Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
A u r о r a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
A u r о r a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$TEMP/Omissions.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$TEMP/Omissions.ps1
Resource
win10v2004-20240226-en
General
-
Target
A u r о r a.exe
-
Size
685KB
-
MD5
b3b6feed946c4b70880677c1fed7cc83
-
SHA1
97655d0243bebe24126037cbadd107d908858fd6
-
SHA256
41f3351a2f08d18c27ddcab29e6258fb9238b1061e82ff7220f16a9393199438
-
SHA512
71fb2259e7f8c27882b69fa2662161a620e304dfbe2cdcbff30b99fd9bc19044ec5fcf291ed8a11925bc9cf88d05fa990fc9623b9a215098479060d3383d8cd4
-
SSDEEP
12288:LNc3BNU4PF6atV0w6Q/zyz0KuRAMbkZMDnOnBVHZ4CiyBq9ph0kMCr0IhY5RR1mp:LNc3BNrF6CVb6CjkeDOnH2vyBSokMCrT
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/1424-29-0x0000000000E00000-0x0000000000E4C000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1424-29-0x0000000000E00000-0x0000000000E4C000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4892 created 3492 4892 Tagged.pif 57 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation A u r о r a.exe -
Executes dropped EXE 2 IoCs
pid Process 4892 Tagged.pif 1424 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4844 tasklist.exe 688 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1556 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4892 Tagged.pif 4892 Tagged.pif 4892 Tagged.pif 4892 Tagged.pif 4892 Tagged.pif 4892 Tagged.pif 4892 Tagged.pif 4892 Tagged.pif 1424 RegAsm.exe 1424 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4844 tasklist.exe Token: SeDebugPrivilege 688 tasklist.exe Token: SeDebugPrivilege 1424 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4892 Tagged.pif 4892 Tagged.pif 4892 Tagged.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4892 Tagged.pif 4892 Tagged.pif 4892 Tagged.pif -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1576 1476 A u r о r a.exe 89 PID 1476 wrote to memory of 1576 1476 A u r о r a.exe 89 PID 1476 wrote to memory of 1576 1476 A u r о r a.exe 89 PID 1576 wrote to memory of 4844 1576 cmd.exe 93 PID 1576 wrote to memory of 4844 1576 cmd.exe 93 PID 1576 wrote to memory of 4844 1576 cmd.exe 93 PID 1576 wrote to memory of 4468 1576 cmd.exe 94 PID 1576 wrote to memory of 4468 1576 cmd.exe 94 PID 1576 wrote to memory of 4468 1576 cmd.exe 94 PID 1576 wrote to memory of 688 1576 cmd.exe 96 PID 1576 wrote to memory of 688 1576 cmd.exe 96 PID 1576 wrote to memory of 688 1576 cmd.exe 96 PID 1576 wrote to memory of 1940 1576 cmd.exe 97 PID 1576 wrote to memory of 1940 1576 cmd.exe 97 PID 1576 wrote to memory of 1940 1576 cmd.exe 97 PID 1576 wrote to memory of 3324 1576 cmd.exe 98 PID 1576 wrote to memory of 3324 1576 cmd.exe 98 PID 1576 wrote to memory of 3324 1576 cmd.exe 98 PID 1576 wrote to memory of 2392 1576 cmd.exe 99 PID 1576 wrote to memory of 2392 1576 cmd.exe 99 PID 1576 wrote to memory of 2392 1576 cmd.exe 99 PID 1576 wrote to memory of 2220 1576 cmd.exe 100 PID 1576 wrote to memory of 2220 1576 cmd.exe 100 PID 1576 wrote to memory of 2220 1576 cmd.exe 100 PID 1576 wrote to memory of 4892 1576 cmd.exe 101 PID 1576 wrote to memory of 4892 1576 cmd.exe 101 PID 1576 wrote to memory of 4892 1576 cmd.exe 101 PID 1576 wrote to memory of 1556 1576 cmd.exe 102 PID 1576 wrote to memory of 1556 1576 cmd.exe 102 PID 1576 wrote to memory of 1556 1576 cmd.exe 102 PID 4892 wrote to memory of 1424 4892 Tagged.pif 110 PID 4892 wrote to memory of 1424 4892 Tagged.pif 110 PID 4892 wrote to memory of 1424 4892 Tagged.pif 110 PID 4892 wrote to memory of 1424 4892 Tagged.pif 110 PID 4892 wrote to memory of 1424 4892 Tagged.pif 110
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\A u r о r a.exe"C:\Users\Admin\AppData\Local\Temp\A u r о r a.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Novel Novel.bat & Novel.bat & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:4468
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵PID:1940
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 140944⤵PID:3324
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 14094\Tagged.pif + Corn + Justice + Anthropology + Georgia + Enable 14094\Tagged.pif4⤵PID:2392
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b En + Bag + Omissions 14094\O4⤵PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\14094\Tagged.pif14094\Tagged.pif 14094\O4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4892
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
PID:1556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\14094\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\14094\RegAsm.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671KB
MD54421acdb5a27f21358a75613804bbef1
SHA1c19071cb423076674b101c21042409f9ea20dfc1
SHA2565076f2384d0f8e2b492479d718d978639018fd6227b3378841e1da4bf1e8e9c2
SHA5126549827ac5fad30fe3ccb24f095022d4488571fbc0a774d615a1c5c6010e9a0ce0efef649311d7185096fb0450693ff88aa03293b7c7591b0106c784cdb7fc59
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
1B
MD569691c7bdcc3ce6d5d8a1361f22d04ac
SHA1c63ae6dd4fc9f9dda66970e827d13f7c73fe841c
SHA25608f271887ce94707da822d5263bae19d5519cb3614e0daedc4c7ce5dab7473f1
SHA512253405e03b91441a6dd354a9b72e040068b1bfe10e83eb1a64a086c05525d8ccae2bf09130c624af50d55c3522a4fbb7c18cfc8dd843e5f4801d9ad2b5164b12
-
Filesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
Filesize
147KB
MD5457d830032cc11c2191731add1810ab5
SHA1d6ae3b4a0de4b1263f04331788633a601d928aa3
SHA2567443b210f82fab88cb79f46106c4c6ac0e11e98f2446d450e0a5b34153296005
SHA512037a708e38a82e36bc98ce200a8d745b15072888d55a95701f517340e82e3174bbddbdee3765f2c510a2081701fa9f3dc60e52458acf44b2b64f4af5fc0fa0fc
-
Filesize
280KB
MD5db21ccfa50d066be0f532add39caae36
SHA1c67289579f598198958793e554d9899e6bb4c109
SHA2567c05886816bbb30dfef799f964c6fdff0ff91e9a1e2afdf5a27785d7db1b99e1
SHA5128278cac71afdb2d64c371f7531aa547eac67476f49379d9453c5262fba2594ce8c522c093b25735d5ca7951ae64aecb30e184ef3c9c4a456aa6d0d6db942f8d4
-
Filesize
270KB
MD5b5f7361e2ed0c1e4ceefdb73689bd8dd
SHA13720d41cf60d0f456e9f7e338e58c145a2240812
SHA25661498598484d2b7b250176536bd5860208c31ef0aa7833bf3a4759f71fe8a706
SHA51299606fb430aaea67be37d1617f64a0737887e6941bcdfb1345913b3d26131f18ca6d47707199742bba755733785703dcbe865397c3f342ee896b39d0f93e7ec9
-
Filesize
228KB
MD51a4d258dd2e65fda6fae17dc8d713664
SHA10b803a36599bf5a5f1460a61ded50c7cda4f2692
SHA256fd7ff96c10300da123af7c38597894417e4300f9c59ac417ee13385fe4606684
SHA512b0efc4f12ae0d50fe7c7d10c1a34a9db04a4f53d84ebf2b9a845937ec307adb1a59c4949c15e28480a4a12f8c551f88c7651592907c4edb6ebdc52d4ec0c8cad
-
Filesize
84KB
MD561d7f5e4bb4d84fab1ee357f5071bb16
SHA15d4dbd193f6608f5ce3391f14cdd4620b1f01680
SHA256585a18c2cdd6a975796d55d1a501475dc1ceb345a4913a3e00346163da77e287
SHA512114b106b14f60090a8666078f5159ecd3a27c63be47d07a2224cf10a10b9cf9af1ff536542d7407ca45b1e59340f3a963288f8644c35092d67076c2e23a0f7e2
-
Filesize
140KB
MD55f4974740f5aa7124c52df0bb48ef65e
SHA1ec52992637c94e99f8350f4a9f8c586840e52940
SHA256eb934de1a00592a7183fd577fe7227b50179dc34c6af5cf30e805add68da7cee
SHA5122816a7758ca1e75360b582db412e5ea22ea63f5021d707dc98092df15c13bc3e62abf08d437c8e108c0418d978a287ba18c945e37633c71156e3afd91b52da0e
-
Filesize
231KB
MD5806c61777aa5ab0c83723676391e155e
SHA169221170fc978da946b31594be39164c30e66e9f
SHA25608a89401a6ae80305fc9b75ec5944bc84cc6e1cfddd84dc7cc912d1f0d07304b
SHA512ae6b225253beea0a0a2578870595bf147899ae0bfb81e12e22e2c232ec2c692ff4b3716ff8c9a52c157ba2b20c27a2da6c2e6c7b27a099f7ec8cd3ecd805bc3f
-
Filesize
15KB
MD500629f6223e0f6ecb6684ea3115ad26d
SHA157ee172a967204b0df4cd3b3d87928f10a9fcd83
SHA25629dc378e128bf0b86d0be35b8c3f9be1d200f2dabdade729ef680503cd34acc8
SHA512ad24a2d3bd12e0d3153554790feceedf897d320e37d60be57ab5ee5e5e217ba929eb9a765ad3f37f5bf5d3b8f93f5668d5ad146ccf1b664d1a61ef073971a93b
-
Filesize
163KB
MD5ce6aab10736655fe51357ef763a81873
SHA100cc63e8c40ccde40537e7c80c565660ff681530
SHA256dd2b0347be3f0535db49269d8ae57af1024235aed4d9d258499fd0404d3c1f08
SHA5127938c7b8cbae3c1b6a0c8b7dc8005b1d7385177ba018685372b5919f2c86184d7ceb6e0cf5ed8d28fef16f4bf9bdf9015dd9767842822c085a9502783b6bd73f