Analysis

  • max time kernel
    89s
  • max time network
    93s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/02/2024, 21:27

General

  • Target

    Aurora/Aurora.exe

  • Size

    1.1MB

  • MD5

    38d563d90178c931132a5bd2dc05b76f

  • SHA1

    4511b5462cddaf7835d20375f8e13087aedd3e5d

  • SHA256

    a4cf6887caa6ca97d42659f9ab424c60cdfb41798f10bb429cb94379cd29ec83

  • SHA512

    19810c3642d9d909a3632456c24837d021ffce267243e2d183f3c1ae3e8edd937df3e50ee26f3beae53a65a291283de801ee5581d7ac4582669879d8e97d9cfe

  • SSDEEP

    24576:OlEXbCnFzRa860/IN7yUZoY/A6m9xzyysV2:5G9c3N7yUZoY/ALxz3sY

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3264
      • C:\Users\Admin\AppData\Local\Temp\Aurora\Aurora.exe
        "C:\Users\Admin\AppData\Local\Temp\Aurora\Aurora.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:232
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Sen Sen.bat & Sen.bat & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:4840
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
            4⤵
              PID:680
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:3380
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "wrsa.exe opssvc.exe"
              4⤵
                PID:4992
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c md 28137
                4⤵
                  PID:4452
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b Publications + Pants + Lovers + Modes + Kenneth 28137\Follow.pif
                  4⤵
                    PID:3004
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b Husband 28137\t
                    4⤵
                      PID:3096
                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\28137\Follow.pif
                      28137\Follow.pif 28137\t
                      4⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:2696
                    • C:\Windows\SysWOW64\PING.EXE
                      ping -n 5 127.0.0.1
                      4⤵
                      • Runs ping.exe
                      PID:4188
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\28137\RegAsm.exe
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\28137\RegAsm.exe
                  2⤵
                  • Drops startup file
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2216
                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:776

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\28137\Follow.pif

                Filesize

                924KB

                MD5

                848164d084384c49937f99d5b894253e

                SHA1

                3055ef803eeec4f175ebf120f94125717ee12444

                SHA256

                f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                SHA512

                aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\28137\RegAsm.exe

                Filesize

                63KB

                MD5

                42ab6e035df99a43dbb879c86b620b91

                SHA1

                c6e116569d17d8142dbb217b1f8bfa95bc148c38

                SHA256

                53195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b

                SHA512

                2e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Husband

                Filesize

                1.1MB

                MD5

                986cff60faca382fbcf9d6632ec5b2c3

                SHA1

                1a9bf3750b4d93c8920e0fe60886df1cdbcbb208

                SHA256

                8ef5b39ce66ab49df3e052b265d8adbecbbbcc8390f8aa992108671a7033bf8a

                SHA512

                d811e0ac82c55e8470418e2dbe98032057e1550f9c1f65bb69f1b4bc5ada9a849d355e1b7502bb67f7b0524458df93cdce9218c750cbbc633e2cf95b4b106f6e

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Kenneth

                Filesize

                82KB

                MD5

                924b86096d7d8ec45ec0f96502f63714

                SHA1

                17e8dd51e3b3060ad58bcc8eb06a5e7af105bf70

                SHA256

                041c917b3737d721afee0b4ea10e4c9c9af0f3af3abaef5514f4f4018e6be9ad

                SHA512

                62b89cd1c8e8fedbfe95a3ddc35bdb4e3537fc9a60779a6016ddcbc077c1cda2fc9c63d51e28e20ca54154b53a5629bdb407a799d26f54be81c88313b76cd903

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Lovers

                Filesize

                162KB

                MD5

                70a2d84c04d555dc3b79d71d94b9d086

                SHA1

                e474d8f0d9c31cdf1033985d408e337b6e88c0e9

                SHA256

                b539415140093c3e11841d194e1bf745515ebf6a372284d4763c24a8889f8b94

                SHA512

                888c89b268c0db7a50d689d6b5c11cf22a7fe3d171d69021d2dc1b8eb8d0c8148c3f41ee177d96c0eff752ac80c6d10dc305326c8a49ffd88e864c7b6327006d

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Modes

                Filesize

                258KB

                MD5

                f7e8f703c3919dce79843592c370cb29

                SHA1

                4dfe3363eb3b8373c859ba48ce176484949f807e

                SHA256

                9b41b0904a3937684938c6aeb472e73a226bf364a40db8266c82b03949fb7023

                SHA512

                acf78d656ada7a02fcf2412268b0a511d7de1273a9bf5dc9c762bb914828541403ca5c95e68dc713c12e348f976535f7cc0e848d536fd85ac01936b383c04021

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pants

                Filesize

                164KB

                MD5

                113fddce24cc705356a6e8dea6cc8126

                SHA1

                42dfb99a728b57ec610839cdbb9bf9d781493e1f

                SHA256

                297a0b0a0d232b93aaeb816ae0023baf7e2aa3fd82a442bbf97932f42eb41ad5

                SHA512

                9f4d41fc2c3695766ae501d52eba35e813e4e7c47da5a92f31530b500ae015d8791856300eab3de960afa37fe3680270499a7713abe29ff9e50036440a499331

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Publications

                Filesize

                258KB

                MD5

                adf24a0e56e0795db70356eaf45c68f9

                SHA1

                62783308f82d1b67ff799e05ce63057a17e61cde

                SHA256

                211d9d5ae01cb0591a840d277b1f419247801bdf47501e549c017f4417cb7c43

                SHA512

                7ab6a7e8d4fa170f3bdf7492ec4f2de873fb5f531741b723c466adc284676d673718b72e1cc3ca7e0527d89f9950a9ab36e4f8be29cffb81a7a3168cba0b48b4

              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sen

                Filesize

                10KB

                MD5

                47242484a4c4add80cfe70e5c9ef26e8

                SHA1

                4f54561e6fa3d8a25bcee54b1d82a249b417e2d6

                SHA256

                739614fc4a8b39e85b5beee50e516d645ffcdae0c73492bebfe75b91d008eab3

                SHA512

                5ba733ebb3ea953e58349e09acd211519b312a26649e036a8454af6282f6b355f7d15eeaf89c1d79aa742ae6504e3e052db1f932728c9b2459352b036533ab89

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe

                Filesize

                4KB

                MD5

                a5ce3aba68bdb438e98b1d0c70a3d95c

                SHA1

                013f5aa9057bf0b3c0c24824de9d075434501354

                SHA256

                9b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a

                SHA512

                7446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79

              • memory/776-65-0x00007FF900150000-0x00007FF900C12000-memory.dmp

                Filesize

                10.8MB

              • memory/776-64-0x00007FF900150000-0x00007FF900C12000-memory.dmp

                Filesize

                10.8MB

              • memory/776-62-0x0000000000620000-0x0000000000628000-memory.dmp

                Filesize

                32KB

              • memory/2216-47-0x0000000007170000-0x00000000071C0000-memory.dmp

                Filesize

                320KB

              • memory/2216-45-0x00000000068C0000-0x0000000006E66000-memory.dmp

                Filesize

                5.6MB

              • memory/2216-38-0x0000000005390000-0x000000000549A000-memory.dmp

                Filesize

                1.0MB

              • memory/2216-39-0x0000000005280000-0x0000000005292000-memory.dmp

                Filesize

                72KB

              • memory/2216-40-0x00000000052E0000-0x000000000531C000-memory.dmp

                Filesize

                240KB

              • memory/2216-41-0x0000000005330000-0x000000000537C000-memory.dmp

                Filesize

                304KB

              • memory/2216-42-0x0000000005700000-0x0000000005766000-memory.dmp

                Filesize

                408KB

              • memory/2216-43-0x0000000006150000-0x00000000061C6000-memory.dmp

                Filesize

                472KB

              • memory/2216-44-0x0000000006270000-0x0000000006302000-memory.dmp

                Filesize

                584KB

              • memory/2216-37-0x00000000059B0000-0x0000000005FC8000-memory.dmp

                Filesize

                6.1MB

              • memory/2216-46-0x0000000006370000-0x000000000638E000-memory.dmp

                Filesize

                120KB

              • memory/2216-36-0x0000000005380000-0x0000000005390000-memory.dmp

                Filesize

                64KB

              • memory/2216-48-0x0000000007830000-0x00000000079F2000-memory.dmp

                Filesize

                1.8MB

              • memory/2216-49-0x0000000007F30000-0x000000000845C000-memory.dmp

                Filesize

                5.2MB

              • memory/2216-35-0x0000000073160000-0x0000000073911000-memory.dmp

                Filesize

                7.7MB

              • memory/2216-32-0x0000000000B60000-0x0000000000BF8000-memory.dmp

                Filesize

                608KB

              • memory/2216-63-0x0000000073160000-0x0000000073911000-memory.dmp

                Filesize

                7.7MB

              • memory/2696-30-0x0000000005460000-0x0000000005461000-memory.dmp

                Filesize

                4KB

              • memory/2696-27-0x0000000077901000-0x0000000077A23000-memory.dmp

                Filesize

                1.1MB