Analysis

  • max time kernel
    71s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13/04/2023, 20:53

General

  • Target

    AURORA_STEALER.zip.exe

  • Size

    1.6MB

  • MD5

    a7a5c04005c17d1fa983f835cffbd183

  • SHA1

    c79fb9d8fdbead904459bd9d1ffadf6ce43c9374

  • SHA256

    3494f9352c5bd48f55caddbbb63515f8058763e28f8e5f8fa5411a5de835ca8e

  • SHA512

    9a7aa97489f376c2cb4864c2d4f6a41978a25a5f0171c30077ceb4302fd58e5823f199f0dcf89f57ec48d31ebfbb01a8d258a1e7d0b391b7ac613bba6f2a1cee

  • SSDEEP

    24576:84nXubIQGyxbPV0db26FYiC9ubtQo+8YzqNAh3XBQ0FPcQsY8Nl85Xab6s5va:8qe3f6KiC9ut9+QAPcTYy2Wi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\AURORA_STEALER.zip.exe
    "C:\Users\Admin\AppData\Local\Temp\AURORA_STEALER.zip.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\is-0TP9P.tmp\AURORA_STEALER.zip.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0TP9P.tmp\AURORA_STEALER.zip.tmp" /SL5="$70126,857904,780800,C:\Users\Admin\AppData\Local\Temp\AURORA_STEALER.zip.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\Users\Admin\AppData\Local\Temp\AURORA_STEALER.zip.exe
        "C:\Users\Admin\AppData\Local\Temp\AURORA_STEALER.zip.exe" /SILENT
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:584
        • C:\Users\Admin\AppData\Local\Temp\is-M0R8V.tmp\AURORA_STEALER.zip.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-M0R8V.tmp\AURORA_STEALER.zip.tmp" /SL5="$80126,857904,780800,C:\Users\Admin\AppData\Local\Temp\AURORA_STEALER.zip.exe" /SILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Users\Admin\AppData\Local\MicroApp\EdgeInstall.exe
            "C:\Users\Admin\AppData\Local\MicroApp\EdgeInstall.exe" install
            5⤵
            • Executes dropped EXE
            PID:1876
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\MicroApp\edge.bat" install"
            5⤵
              PID:1484
            • C:\Windows\system32\cmd.exe
              "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\MicroApp\reg.bat" install"
              5⤵
                PID:1444
              • C:\Users\Admin\AppData\Local\ServiceApp\ChromeInstall.exe
                "C:\Users\Admin\AppData\Local\ServiceApp\ChromeInstall.exe" install
                5⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:660
                • C:\Windows\system32\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\ServiceApp\chrome.bat" "
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1936
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\ServiceApp\reg.xml" /tn ChromeUpdate
                    7⤵
                    • Creates scheduled task(s)
                    PID:1672
              • C:\Windows\system32\cmd.exe
                "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\ServiceApp\chrome.bat" install"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2032
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\ServiceApp\reg.xml" /tn ChromeUpdate
                  6⤵
                  • Creates scheduled task(s)
                  PID:1768
              • C:\Windows\system32\cmd.exe
                "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\ServiceApp\reg.bat" install"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:288
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\ServiceApp\reg.xml" /tn ChromeUpdate
                  6⤵
                  • Creates scheduled task(s)
                  PID:544
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe" https://getfiles.wiki/welcome.php
                5⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1300
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:2
                  6⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1612

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              61KB

              MD5

              e71c8443ae0bc2e282c73faead0a6dd3

              SHA1

              0c110c1b01e68edfacaeae64781a37b1995fa94b

              SHA256

              95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

              SHA512

              b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              61KB

              MD5

              e71c8443ae0bc2e282c73faead0a6dd3

              SHA1

              0c110c1b01e68edfacaeae64781a37b1995fa94b

              SHA256

              95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

              SHA512

              b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              854f170aceaa3e5a085fa951cc36eb5d

              SHA1

              f35cae7f20d20692ba49ef1a528572e762473911

              SHA256

              a1874a4df8c608978b0f554a5f701c988d700e720941e75b285ae27899d35f52

              SHA512

              dc918b8acf6eea2f25d70de99bdb6148bf56b7f7aca91d5e31a62e30ee7b96d74d2ab6957a04afc458ea1f4e7b552305478e0f05b04c018e82389807cdbbdedb

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              0d19c8607390113fa08eabb0cc365cfe

              SHA1

              8c726bfeaeb9353628b92765f92aeef2950f9c4d

              SHA256

              399ac8b50d8b150bb754cdf0367810023d7619cc507eb4e5ac38961930ad50da

              SHA512

              a96c5499b31193b0f4456709ddbf200ad3ce696f8124808fece038f70d486b3a641f6f3fe983869d3f7cc5b169f15864a43f00504dd7e5eb843b18a20eaf4a51

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              997cd06d59d55cd5e3ffd63ff60023c9

              SHA1

              d93d90fe33094b63fd400729c29fdaf4a003aa73

              SHA256

              422836d129b3ca6f8ab2ca06ff0fbf0395f0b1d273d5359685713702aee46abd

              SHA512

              8cd7fac3625d2c6bf35d8318000f50bda5ddd5e55afe5911d73cf4147235fd069a39092a3bf6596faab456efd64bd6081aab6b89f234cb086519c11d1a2a2367

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              6c36250a91af2b48d0bd14fb51d18120

              SHA1

              fa1f29b0ed170de3c068b7ae7e1ff5aa931f3b19

              SHA256

              2015c563e9291379bb27d971f2db355696ae570ede5f8b66c308b80f31c568b1

              SHA512

              956d041e99da9b3d8b184464dd9d9b8bebff5aa65f88334dbfc8223725cf1afd6a592cfaa90210c71b44be2a8735b6fade88dd26d90b93393fcee8759d5cf333

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              89f2f4e6f41df63e009026e1a85e5e49

              SHA1

              8b09ed498671518effb1b94ae8bf0fbb6ed69f82

              SHA256

              b3f458d87dc89ab2809edd5a1e56081e768bd775da9c09c65054f23a3ee81720

              SHA512

              d946e48e2476a72ef4504e02c14d18d13a2a7e0958442bf3499acdcce28008b5973c6d3d2a4b62c46e940a963529d0ba4fc644ee414b1c73e6f6551e9964785b

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              ce86344ce4989f200aceb67876696b54

              SHA1

              77cf6f31ce42392a2ec9638f2693d3f046137a43

              SHA256

              85b26df9141a544a55e31b3055249b1ca5fb84d07f89e37575878295892fac1c

              SHA512

              a1b2c0e35b3eaa1c965fe57cbdff8079ffaf49c1c89ddf02921840b58aa8d093fd997a699751e40d3d833f70c2ef38058fe544babaa4ceb6c322520380de2644

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              408b4a316a553cf622f6232eb31bdc72

              SHA1

              905951ec27bcba9754ae03c022daff951e2b3fdd

              SHA256

              1d37cad9bea0e688ced9d3162e535b29f475a41ee1bccf9eb9f5a024c35afbdf

              SHA512

              1f94d4ba72bc67295ebd1472e086e5399e1c1180492b73da96090e25be42c3d68b7c0dc4deadaf73246a4a7c08771ca52fb38ebafb7f00ce9159828d61bb6316

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              4ebfbaaef00aa6007f00fe9ac3a63275

              SHA1

              989909aa18ad6ec7b571d812a7b9004443b24b29

              SHA256

              d0be8465537d90304a9e012042f8d899ad792ef4dda45bf608532890430cbcec

              SHA512

              38a4ba008c06dcbac07748c66bb60239f41abaabb3dc9d20681d8d341fa8dda4ffe48a358272d5137b3c89f54384e4fe7e448ead283cbf06616a45df07ed9dfe

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              edf8ecd7ce24699c5b453b01bee773a4

              SHA1

              e0771fea8a07eeed22d8edeecbfdbab9d0a951a1

              SHA256

              c782b4eb871742e89e456341bc8c2fdcfe77407a701c295f00141f77db843c42

              SHA512

              2179eb86765a1529a2b1f2da92c345c5f81410c8583c830f7b411d8be67d8c2ce5c0c93f04d513dfbeee82128ded9f06cf1d614034477169a467ef233eb16cf6

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              2e8d262a6c072ec87375238846eeb54a

              SHA1

              503f48dc9658e46d94eba79d7f5038d2e5dab5ca

              SHA256

              25b59a1c23017334811198b4d10a0ec13ee86779f6142cdd629bd77e56f9ea65

              SHA512

              abe2bf1e08b507da3905f65ed34811229f70621217dcb4017b2284f6d7cae470cf3a018e1334a5c2ebc3932cff1a5435e6972fc49fe502676b6e92bf91bf8e20

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              6a31d8d573a73936bdf8c5388d7a469b

              SHA1

              59fa5b85919edccd59c04ddf4855589148e0c6d3

              SHA256

              6bc627ac41f935e85fa6465fb34785ed06e34553d1b66a789413614adc03cbc4

              SHA512

              8c5845650ef306ca3ce2fdd230ac61e40f1919ad892ea3c55c9e48ee9be107a8e6746243672c96df93b44b17b2b9b936a9b941e9371e5fd7467495de760e8891

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              6d0e9f7ed4631982ce577946fb9c7fdb

              SHA1

              7533481fedc117d62ca0d96f39d72bd3807b33d0

              SHA256

              683701fe8394049b830d101f10d79d2331c1ac37b5ad2c4daa814251b8155e01

              SHA512

              b34cb33de4470a2cfcb232e272813de969f3b12487e5c6e57793e7cf853f110a665676d0e54acf3d849311ec441e41a70256b2e610d835f818a869a0fb76af03

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              3a7a96eab594c03ed8434462b2298646

              SHA1

              005fa5c56b80c45e588760c8df171357a6e98ca0

              SHA256

              fbebaeb8ad1a292b84c1441d413b6a622333c8f411415ab03cb98dc36302ac79

              SHA512

              801d28b8f2a922c88350b534ef136e93b1294604b6282543a543de1df3f39ddaa477675306381032b08abe95b4754483e17c1e54521e1cada5ba25fb980db262

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              f1d19b06565ad8a00368d3170a0e089c

              SHA1

              134219c31d96c0971407fd2347b90c1710f57adf

              SHA256

              7f5b6656efa255dd12d02c492f9a1f172b86f01406e2ba1dd9ee31ec216b4d98

              SHA512

              19920959b4b3c8c7def2aed6550bb1f3829e7c90cf614b11d5c0f29f5cd6203eb0a058683ab94be243955bdfbf00ee617c88624ce2a8392056c0213454c0a76b

            • C:\Users\Admin\AppData\Local\MicroApp\EdgeInstall.exe

              Filesize

              77KB

              MD5

              bc44c3f3b1e233ccf83e964193f4cc0d

              SHA1

              39edb51f947f28aea5137e7576af989999dae336

              SHA256

              14c853a40f6e752de66dd981570cbfae5bb73728e2cb45e541d44f79e49d26a3

              SHA512

              1b7a5c2ff59d1a7e2decad9b9e23d75925e58acb23691250d93effa8ad0f344a07a87468ac5fb6869a0857a4caf922af9b6a5524f4633375d050b888a50bf5fd

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\p734dsx\imagestore.dat

              Filesize

              9KB

              MD5

              d74c583f89fdc02274d253de2d25c595

              SHA1

              5edc23c2665942428b7507877cd6edfe97b06068

              SHA256

              34c692d323dbad5da14cff5eac09e0bd5b084a63ae65a9cbe2d15fdefbaa0cc2

              SHA512

              1d102e408b27d0988798481c4864eb7ccf1fc0c719fedd3a06cc675483566e49b0a313b99119781936ccf14cc46ff94b35ab0e747ebef12d982fa1c255ffafdf

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\favicon[1].ico

              Filesize

              5KB

              MD5

              f3418a443e7d841097c714d69ec4bcb8

              SHA1

              49263695f6b0cdd72f45cf1b775e660fdc36c606

              SHA256

              6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

              SHA512

              82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\suggestions[1].en-US

              Filesize

              17KB

              MD5

              5a34cb996293fde2cb7a4ac89587393a

              SHA1

              3c96c993500690d1a77873cd62bc639b3a10653f

              SHA256

              c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

              SHA512

              e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

            • C:\Users\Admin\AppData\Local\ServiceApp\ChromeInstall.exe

              Filesize

              77KB

              MD5

              cfbb52f1bd761012d807812db9566a8b

              SHA1

              19dd3f2e07ad768fab6b68e3a9fac8bcf33eec09

              SHA256

              a9d5c1acfe3af5f3ac2c4d7caf04da163b21a6f835ea0dfaf36a38b058e7f43e

              SHA512

              1b0a4b9fdde39c5a84216b90937d5f2ff73144251642b241eb673687c2e17281441ef84785591bcd78b2400a6ffb5224b157c636c8dbb11d0fda3392d4e3b7b0

            • C:\Users\Admin\AppData\Local\ServiceApp\apps-helper\apps.crx

              Filesize

              45KB

              MD5

              f817b65405cb7047fa3d770da9068fcb

              SHA1

              456a8402147937a0accdaf0929872cdbc1e528c1

              SHA256

              2083709afce4bf24713e75d2511ecc0e092766487c8f23625dc9e31254176c2b

              SHA512

              3d95b64699291162f338d91da0029245b816a115e415cf9329a352c91b0df20f1bd923e48c31cb4184495f90c7ebcdf076dbb47a7ec048b3e88d6c6ef6133b9d

            • C:\Users\Admin\AppData\Local\ServiceApp\apps-helper\manifest.json

              Filesize

              280B

              MD5

              4e08d28dc99dcea89eb316a373b74758

              SHA1

              15f89379ba476d2c35bf33abd37c1b16cb3ae2f4

              SHA256

              a507d1f546c979056ce392467ede397c94ef854d9b5c7581462feef6e9b091ef

              SHA512

              e12733b3a346a2b67c6eb92090a08306ca0deede599ac9242338004ae5d075f51102360d9fb4cce20946aad89b1007c43ace367fb66608aa517f854bc2cb1685

            • C:\Users\Admin\AppData\Local\ServiceApp\apps-helper\service.js

              Filesize

              320B

              MD5

              1e42eb55ac7c73074f16c2a9d54a724e

              SHA1

              28395abcb2b8f08401dd364b89494657379ff19b

              SHA256

              639b4aa439b6230d88445db584ce81835a8236c4cc5b0610c8ecc728941693b7

              SHA512

              2642b0e476d263a3c3ad5e6ab658b19a3ce6c90ff5eddea5feb6fcd46bf4cdad23c606a3d4692b4dd100bfeeca582653d90d3ea11935b03129758b267615bd83

            • C:\Users\Admin\AppData\Local\ServiceApp\apps-helper\web.js

              Filesize

              299B

              MD5

              78da8c3c7bcc4fcbe1d1c1d4209ba026

              SHA1

              ccacda33826629e3a5b552ba26227d9d1b026bca

              SHA256

              893fcfe4edcdb07bcc3e05a3304f93f0358c9d8f4cc967058585f553bb82ad02

              SHA512

              01c3def2b9a38abd5c6d447c52d8ec3533c8098db69dcf30682efa992be71666d66a56ab3e6b161f8017fe018e20e479c365b780f3cf94ed507caea99eadbc06

            • C:\Users\Admin\AppData\Local\ServiceApp\chrome.bat

              Filesize

              3KB

              MD5

              6f74e5af1bc001acc97e390d64b3bd8c

              SHA1

              e942971eedb25f1efe5873e2ccb250350a764908

              SHA256

              0b99dd73a90d09c52b583616e01ce4d4a635ee65eccce2d4bb6ed457a6134416

              SHA512

              8f14a3344f6c5887652e570d5fcaaf1a3e13cdda7a31dae081a33ae4bbc8aa7fdab6dcbf992b4cd96043eba74569e24384199c4fac7a608bad2efa7c8d002d14

            • C:\Users\Admin\AppData\Local\ServiceApp\chrome.bat

              Filesize

              3KB

              MD5

              6f74e5af1bc001acc97e390d64b3bd8c

              SHA1

              e942971eedb25f1efe5873e2ccb250350a764908

              SHA256

              0b99dd73a90d09c52b583616e01ce4d4a635ee65eccce2d4bb6ed457a6134416

              SHA512

              8f14a3344f6c5887652e570d5fcaaf1a3e13cdda7a31dae081a33ae4bbc8aa7fdab6dcbf992b4cd96043eba74569e24384199c4fac7a608bad2efa7c8d002d14

            • C:\Users\Admin\AppData\Local\ServiceApp\reg.bat

              Filesize

              92B

              MD5

              f1dde104c6ad1863d0d2dbf02acf2ace

              SHA1

              cebc1498cc1ddc64ec458d16e63c6e5bea64babb

              SHA256

              466ac922e79cece3b3cd23bad01279ea44984f3041411ab09b0e3f75211df202

              SHA512

              f71c06e176ae3c529d90923dac0a7f91c4e85ac46162f9c9d6059824644db13e11bee97128e0f0f78ec8458403cea0e0268b8dd446f18d85fcbb81b5e598f16c

            • C:\Users\Admin\AppData\Local\ServiceApp\reg.xml

              Filesize

              1KB

              MD5

              6305fa6b726851ca8c9df1a54cc2cfc7

              SHA1

              d4f992d128abda324194010badf23fc0ffa340dd

              SHA256

              c6b11ec2f1a508c0abc16ce2ee02650b7f0f20f2676faf3af64d807ebaba2d12

              SHA512

              07c3c1fa5b4dbfc350bdb172caaddae0cc281e75ad081d79ffc213e769892d2ce676f1fe262f7bbccab99c3e04fdc1d3e70b34a1e61b0317437b96e9913074f7

            • C:\Users\Admin\AppData\Local\Temp\Cab2B48.tmp

              Filesize

              61KB

              MD5

              fc4666cbca561e864e7fdf883a9e6661

              SHA1

              2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

              SHA256

              10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

              SHA512

              c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

            • C:\Users\Admin\AppData\Local\Temp\Tar308C.tmp

              Filesize

              161KB

              MD5

              be2bec6e8c5653136d3e72fe53c98aa3

              SHA1

              a8182d6db17c14671c3d5766c72e58d87c0810de

              SHA256

              1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

              SHA512

              0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

            • C:\Users\Admin\AppData\Local\Temp\is-0TP9P.tmp\AURORA_STEALER.zip.tmp

              Filesize

              2.9MB

              MD5

              a93a63a9e371af57ae7ff4d3d1a8068c

              SHA1

              a0d8e6fd4975e3547d60daaadb17206b56677bf2

              SHA256

              e09808b81703ecc9af9bf588168da0eafbf84bf07b3e9cc57a22360af6b2e9f3

              SHA512

              f94f6629442c33576cd688e205b5df8a640de2ced7a595a7030f4e72965bcc4b3df6265e41b983a087e78f10b09132e5310ad1586bb51570860eb7f7b7eb94b4

            • C:\Users\Admin\AppData\Local\Temp\is-M0R8V.tmp\AURORA_STEALER.zip.tmp

              Filesize

              2.9MB

              MD5

              a93a63a9e371af57ae7ff4d3d1a8068c

              SHA1

              a0d8e6fd4975e3547d60daaadb17206b56677bf2

              SHA256

              e09808b81703ecc9af9bf588168da0eafbf84bf07b3e9cc57a22360af6b2e9f3

              SHA512

              f94f6629442c33576cd688e205b5df8a640de2ced7a595a7030f4e72965bcc4b3df6265e41b983a087e78f10b09132e5310ad1586bb51570860eb7f7b7eb94b4

            • C:\Users\Admin\AppData\Local\Temp\is-M0R8V.tmp\AURORA_STEALER.zip.tmp

              Filesize

              2.9MB

              MD5

              a93a63a9e371af57ae7ff4d3d1a8068c

              SHA1

              a0d8e6fd4975e3547d60daaadb17206b56677bf2

              SHA256

              e09808b81703ecc9af9bf588168da0eafbf84bf07b3e9cc57a22360af6b2e9f3

              SHA512

              f94f6629442c33576cd688e205b5df8a640de2ced7a595a7030f4e72965bcc4b3df6265e41b983a087e78f10b09132e5310ad1586bb51570860eb7f7b7eb94b4

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\O80PN7YY.txt

              Filesize

              608B

              MD5

              b8f3e80c40ad5db0b196f4bdd9fca7d8

              SHA1

              e5505dbc5908a3f4c2db4c31737f641445593e5b

              SHA256

              7911c78e4cf62cc899d092122fd7a25230663005491b5eaceadcc33c2469c934

              SHA512

              6cb99800bc40631f8487850e3c61ff62c105a9791aac597452367fbdae9c545d1d48e47503d4d7abf7a7a6b58612072ce754f6c00ce9496b829963dc2b8ea9ee

            • \Users\Admin\AppData\Local\MicroApp\EdgeInstall.exe

              Filesize

              77KB

              MD5

              bc44c3f3b1e233ccf83e964193f4cc0d

              SHA1

              39edb51f947f28aea5137e7576af989999dae336

              SHA256

              14c853a40f6e752de66dd981570cbfae5bb73728e2cb45e541d44f79e49d26a3

              SHA512

              1b7a5c2ff59d1a7e2decad9b9e23d75925e58acb23691250d93effa8ad0f344a07a87468ac5fb6869a0857a4caf922af9b6a5524f4633375d050b888a50bf5fd

            • \Users\Admin\AppData\Local\ServiceApp\ChromeInstall.exe

              Filesize

              77KB

              MD5

              cfbb52f1bd761012d807812db9566a8b

              SHA1

              19dd3f2e07ad768fab6b68e3a9fac8bcf33eec09

              SHA256

              a9d5c1acfe3af5f3ac2c4d7caf04da163b21a6f835ea0dfaf36a38b058e7f43e

              SHA512

              1b0a4b9fdde39c5a84216b90937d5f2ff73144251642b241eb673687c2e17281441ef84785591bcd78b2400a6ffb5224b157c636c8dbb11d0fda3392d4e3b7b0

            • \Users\Admin\AppData\Local\Temp\is-0TP9P.tmp\AURORA_STEALER.zip.tmp

              Filesize

              2.9MB

              MD5

              a93a63a9e371af57ae7ff4d3d1a8068c

              SHA1

              a0d8e6fd4975e3547d60daaadb17206b56677bf2

              SHA256

              e09808b81703ecc9af9bf588168da0eafbf84bf07b3e9cc57a22360af6b2e9f3

              SHA512

              f94f6629442c33576cd688e205b5df8a640de2ced7a595a7030f4e72965bcc4b3df6265e41b983a087e78f10b09132e5310ad1586bb51570860eb7f7b7eb94b4

            • \Users\Admin\AppData\Local\Temp\is-M0R8V.tmp\AURORA_STEALER.zip.tmp

              Filesize

              2.9MB

              MD5

              a93a63a9e371af57ae7ff4d3d1a8068c

              SHA1

              a0d8e6fd4975e3547d60daaadb17206b56677bf2

              SHA256

              e09808b81703ecc9af9bf588168da0eafbf84bf07b3e9cc57a22360af6b2e9f3

              SHA512

              f94f6629442c33576cd688e205b5df8a640de2ced7a595a7030f4e72965bcc4b3df6265e41b983a087e78f10b09132e5310ad1586bb51570860eb7f7b7eb94b4

            • memory/436-84-0x00000000002C0000-0x00000000002C1000-memory.dmp

              Filesize

              4KB

            • memory/436-119-0x0000000000400000-0x00000000006EE000-memory.dmp

              Filesize

              2.9MB

            • memory/584-64-0x0000000000400000-0x00000000004CC000-memory.dmp

              Filesize

              816KB

            • memory/584-121-0x0000000000400000-0x00000000004CC000-memory.dmp

              Filesize

              816KB

            • memory/1308-66-0x0000000000400000-0x00000000004CC000-memory.dmp

              Filesize

              816KB

            • memory/1308-54-0x0000000000400000-0x00000000004CC000-memory.dmp

              Filesize

              816KB

            • memory/1312-63-0x0000000000400000-0x00000000006EE000-memory.dmp

              Filesize

              2.9MB