Overview
overview
10Static
static
9Aurora/Aurora.exe
windows7-x64
10Aurora/Aurora.exe
windows10-1703-x64
10Aurora/Aurora.exe
windows10-2004-x64
10Aurora/Aurora.exe
windows11-21h2-x64
10Aurora/scr...ts.dll
windows7-x64
1Aurora/scr...ts.dll
windows10-1703-x64
1Aurora/scr...ts.dll
windows10-2004-x64
1Aurora/scr...ts.dll
windows11-21h2-x64
1Analysis
-
max time kernel
89s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/02/2024, 21:27
Behavioral task
behavioral1
Sample
Aurora/Aurora.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Aurora/Aurora.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Aurora/Aurora.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral4
Sample
Aurora/Aurora.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
Aurora/scripts/scripts.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Aurora/scripts/scripts.dll
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
Aurora/scripts/scripts.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral8
Sample
Aurora/scripts/scripts.dll
Resource
win11-20240221-en
General
-
Target
Aurora/Aurora.exe
-
Size
1.1MB
-
MD5
38d563d90178c931132a5bd2dc05b76f
-
SHA1
4511b5462cddaf7835d20375f8e13087aedd3e5d
-
SHA256
a4cf6887caa6ca97d42659f9ab424c60cdfb41798f10bb429cb94379cd29ec83
-
SHA512
19810c3642d9d909a3632456c24837d021ffce267243e2d183f3c1ae3e8edd937df3e50ee26f3beae53a65a291283de801ee5581d7ac4582669879d8e97d9cfe
-
SSDEEP
24576:OlEXbCnFzRa860/IN7yUZoY/A6m9xzyysV2:5G9c3N7yUZoY/ALxz3sY
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2696 created 3264 2696 Follow.pif 43 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe RegAsm.exe -
Executes dropped EXE 3 IoCs
pid Process 2696 Follow.pif 2216 RegAsm.exe 776 qemu-ga.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4840 tasklist.exe 3380 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4188 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2696 Follow.pif 2696 Follow.pif 2696 Follow.pif 2696 Follow.pif 2696 Follow.pif 2696 Follow.pif 2696 Follow.pif 2696 Follow.pif 2216 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 Follow.pif -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4840 tasklist.exe Token: SeDebugPrivilege 3380 tasklist.exe Token: SeDebugPrivilege 2216 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2696 Follow.pif 2696 Follow.pif 2696 Follow.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2696 Follow.pif 2696 Follow.pif 2696 Follow.pif -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 232 wrote to memory of 2112 232 Aurora.exe 79 PID 232 wrote to memory of 2112 232 Aurora.exe 79 PID 232 wrote to memory of 2112 232 Aurora.exe 79 PID 2112 wrote to memory of 4840 2112 cmd.exe 81 PID 2112 wrote to memory of 4840 2112 cmd.exe 81 PID 2112 wrote to memory of 4840 2112 cmd.exe 81 PID 2112 wrote to memory of 680 2112 cmd.exe 82 PID 2112 wrote to memory of 680 2112 cmd.exe 82 PID 2112 wrote to memory of 680 2112 cmd.exe 82 PID 2112 wrote to memory of 3380 2112 cmd.exe 84 PID 2112 wrote to memory of 3380 2112 cmd.exe 84 PID 2112 wrote to memory of 3380 2112 cmd.exe 84 PID 2112 wrote to memory of 4992 2112 cmd.exe 85 PID 2112 wrote to memory of 4992 2112 cmd.exe 85 PID 2112 wrote to memory of 4992 2112 cmd.exe 85 PID 2112 wrote to memory of 4452 2112 cmd.exe 86 PID 2112 wrote to memory of 4452 2112 cmd.exe 86 PID 2112 wrote to memory of 4452 2112 cmd.exe 86 PID 2112 wrote to memory of 3004 2112 cmd.exe 87 PID 2112 wrote to memory of 3004 2112 cmd.exe 87 PID 2112 wrote to memory of 3004 2112 cmd.exe 87 PID 2112 wrote to memory of 3096 2112 cmd.exe 88 PID 2112 wrote to memory of 3096 2112 cmd.exe 88 PID 2112 wrote to memory of 3096 2112 cmd.exe 88 PID 2112 wrote to memory of 2696 2112 cmd.exe 89 PID 2112 wrote to memory of 2696 2112 cmd.exe 89 PID 2112 wrote to memory of 2696 2112 cmd.exe 89 PID 2112 wrote to memory of 4188 2112 cmd.exe 90 PID 2112 wrote to memory of 4188 2112 cmd.exe 90 PID 2112 wrote to memory of 4188 2112 cmd.exe 90 PID 2696 wrote to memory of 2216 2696 Follow.pif 91 PID 2696 wrote to memory of 2216 2696 Follow.pif 91 PID 2696 wrote to memory of 2216 2696 Follow.pif 91 PID 2696 wrote to memory of 2216 2696 Follow.pif 91 PID 2696 wrote to memory of 2216 2696 Follow.pif 91 PID 2216 wrote to memory of 776 2216 RegAsm.exe 92 PID 2216 wrote to memory of 776 2216 RegAsm.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\Aurora\Aurora.exe"C:\Users\Admin\AppData\Local\Temp\Aurora\Aurora.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Sen Sen.bat & Sen.bat & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵PID:680
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:4992
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 281374⤵PID:4452
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Publications + Pants + Lovers + Modes + Kenneth 28137\Follow.pif4⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Husband 28137\t4⤵PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\28137\Follow.pif28137\Follow.pif 28137\t4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
PID:4188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\28137\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\28137\RegAsm.exe2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"3⤵
- Executes dropped EXE
PID:776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5848164d084384c49937f99d5b894253e
SHA13055ef803eeec4f175ebf120f94125717ee12444
SHA256f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3
SHA512aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a
-
Filesize
63KB
MD542ab6e035df99a43dbb879c86b620b91
SHA1c6e116569d17d8142dbb217b1f8bfa95bc148c38
SHA25653195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b
SHA5122e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5
-
Filesize
1.1MB
MD5986cff60faca382fbcf9d6632ec5b2c3
SHA11a9bf3750b4d93c8920e0fe60886df1cdbcbb208
SHA2568ef5b39ce66ab49df3e052b265d8adbecbbbcc8390f8aa992108671a7033bf8a
SHA512d811e0ac82c55e8470418e2dbe98032057e1550f9c1f65bb69f1b4bc5ada9a849d355e1b7502bb67f7b0524458df93cdce9218c750cbbc633e2cf95b4b106f6e
-
Filesize
82KB
MD5924b86096d7d8ec45ec0f96502f63714
SHA117e8dd51e3b3060ad58bcc8eb06a5e7af105bf70
SHA256041c917b3737d721afee0b4ea10e4c9c9af0f3af3abaef5514f4f4018e6be9ad
SHA51262b89cd1c8e8fedbfe95a3ddc35bdb4e3537fc9a60779a6016ddcbc077c1cda2fc9c63d51e28e20ca54154b53a5629bdb407a799d26f54be81c88313b76cd903
-
Filesize
162KB
MD570a2d84c04d555dc3b79d71d94b9d086
SHA1e474d8f0d9c31cdf1033985d408e337b6e88c0e9
SHA256b539415140093c3e11841d194e1bf745515ebf6a372284d4763c24a8889f8b94
SHA512888c89b268c0db7a50d689d6b5c11cf22a7fe3d171d69021d2dc1b8eb8d0c8148c3f41ee177d96c0eff752ac80c6d10dc305326c8a49ffd88e864c7b6327006d
-
Filesize
258KB
MD5f7e8f703c3919dce79843592c370cb29
SHA14dfe3363eb3b8373c859ba48ce176484949f807e
SHA2569b41b0904a3937684938c6aeb472e73a226bf364a40db8266c82b03949fb7023
SHA512acf78d656ada7a02fcf2412268b0a511d7de1273a9bf5dc9c762bb914828541403ca5c95e68dc713c12e348f976535f7cc0e848d536fd85ac01936b383c04021
-
Filesize
164KB
MD5113fddce24cc705356a6e8dea6cc8126
SHA142dfb99a728b57ec610839cdbb9bf9d781493e1f
SHA256297a0b0a0d232b93aaeb816ae0023baf7e2aa3fd82a442bbf97932f42eb41ad5
SHA5129f4d41fc2c3695766ae501d52eba35e813e4e7c47da5a92f31530b500ae015d8791856300eab3de960afa37fe3680270499a7713abe29ff9e50036440a499331
-
Filesize
258KB
MD5adf24a0e56e0795db70356eaf45c68f9
SHA162783308f82d1b67ff799e05ce63057a17e61cde
SHA256211d9d5ae01cb0591a840d277b1f419247801bdf47501e549c017f4417cb7c43
SHA5127ab6a7e8d4fa170f3bdf7492ec4f2de873fb5f531741b723c466adc284676d673718b72e1cc3ca7e0527d89f9950a9ab36e4f8be29cffb81a7a3168cba0b48b4
-
Filesize
10KB
MD547242484a4c4add80cfe70e5c9ef26e8
SHA14f54561e6fa3d8a25bcee54b1d82a249b417e2d6
SHA256739614fc4a8b39e85b5beee50e516d645ffcdae0c73492bebfe75b91d008eab3
SHA5125ba733ebb3ea953e58349e09acd211519b312a26649e036a8454af6282f6b355f7d15eeaf89c1d79aa742ae6504e3e052db1f932728c9b2459352b036533ab89
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79