetThreadContext

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-02-24 20:04

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-02-24 20:04

Reported

2023-02-24 20:07

Platform

win7-20230220-en

Max time kernel

147s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe"

Signatures

Aurora

stealer aurora

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1708 set thread context of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe
PID 1708 wrote to memory of 936 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe

Processes

C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe

"C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe"

C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe

"C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe"

C:\Windows\explorer.exe

"C:\Windows\explorer.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x578

Network

Country Destination Domain Proto
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp

Files

memory/936-54-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-55-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-56-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-57-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-62-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-61-0x000007FFFFFDE000-0x000007FFFFFDF000-memory.dmp

memory/936-60-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-59-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-58-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-65-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-66-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-64-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-67-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-68-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-69-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-70-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-71-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-72-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-73-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-74-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-75-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-76-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-77-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-78-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-79-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-80-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-81-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-82-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-83-0x0000000000400000-0x000000000075C000-memory.dmp

memory/936-84-0x0000000000400000-0x000000000075C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-02-24 20:04

Reported

2023-02-24 20:07

Platform

win10v2004-20230220-en

Max time kernel

160s

Max time network

165s

Command Line

"C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe"

Signatures

Aurora

stealer aurora

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1540 set thread context of 1464 N/A C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe

Processes

C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe

"C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe"

C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe

"C:\Users\Admin\AppData\Local\Temp\python-3.11.2.exe"

Network

Country Destination Domain Proto
NL 95.101.78.82:80 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
NL 178.79.208.1:80 tcp
NL 178.79.208.1:80 tcp
RU 185.106.93.135:8081 tcp
US 8.8.8.8:53 64.13.109.52.in-addr.arpa udp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
NL 173.223.113.164:443 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
NL 173.223.113.131:80 tcp
US 204.79.197.203:80 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp
RU 185.106.93.135:8081 tcp

Files

memory/1464-133-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-138-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-143-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-144-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-145-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-146-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-147-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-148-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-149-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-150-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-151-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-152-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-153-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-154-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-155-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-156-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-157-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-158-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-159-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-160-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-161-0x0000000000740000-0x0000000000A9C000-memory.dmp

memory/1464-162-0x0000000000740000-0x0000000000A9C000-memory.dmp