Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 19:14
Behavioral task
behavioral1
Sample
Aurora V3.1.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Aurora V3.1.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Aurora/Aurora.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Aurora/Aurora.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Aurora/scripts/scripts.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Aurora/scripts/scripts.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
README.txt
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
README.txt
Resource
win10v2004-20240221-en
General
-
Target
Aurora/Aurora.exe
-
Size
1.1MB
-
MD5
38d563d90178c931132a5bd2dc05b76f
-
SHA1
4511b5462cddaf7835d20375f8e13087aedd3e5d
-
SHA256
a4cf6887caa6ca97d42659f9ab424c60cdfb41798f10bb429cb94379cd29ec83
-
SHA512
19810c3642d9d909a3632456c24837d021ffce267243e2d183f3c1ae3e8edd937df3e50ee26f3beae53a65a291283de801ee5581d7ac4582669879d8e97d9cfe
-
SSDEEP
24576:OlEXbCnFzRa860/IN7yUZoY/A6m9xzyysV2:5G9c3N7yUZoY/ALxz3sY
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2984 created 3348 2984 Follow.pif 39 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation Aurora.exe Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe RegAsm.exe -
Executes dropped EXE 3 IoCs
pid Process 2984 Follow.pif 4196 RegAsm.exe 2404 qemu-ga.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2080 tasklist.exe 4584 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 844 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2984 Follow.pif 2984 Follow.pif 2984 Follow.pif 2984 Follow.pif 2984 Follow.pif 2984 Follow.pif 2984 Follow.pif 2984 Follow.pif 4196 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2984 Follow.pif -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2080 tasklist.exe Token: SeDebugPrivilege 4584 tasklist.exe Token: SeDebugPrivilege 4196 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2984 Follow.pif 2984 Follow.pif 2984 Follow.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2984 Follow.pif 2984 Follow.pif 2984 Follow.pif -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1348 2928 Aurora.exe 88 PID 2928 wrote to memory of 1348 2928 Aurora.exe 88 PID 2928 wrote to memory of 1348 2928 Aurora.exe 88 PID 1348 wrote to memory of 2080 1348 cmd.exe 90 PID 1348 wrote to memory of 2080 1348 cmd.exe 90 PID 1348 wrote to memory of 2080 1348 cmd.exe 90 PID 1348 wrote to memory of 2628 1348 cmd.exe 91 PID 1348 wrote to memory of 2628 1348 cmd.exe 91 PID 1348 wrote to memory of 2628 1348 cmd.exe 91 PID 1348 wrote to memory of 4584 1348 cmd.exe 94 PID 1348 wrote to memory of 4584 1348 cmd.exe 94 PID 1348 wrote to memory of 4584 1348 cmd.exe 94 PID 1348 wrote to memory of 556 1348 cmd.exe 95 PID 1348 wrote to memory of 556 1348 cmd.exe 95 PID 1348 wrote to memory of 556 1348 cmd.exe 95 PID 1348 wrote to memory of 1400 1348 cmd.exe 97 PID 1348 wrote to memory of 1400 1348 cmd.exe 97 PID 1348 wrote to memory of 1400 1348 cmd.exe 97 PID 1348 wrote to memory of 4052 1348 cmd.exe 98 PID 1348 wrote to memory of 4052 1348 cmd.exe 98 PID 1348 wrote to memory of 4052 1348 cmd.exe 98 PID 1348 wrote to memory of 1800 1348 cmd.exe 99 PID 1348 wrote to memory of 1800 1348 cmd.exe 99 PID 1348 wrote to memory of 1800 1348 cmd.exe 99 PID 1348 wrote to memory of 2984 1348 cmd.exe 100 PID 1348 wrote to memory of 2984 1348 cmd.exe 100 PID 1348 wrote to memory of 2984 1348 cmd.exe 100 PID 1348 wrote to memory of 844 1348 cmd.exe 101 PID 1348 wrote to memory of 844 1348 cmd.exe 101 PID 1348 wrote to memory of 844 1348 cmd.exe 101 PID 2984 wrote to memory of 4196 2984 Follow.pif 102 PID 2984 wrote to memory of 4196 2984 Follow.pif 102 PID 2984 wrote to memory of 4196 2984 Follow.pif 102 PID 2984 wrote to memory of 4196 2984 Follow.pif 102 PID 2984 wrote to memory of 4196 2984 Follow.pif 102 PID 4196 wrote to memory of 2404 4196 RegAsm.exe 105 PID 4196 wrote to memory of 2404 4196 RegAsm.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\Aurora\Aurora.exe"C:\Users\Admin\AppData\Local\Temp\Aurora\Aurora.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Sen Sen.bat & Sen.bat & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵PID:2628
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:556
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 221354⤵PID:1400
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Publications + Pants + Lovers + Modes + Kenneth 22135\Follow.pif4⤵PID:4052
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Husband 22135\t4⤵PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\22135\Follow.pif22135\Follow.pif 22135\t4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
PID:844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\22135\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\22135\RegAsm.exe2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"3⤵
- Executes dropped EXE
PID:2404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5848164d084384c49937f99d5b894253e
SHA13055ef803eeec4f175ebf120f94125717ee12444
SHA256f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3
SHA512aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
1.1MB
MD5986cff60faca382fbcf9d6632ec5b2c3
SHA11a9bf3750b4d93c8920e0fe60886df1cdbcbb208
SHA2568ef5b39ce66ab49df3e052b265d8adbecbbbcc8390f8aa992108671a7033bf8a
SHA512d811e0ac82c55e8470418e2dbe98032057e1550f9c1f65bb69f1b4bc5ada9a849d355e1b7502bb67f7b0524458df93cdce9218c750cbbc633e2cf95b4b106f6e
-
Filesize
82KB
MD5924b86096d7d8ec45ec0f96502f63714
SHA117e8dd51e3b3060ad58bcc8eb06a5e7af105bf70
SHA256041c917b3737d721afee0b4ea10e4c9c9af0f3af3abaef5514f4f4018e6be9ad
SHA51262b89cd1c8e8fedbfe95a3ddc35bdb4e3537fc9a60779a6016ddcbc077c1cda2fc9c63d51e28e20ca54154b53a5629bdb407a799d26f54be81c88313b76cd903
-
Filesize
162KB
MD570a2d84c04d555dc3b79d71d94b9d086
SHA1e474d8f0d9c31cdf1033985d408e337b6e88c0e9
SHA256b539415140093c3e11841d194e1bf745515ebf6a372284d4763c24a8889f8b94
SHA512888c89b268c0db7a50d689d6b5c11cf22a7fe3d171d69021d2dc1b8eb8d0c8148c3f41ee177d96c0eff752ac80c6d10dc305326c8a49ffd88e864c7b6327006d
-
Filesize
258KB
MD5f7e8f703c3919dce79843592c370cb29
SHA14dfe3363eb3b8373c859ba48ce176484949f807e
SHA2569b41b0904a3937684938c6aeb472e73a226bf364a40db8266c82b03949fb7023
SHA512acf78d656ada7a02fcf2412268b0a511d7de1273a9bf5dc9c762bb914828541403ca5c95e68dc713c12e348f976535f7cc0e848d536fd85ac01936b383c04021
-
Filesize
164KB
MD5113fddce24cc705356a6e8dea6cc8126
SHA142dfb99a728b57ec610839cdbb9bf9d781493e1f
SHA256297a0b0a0d232b93aaeb816ae0023baf7e2aa3fd82a442bbf97932f42eb41ad5
SHA5129f4d41fc2c3695766ae501d52eba35e813e4e7c47da5a92f31530b500ae015d8791856300eab3de960afa37fe3680270499a7713abe29ff9e50036440a499331
-
Filesize
258KB
MD5adf24a0e56e0795db70356eaf45c68f9
SHA162783308f82d1b67ff799e05ce63057a17e61cde
SHA256211d9d5ae01cb0591a840d277b1f419247801bdf47501e549c017f4417cb7c43
SHA5127ab6a7e8d4fa170f3bdf7492ec4f2de873fb5f531741b723c466adc284676d673718b72e1cc3ca7e0527d89f9950a9ab36e4f8be29cffb81a7a3168cba0b48b4
-
Filesize
10KB
MD547242484a4c4add80cfe70e5c9ef26e8
SHA14f54561e6fa3d8a25bcee54b1d82a249b417e2d6
SHA256739614fc4a8b39e85b5beee50e516d645ffcdae0c73492bebfe75b91d008eab3
SHA5125ba733ebb3ea953e58349e09acd211519b312a26649e036a8454af6282f6b355f7d15eeaf89c1d79aa742ae6504e3e052db1f932728c9b2459352b036533ab89
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79