Overview
overview
10Static
static
10Aurora/aurora.exe
windows10-2004-x64
1Aurora/web...IX.xml
windows10-2004-x64
1Aurora/web...e2.xml
windows10-2004-x64
1Aurora/web... 2.xml
windows10-2004-x64
1Aurora/web/bot.html
windows10-2004-x64
1Aurora/web...s.html
windows10-2004-x64
1Aurora/web/ds.html
windows10-2004-x64
1Aurora/web/index.html
windows10-2004-x64
1Aurora/web...min.js
windows10-2004-x64
1Aurora/web/js/main.js
windows10-2004-x64
1Aurora/web...r.html
windows10-2004-x64
1Aurora/web...s.html
windows10-2004-x64
1Aurora/web...c.html
windows10-2004-x64
1Analysis
-
max time kernel
63s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2023 22:44
Behavioral task
behavioral1
Sample
Aurora/aurora.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Aurora/web/4x3/MIX.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Aurora/web/assets/Ellipse2.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
Aurora/web/assets/emoji-heart-eyes 2.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Aurora/web/bot.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Aurora/web/commands.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Aurora/web/ds.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Aurora/web/index.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Aurora/web/js/app.min.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
Aurora/web/js/main.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
Aurora/web/rergister.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
Aurora/web/settings.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Aurora/web/statistic.html
Resource
win10v2004-20230220-en
General
-
Target
Aurora/web/statistic.html
-
Size
10KB
-
MD5
72208f63646db492311708c3d1561516
-
SHA1
d9997465b824b261cfe5a70ce1aa857e383f0991
-
SHA256
f1ba92ae32fcaeea8148298f4869aef9bcd4e85781586b69c83a830b213d3d3c
-
SHA512
67b0186c8c770a66d983f1b8795f7821773e9defb9bb632c2f68af4c7d1b6bf09497026ec244f4f95bfa6be312ce00edfaec904083afcec568891257beb6e298
-
SSDEEP
192:M7oT3Mx2aMp/RdEYiYolNOVX2VasSG+EgxVX2VasSG+EgMOVX2VasSG+EgHden:McId+dEX5PasD+EgGasD+EgkasD+Eg9G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133290171477073582" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4592 chrome.exe 4592 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 4592 chrome.exe 4592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4592 wrote to memory of 4052 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 4052 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3764 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 2180 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 2180 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe PID 4592 wrote to memory of 3976 4592 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\Aurora\web\statistic.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc98929758,0x7ffc98929768,0x7ffc989297782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1832,i,9547442601039540306,13507349854138070639,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1832,i,9547442601039540306,13507349854138070639,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1832,i,9547442601039540306,13507349854138070639,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1832,i,9547442601039540306,13507349854138070639,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1832,i,9547442601039540306,13507349854138070639,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1832,i,9547442601039540306,13507349854138070639,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1832,i,9547442601039540306,13507349854138070639,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1832,i,9547442601039540306,13507349854138070639,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD561a669b1a3d0ff5c5f8255fed50983e9
SHA1599e6304a1b58dc2b8e0737ec8ba9b1ae0e51662
SHA2560c1b73ab5e7bc590463957ab8396758734c291a6f3e66f3d9b00b5327ab2b6e9
SHA512730fdc4ebb092eb564198bd56f172d5fd9c66e444d04046cae299ac12da442bb3ca9d75f277328af60c5c900dcbb9c7f0649b4e90a70049ffb1b84f5e4971b0f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD580ffda4763e17b5d6bbc78f4e8e59e3e
SHA1bcdc6c2cba3e62eff0a69f55721d923f2a483a8f
SHA256e84a900b319f1b568e457b048d5a580b6aac7f0f6e9487354090b4fe30f12be9
SHA512076876e5077304f73ebf5ac1765791250f580e36b43bcc7dd11529bbea91b9186b9c6f1b0f6f5ce419d5ce9574b418f0e064e478da361f27f9aa264b9f4367f2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5fd79ed569963939feda478f2f1c066c3
SHA1ebcf682c2f5346759d13b649ae46a860c5d5cd63
SHA256ba7a351f487fa9ac05d2cbe2817743a16d18b87a22224527847a68428f2c74da
SHA51211782d66bfc18389268ba7eb2a6f9e3f169d23573505452accaa3f2ac8abfa695e3f29ccdac65e45d2657c36c0f3fcfc2960642dc045791304af04025a087704
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5d9883ce3ac0fbd839c9b725a8a5ad820
SHA1ea3a21fac789f9ff07d00bf6aeb7953138ae463d
SHA25613680ecde8eefcb77a928715cc5f330e86a80583232d8f2b37493fb547b11c9b
SHA5121dda08d1ddaf54691f60c599548e696c8685b211773ec52698bb70145e3415b991665987c771c2770a64b9d19c84c0ec0d6dafd236d811e0db7c5c80a7133d55
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
151KB
MD54062972403c86b797411440a6a9b395f
SHA1b800884187d7f8f501cb7f82a2c829a11d84ce96
SHA256cc10800bad6ae5e213bd069414483910952819763d2bb5f058de2c7d1e9bfac5
SHA512b337044150ae2c5a39957ed7063ab945dce25f3a0108ebf807c28de0254c69d86d55fbe16bd696a340c48843859a43f8a1114ac4fd2d024852ffb7e9ae82028e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_4592_MCGRDDIDRZHJRBDGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e