Overview
overview
10Static
static
10Aurora/aurora.exe
windows10-2004-x64
1Aurora/web...IX.xml
windows10-2004-x64
1Aurora/web...e2.xml
windows10-2004-x64
1Aurora/web... 2.xml
windows10-2004-x64
1Aurora/web/bot.html
windows10-2004-x64
1Aurora/web...s.html
windows10-2004-x64
1Aurora/web/ds.html
windows10-2004-x64
1Aurora/web/index.html
windows10-2004-x64
1Aurora/web...min.js
windows10-2004-x64
1Aurora/web/js/main.js
windows10-2004-x64
1Aurora/web...r.html
windows10-2004-x64
1Aurora/web...s.html
windows10-2004-x64
1Aurora/web...c.html
windows10-2004-x64
1Analysis
-
max time kernel
63s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2023 22:44
Behavioral task
behavioral1
Sample
Aurora/aurora.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Aurora/web/4x3/MIX.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Aurora/web/assets/Ellipse2.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
Aurora/web/assets/emoji-heart-eyes 2.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Aurora/web/bot.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Aurora/web/commands.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Aurora/web/ds.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Aurora/web/index.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Aurora/web/js/app.min.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
Aurora/web/js/main.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
Aurora/web/rergister.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
Aurora/web/settings.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Aurora/web/statistic.html
Resource
win10v2004-20230220-en
General
-
Target
Aurora/web/rergister.html
-
Size
16KB
-
MD5
1b11a8aadc72b2b6849c173edd89cab9
-
SHA1
4a81908f7c2b8a3c1d1f8295753952bd433d54c4
-
SHA256
d7829f17583b91fb1e8326e1c80c07fc29e0608f1ba836738d2c86df336ea771
-
SHA512
6c92e567be238b55e1c003f17ff26f0a7f2a623900a3926117c64cb2802473c5ce4c3bcb6e41c6ab7596015f6581c9d1868fd1d40b53423483ca8c4159e2b2b8
-
SSDEEP
384:8AId+dEX55sD+Egz5k29nGCBmcWaswjwarwTR7ZU+Xxmi:LEX7sD+cYpjwaE/U4Ui
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133290171544950816" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 5040 chrome.exe 5040 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 5040 chrome.exe 5040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe Token: SeShutdownPrivilege 5040 chrome.exe Token: SeCreatePagefilePrivilege 5040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 5040 wrote to memory of 1116 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 1116 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4844 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4812 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 4812 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe PID 5040 wrote to memory of 2072 5040 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Aurora\web\rergister.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac9d9758,0x7ffbac9d9768,0x7ffbac9d97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1804,i,13257664544523668284,16395451953032038859,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1804,i,13257664544523668284,16395451953032038859,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1804,i,13257664544523668284,16395451953032038859,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1804,i,13257664544523668284,16395451953032038859,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1804,i,13257664544523668284,16395451953032038859,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1804,i,13257664544523668284,16395451953032038859,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4908 --field-trial-handle=1804,i,13257664544523668284,16395451953032038859,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1804,i,13257664544523668284,16395451953032038859,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD5de12294e6b6b349ffeb0148b2fe13c7c
SHA15c663aff06d4aa1858c300da1f1e9711a2292690
SHA25646c29e443d273b6b76bbac34ddcdfff38ab3644caed82ba8bd3d79557ba160ae
SHA512dc0ec8deb6627b892164ef4a2a7c08658bf3e989477762b5ad47ecb4a34a12b63fcedb1be3b9814a19484290b44d4c4fd739c8f0e06b692e1d1ef2116f3ddd66
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD589dabf619e1a0e61cd86cf7f0a2dd68a
SHA1d50f0709baffabc0f5cf31a7a6d04f3340460b55
SHA2569460a4c2b75d1c6c5ddca80f5c503bb98145ddef20035a00b1133b3f29ea0694
SHA512a2225728879d991183f98da596bd914228ef043f2a07413a423915d2a697dc6cd836b1b076302330bebb218ffa482737a53e3697394e308ed0733edae5fee18f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD56fc163ede4590e9d3fde935ad5bb56aa
SHA1a95f8072c0fe7482f7b88ae1c7b6ebc3d448dc0c
SHA2567b7ac0b2ac7aa1c417fb969e42a090b952e6beeeaa0b97c130b41f5ee3119df3
SHA512e25fe8d6a626e12333c8546f27ae844f55b7b83ddac9e29f6eb3812a0ed13d7a9b2caafba63c1a77304dda37876e5c3bc0d57667b24b8daa90519d7623833035
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD570063a17731a50d77ac8d90c19b928ef
SHA18f8b5bf05453ccddbcd4823567031cf987456024
SHA256c7f5eeb3a5c0d5e63dfaa3547d67cfd82e6e4539489727872d2dc3b096aa9ef3
SHA5124635be490d03628da037fb2afbeb108828a6c7d2da3a050acc76bba2e2a6faa4e8561adae7c390d0566984f190ec90fc5b059d422bac8471d95f47055252fd00
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
151KB
MD5eb7eb605c9dcc9b7ab27a4f78e721278
SHA1f980c79ba49e75a71a52d99070321a25fe855a04
SHA2565cc4cf98b35910514ecb360776d26e7047a23de92d394e3088a0b6afe1276b20
SHA51207d4fab0ce346f9aaa4cc5cd101e6efccc8944d7f642c39aec8b2f73c2deaa223f67837c9ca023c7ad99ac4513a2bcb2c5bdb75e2f6a248079800a40851c156a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_5040_LDEIUBFCBMJXRLDCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e