Analysis
-
max time kernel
146s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 10:37
Behavioral task
behavioral1
Sample
Avvrora X/Avrora X.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Avvrora X/Avrora X.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Avvrora X/scripts/scripts.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Avvrora X/scripts/scripts.dll
Resource
win10v2004-20240221-en
General
-
Target
Avvrora X/Avrora X.exe
-
Size
250.0MB
-
MD5
ba7a80a4835903d9a1d498321baba2e4
-
SHA1
cb50da942519873afdbc1e8151646b7c4bfe3347
-
SHA256
9e24bf46675e17849858ab882df5331a7083e3472fd74a8f832950a2b96e53f5
-
SHA512
fb4d5fab23e84b0d7344a2346e319a29ad558e0a565768c324280a9f3506c29973421bb2d32f19695d9046d52b5e30e4dc7c0f38439db3fb432421deda65346f
-
SSDEEP
49152:uDsXe9G2vrxJ6j/l2FUN15iVly80nXwFiFawpOT0ou0EXcH:uwuQ2DxJLCngEFad
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 904 set thread context of 1132 904 Avrora X.exe 88 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 904 wrote to memory of 1132 904 Avrora X.exe 88 PID 904 wrote to memory of 1132 904 Avrora X.exe 88 PID 904 wrote to memory of 1132 904 Avrora X.exe 88 PID 904 wrote to memory of 1132 904 Avrora X.exe 88 PID 904 wrote to memory of 1132 904 Avrora X.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Avvrora X\Avrora X.exe"C:\Users\Admin\AppData\Local\Temp\Avvrora X\Avrora X.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"2⤵PID:1132
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4812