Analysis

  • max time kernel
    32s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2023 06:04

General

  • Target

    file.exe

  • Size

    4.1MB

  • MD5

    4e5b94d8b2e051e1bc46eb211004a1a0

  • SHA1

    1bd14c4607078f88a41c76b310226b06ae92aab7

  • SHA256

    6dfa533e709da56341ea380d6cc4d1afc105748371d17665d719a8e7d69bac8d

  • SHA512

    4f8fef57fe55e552d6e479b74a4b9e2cc6c9f01a7d4af9ca061dc2334867b807bb5d6674a84800de4c6851f63253c71fb81d50ad38edb2adf9118b02e070f0fb

  • SSDEEP

    98304:C4fFkyTNLGFT2a0FHMygEqgMHqL4ax6lF3miQTIMC+bRC:NGFKbFsxEqgZh6HmRTIMCS

Score
10/10

Malware Config

Extracted

Family

aurora

C2

45.15.157.130:8081

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c "wmic csproduct get uuid"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:676
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic csproduct get uuid
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:368
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1480
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C "wmic path win32_VideoController get name"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic path win32_VideoController get name
          4⤵
            PID:1684
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C "wmic cpu get name"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic cpu get name
            4⤵
              PID:1628
          • C:\Windows\SysWOW64\cmd.exe
            cmd "/c " systeminfo
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1076
            • C:\Windows\SysWOW64\systeminfo.exe
              systeminfo
              4⤵
              • Gathers system information
              PID:1488
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1804
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHc\""
            3⤵
              PID:1004
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\tcuAxhxKQFDaFpL\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1116
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFf\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1496
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\RsWxPLDnJObCsNV\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1936
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQ\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1908
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\leQYhYzRyWJjPjz\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1592
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmota\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:628
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\FetHsbZRjxAwnwe\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1684
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdc\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2020
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\EkXBAkjQZLCtTMt\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1644
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\TCoaNatyyi\""
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1100

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\EkXBAkjQZLCtTMt

          Filesize

          71KB

          MD5

          dfeffc3924409d9c9d3c8cae05be922b

          SHA1

          a89046cbf54c00e17ff0a5f3e1a8f01eb399bce4

          SHA256

          06ea3ad1c1c1067bfdfaa5ad8a91632fac6cad9776ded85fa65d3b6181d89be6

          SHA512

          d9614ecf528a2bf48cafe99a4c54d5c9f3656d628001fbf575d367d5ad8008cf30a58a7b3d9489d8534064442df89a7263df4a91d0863dcd6cc33574c576da33

        • C:\Users\Admin\AppData\Local\Temp\FetHsbZRjxAwnwe

          Filesize

          71KB

          MD5

          dfeffc3924409d9c9d3c8cae05be922b

          SHA1

          a89046cbf54c00e17ff0a5f3e1a8f01eb399bce4

          SHA256

          06ea3ad1c1c1067bfdfaa5ad8a91632fac6cad9776ded85fa65d3b6181d89be6

          SHA512

          d9614ecf528a2bf48cafe99a4c54d5c9f3656d628001fbf575d367d5ad8008cf30a58a7b3d9489d8534064442df89a7263df4a91d0863dcd6cc33574c576da33

        • C:\Users\Admin\AppData\Local\Temp\RsWxPLDnJObCsNV

          Filesize

          71KB

          MD5

          dfeffc3924409d9c9d3c8cae05be922b

          SHA1

          a89046cbf54c00e17ff0a5f3e1a8f01eb399bce4

          SHA256

          06ea3ad1c1c1067bfdfaa5ad8a91632fac6cad9776ded85fa65d3b6181d89be6

          SHA512

          d9614ecf528a2bf48cafe99a4c54d5c9f3656d628001fbf575d367d5ad8008cf30a58a7b3d9489d8534064442df89a7263df4a91d0863dcd6cc33574c576da33

        • C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFf

          Filesize

          46KB

          MD5

          02d2c46697e3714e49f46b680b9a6b83

          SHA1

          84f98b56d49f01e9b6b76a4e21accf64fd319140

          SHA256

          522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

          SHA512

          60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

        • C:\Users\Admin\AppData\Local\Temp\krBEmfdzdc

          Filesize

          71KB

          MD5

          dfeffc3924409d9c9d3c8cae05be922b

          SHA1

          a89046cbf54c00e17ff0a5f3e1a8f01eb399bce4

          SHA256

          06ea3ad1c1c1067bfdfaa5ad8a91632fac6cad9776ded85fa65d3b6181d89be6

          SHA512

          d9614ecf528a2bf48cafe99a4c54d5c9f3656d628001fbf575d367d5ad8008cf30a58a7b3d9489d8534064442df89a7263df4a91d0863dcd6cc33574c576da33

        • C:\Users\Admin\AppData\Local\Temp\krBEmfdzdc

          Filesize

          71KB

          MD5

          dfeffc3924409d9c9d3c8cae05be922b

          SHA1

          a89046cbf54c00e17ff0a5f3e1a8f01eb399bce4

          SHA256

          06ea3ad1c1c1067bfdfaa5ad8a91632fac6cad9776ded85fa65d3b6181d89be6

          SHA512

          d9614ecf528a2bf48cafe99a4c54d5c9f3656d628001fbf575d367d5ad8008cf30a58a7b3d9489d8534064442df89a7263df4a91d0863dcd6cc33574c576da33

        • C:\Users\Admin\AppData\Local\Temp\leQYhYzRyWJjPjz

          Filesize

          71KB

          MD5

          dfeffc3924409d9c9d3c8cae05be922b

          SHA1

          a89046cbf54c00e17ff0a5f3e1a8f01eb399bce4

          SHA256

          06ea3ad1c1c1067bfdfaa5ad8a91632fac6cad9776ded85fa65d3b6181d89be6

          SHA512

          d9614ecf528a2bf48cafe99a4c54d5c9f3656d628001fbf575d367d5ad8008cf30a58a7b3d9489d8534064442df89a7263df4a91d0863dcd6cc33574c576da33

        • C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQ

          Filesize

          20KB

          MD5

          c9ff7748d8fcef4cf84a5501e996a641

          SHA1

          02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

          SHA256

          4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

          SHA512

          d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

        • C:\Users\Admin\AppData\Local\Temp\pfRFEgmota

          Filesize

          92KB

          MD5

          9b43e176b30bab68f88ae294f9f6bc56

          SHA1

          f2a0297791668a2d5f41c5aeb6ebfeb0b835a15b

          SHA256

          afed81e2f90c02e3e723d744fe43ca3f02021b18c4adaccb9f5f340b71a2fea8

          SHA512

          9c8ab7bacbc3a133e602b396c85b9beab8c6ff45b10b762e07ce993b692a8f28dcb429219a40e5457bddfa01b4820d1b4cfc43ccd614d54f2cfbf796f3b9168a

        • C:\Users\Admin\AppData\Local\Temp\tcuAxhxKQFDaFpL

          Filesize

          71KB

          MD5

          dfeffc3924409d9c9d3c8cae05be922b

          SHA1

          a89046cbf54c00e17ff0a5f3e1a8f01eb399bce4

          SHA256

          06ea3ad1c1c1067bfdfaa5ad8a91632fac6cad9776ded85fa65d3b6181d89be6

          SHA512

          d9614ecf528a2bf48cafe99a4c54d5c9f3656d628001fbf575d367d5ad8008cf30a58a7b3d9489d8534064442df89a7263df4a91d0863dcd6cc33574c576da33

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5H22N63E0MWM3WO5VDKX.temp

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          b345e772209b4276d04218b7ff14171c

          SHA1

          362258c5805167a559ae8adb02d5be87c84773b5

          SHA256

          c61427810ee04bdfe50a7de1a1ed25b2a534dd8c3695a70c1dce6c2643eb61c5

          SHA512

          8bcae06a879ebcaf1286da2d95d8420b0ccd8e1572911f6213698b95fa2d0049317422d0541169605d07c765ffffb279b2188e3ed4538ae47d9103174681f998

        • \??\PIPE\srvsvc

          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • \??\PIPE\srvsvc

          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • memory/628-126-0x0000000002500000-0x0000000002540000-memory.dmp

          Filesize

          256KB

        • memory/628-125-0x0000000002500000-0x0000000002540000-memory.dmp

          Filesize

          256KB

        • memory/1004-76-0x0000000074440000-0x000000007446E000-memory.dmp

          Filesize

          184KB

        • memory/1004-72-0x0000000073CC0000-0x0000000073E50000-memory.dmp

          Filesize

          1.6MB

        • memory/1004-71-0x0000000073E50000-0x00000000740C8000-memory.dmp

          Filesize

          2.5MB

        • memory/1592-116-0x0000000002580000-0x00000000025C0000-memory.dmp

          Filesize

          256KB

        • memory/1592-117-0x0000000002580000-0x00000000025C0000-memory.dmp

          Filesize

          256KB

        • memory/1804-66-0x0000000002740000-0x0000000002780000-memory.dmp

          Filesize

          256KB

        • memory/1804-67-0x0000000002740000-0x0000000002780000-memory.dmp

          Filesize

          256KB

        • memory/1804-68-0x0000000002740000-0x0000000002780000-memory.dmp

          Filesize

          256KB

        • memory/1908-108-0x0000000002700000-0x0000000002740000-memory.dmp

          Filesize

          256KB

        • memory/1908-107-0x0000000002700000-0x0000000002740000-memory.dmp

          Filesize

          256KB

        • memory/2012-54-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-85-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-63-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-62-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-61-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-60-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-59-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-58-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-57-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-56-0x0000000000400000-0x0000000000747000-memory.dmp

          Filesize

          3.3MB