Overview
overview
10Static
static
9A u r о r a X.rar
windows11-21h2-x64
10A u r о r... X.exe
windows11-21h2-x64
10$TEMP/Beat
windows11-21h2-x64
1$TEMP/Hurricane
windows11-21h2-x64
1$TEMP/Impact
windows11-21h2-x64
1$TEMP/Prevention
windows11-21h2-x64
1$TEMP/Ray
windows11-21h2-x64
1$TEMP/Smoke
windows11-21h2-x64
$TEMP/Summary
windows11-21h2-x64
1$TEMP/Turtle
windows11-21h2-x64
1$TEMP/Tv
windows11-21h2-x64
1A u r о r...ts.dll
windows11-21h2-x64
1Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-03-2024 22:45
Behavioral task
behavioral1
Sample
A u r о r a X.rar
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
A u r о r a X/A u r о r a X.exe
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
$TEMP/Beat
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
$TEMP/Hurricane
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
$TEMP/Impact
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
$TEMP/Prevention
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
$TEMP/Ray
Resource
win11-20240221-en
Behavioral task
behavioral8
Sample
$TEMP/Smoke
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
$TEMP/Summary
Resource
win11-20240214-en
Behavioral task
behavioral10
Sample
$TEMP/Turtle
Resource
win11-20240221-en
Behavioral task
behavioral11
Sample
$TEMP/Tv
Resource
win11-20240221-en
Behavioral task
behavioral12
Sample
A u r о r a X/scripts/scripts.dll
Resource
win11-20240221-en
General
-
Target
A u r о r a X.rar
-
Size
8.1MB
-
MD5
6847de14c6e1457fc14fe029e2b1f490
-
SHA1
97d0f4c6c0431982d1555f1fb759c8b81853b13d
-
SHA256
09390304176d930c2ff463be7537b7134c74a39ddd13030642d0cb4956cc6d15
-
SHA512
aa4a723b2df6f752588c7d21d1a657a61bea6a0823cfb8d7e7341b7a1c802b98773b01bedecfe2c94224957e9424a563bebc975ac6fede2dc2bff425dda5f423
-
SSDEEP
196608:UjN/pzpHYy3Fvo6G6Qypd+DlJa+seheTjkuPDEjVGCDXzG8SuMRTgf8iQ:UBRzp4iA6DQypdaXcTjb7kGC5RUUf83
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2940-45-0x0000000000810000-0x000000000086C000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Present.pifdescription pid process target process PID 4396 created 3304 4396 Present.pif Explorer.EXE -
Executes dropped EXE 3 IoCs
Processes:
A u r о r a X.exePresent.pifRegAsm.exepid process 3024 A u r о r a X.exe 4396 Present.pif 2940 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 2136 tasklist.exe 1412 tasklist.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeMiniSearchHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1637591879-962683004-3585269084-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
Present.pif7zFM.exeRegAsm.exepid process 4396 Present.pif 4396 Present.pif 4396 Present.pif 4396 Present.pif 4396 Present.pif 4396 Present.pif 1888 7zFM.exe 1888 7zFM.exe 4396 Present.pif 4396 Present.pif 2940 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 1888 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
7zFM.exetasklist.exetasklist.exeRegAsm.exedescription pid process Token: SeRestorePrivilege 1888 7zFM.exe Token: 35 1888 7zFM.exe Token: SeSecurityPrivilege 1888 7zFM.exe Token: SeDebugPrivilege 1412 tasklist.exe Token: SeDebugPrivilege 2136 tasklist.exe Token: SeDebugPrivilege 2940 RegAsm.exe Token: SeBackupPrivilege 2940 RegAsm.exe Token: SeSecurityPrivilege 2940 RegAsm.exe Token: SeSecurityPrivilege 2940 RegAsm.exe Token: SeSecurityPrivilege 2940 RegAsm.exe Token: SeSecurityPrivilege 2940 RegAsm.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
7zFM.exePresent.pifpid process 1888 7zFM.exe 1888 7zFM.exe 4396 Present.pif 4396 Present.pif 4396 Present.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Present.pifpid process 4396 Present.pif 4396 Present.pif 4396 Present.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MiniSearchHost.exepid process 2344 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
cmd.exe7zFM.exeA u r о r a X.execmd.exePresent.pifdescription pid process target process PID 2656 wrote to memory of 1888 2656 cmd.exe 7zFM.exe PID 2656 wrote to memory of 1888 2656 cmd.exe 7zFM.exe PID 1888 wrote to memory of 3024 1888 7zFM.exe A u r о r a X.exe PID 1888 wrote to memory of 3024 1888 7zFM.exe A u r о r a X.exe PID 1888 wrote to memory of 3024 1888 7zFM.exe A u r о r a X.exe PID 3024 wrote to memory of 1360 3024 A u r о r a X.exe cmd.exe PID 3024 wrote to memory of 1360 3024 A u r о r a X.exe cmd.exe PID 3024 wrote to memory of 1360 3024 A u r о r a X.exe cmd.exe PID 1360 wrote to memory of 1412 1360 cmd.exe tasklist.exe PID 1360 wrote to memory of 1412 1360 cmd.exe tasklist.exe PID 1360 wrote to memory of 1412 1360 cmd.exe tasklist.exe PID 1360 wrote to memory of 3348 1360 cmd.exe findstr.exe PID 1360 wrote to memory of 3348 1360 cmd.exe findstr.exe PID 1360 wrote to memory of 3348 1360 cmd.exe findstr.exe PID 1360 wrote to memory of 2136 1360 cmd.exe tasklist.exe PID 1360 wrote to memory of 2136 1360 cmd.exe tasklist.exe PID 1360 wrote to memory of 2136 1360 cmd.exe tasklist.exe PID 1360 wrote to memory of 2212 1360 cmd.exe findstr.exe PID 1360 wrote to memory of 2212 1360 cmd.exe findstr.exe PID 1360 wrote to memory of 2212 1360 cmd.exe findstr.exe PID 1360 wrote to memory of 1532 1360 cmd.exe cmd.exe PID 1360 wrote to memory of 1532 1360 cmd.exe cmd.exe PID 1360 wrote to memory of 1532 1360 cmd.exe cmd.exe PID 1360 wrote to memory of 4424 1360 cmd.exe cmd.exe PID 1360 wrote to memory of 4424 1360 cmd.exe cmd.exe PID 1360 wrote to memory of 4424 1360 cmd.exe cmd.exe PID 1360 wrote to memory of 2036 1360 cmd.exe cmd.exe PID 1360 wrote to memory of 2036 1360 cmd.exe cmd.exe PID 1360 wrote to memory of 2036 1360 cmd.exe cmd.exe PID 1360 wrote to memory of 4396 1360 cmd.exe Present.pif PID 1360 wrote to memory of 4396 1360 cmd.exe Present.pif PID 1360 wrote to memory of 4396 1360 cmd.exe Present.pif PID 1360 wrote to memory of 3148 1360 cmd.exe PING.EXE PID 1360 wrote to memory of 3148 1360 cmd.exe PING.EXE PID 1360 wrote to memory of 3148 1360 cmd.exe PING.EXE PID 4396 wrote to memory of 2940 4396 Present.pif RegAsm.exe PID 4396 wrote to memory of 2940 4396 Present.pif RegAsm.exe PID 4396 wrote to memory of 2940 4396 Present.pif RegAsm.exe PID 4396 wrote to memory of 2940 4396 Present.pif RegAsm.exe PID 4396 wrote to memory of 2940 4396 Present.pif RegAsm.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\A u r о r a X.rar"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\A u r о r a X.rar"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zO0678C588\A u r о r a X.exe"C:\Users\Admin\AppData\Local\Temp\7zO0678C588\A u r о r a X.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Tv Tv.bat & Tv.bat & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"6⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"6⤵
-
C:\Windows\SysWOW64\cmd.execmd /c md 304946⤵
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 30494\Present.pif + Summary + Impact + Ray + Smoke + Prevention 30494\Present.pif6⤵
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Beat + Turtle + Hurricane 30494\u6⤵
-
C:\Users\Admin\AppData\Local\Temp\30494\Present.pif30494\Present.pif 30494\u6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\30494\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\30494\RegAsm.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.datFilesize
10KB
MD5d3c1574e06e9c0ed4ddfecf7eda00476
SHA1e90dcb7eeb77fdeee2883c9c99fea03c50f80eca
SHA2560b643c95e32e8cb6c8ad9a28231243f3d028db10560130aabe10cd65c62dace7
SHA51206a7e8fa4859fd6902e842760ab1be755247ced2cb5d5b92fda7e25483749d2a65acc7ada0dd351c943711eef033f152137aafc18b5283bf3c310737b8b7077b
-
C:\Users\Admin\AppData\Local\Temp\30494\Present.pifFilesize
2B
MD5ac6ad5d9b99757c3a878f2d275ace198
SHA1439baa1b33514fb81632aaf44d16a9378c5664fc
SHA2569b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d
SHA512bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b
-
C:\Users\Admin\AppData\Local\Temp\30494\Present.pifFilesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
C:\Users\Admin\AppData\Local\Temp\30494\RegAsm.exeFilesize
63KB
MD542ab6e035df99a43dbb879c86b620b91
SHA1c6e116569d17d8142dbb217b1f8bfa95bc148c38
SHA25653195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b
SHA5122e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5
-
C:\Users\Admin\AppData\Local\Temp\30494\uFilesize
721KB
MD52ad3c442ab0a4f154223e1776c26ba74
SHA14c11ac6a557fb29d863564136963797e4e7af7c3
SHA2565dd99ff84144d4e252833cd468c97928647bb47d53d68e9978f77c8f95765952
SHA51237fd383135f8d48ab16911ea2d1ab05b6f7883fc246150129bef5afd25e80100ef8ce90929d72248eb5b0279eb293f63ec02c9d5cc5189a31d38ad40c70be27d
-
C:\Users\Admin\AppData\Local\Temp\7zO0678C588\A u r о r a X.exeFilesize
715KB
MD5f476fc8e39528472df2b1ab6c5a469e2
SHA14d2e57a77b87b99ddcc5369d5fe98e5bac6856f4
SHA256b245a9e880b92b5525233c4a8cdb8e4d1cda15c7e1a4a6ca7ee99d97cf51488a
SHA51288c800a78f4ee407afd88ef8ef1e82b4b1217af6e3631edb6b7c6d99364c49417036634204f5f197ef0b8111637468e6cbecc3c2ef2c9d490e89d0a9ada7cce7
-
C:\Users\Admin\AppData\Local\Temp\BeatFilesize
286KB
MD5032357703b5ce3baf1c1c8e2cfbecd53
SHA1d2fd7b21dde1ffe42c541c7077a04f5b7c0a05ea
SHA256735cda19d881ee2c28101d09414cfb873ba17587f77a7fac24125da18e4afebe
SHA5122476fe332260ddff35d27c6fc29d150510c9828f79b27933854b4282653c2956807072fe99dcbe8fa9c5aedda1e6a219887d2427bc0eaf9f1837fcdb2d9f6299
-
C:\Users\Admin\AppData\Local\Temp\HurricaneFilesize
174KB
MD535bafb2670374b40e7565d2375a0398e
SHA1408588981f40afd9b9cde22b1730a9b0b6c786da
SHA256589b656a6b34233fb305bc1be6bcdedb821f9efbbd2dd2089e1a93196b0daa19
SHA51211d868d3ba9a7156d12d1794951ded13d3cab7e93aa46e8fa73df2bcfdf820c75b8f4c2e0b90a1aae871cef591b245279db88314cabc4b8f3ad11198f248a27f
-
C:\Users\Admin\AppData\Local\Temp\ImpactFilesize
109KB
MD5cb653da94140e5c70e9c86e7fbda1d29
SHA136c4a6955ac0b7fa890b65c66b5f3f14087dc978
SHA256ccf96df9859615a179ae7b975b0130ff28ff869b1289c0cd963ed2236638708b
SHA5126f35ff9fd752d077d92c66ad147ea3c449e9dc60a2cf762da5991b8f25afafa130af6ae0395c0777af94b54079a6a1dbeba744c475e0b7e72704d42216d86877
-
C:\Users\Admin\AppData\Local\Temp\PreventionFilesize
56KB
MD581d88021025188b208e3e5bee870a35f
SHA1167d2b860097a9baccd09ed41e8c922065c42ba9
SHA2560df0214c701b1ee01d73b37174835c06674e3e509a31d26e2cb8b4ad78286314
SHA51280b2b1c7ca92af39bd4633ed8cb86d13257e24c0750d841cc5169f331a9b77b263b68c62cd99a2c198fd07d3ef70ab3385749e42defe9a6e25c5cc98b338b7ce
-
C:\Users\Admin\AppData\Local\Temp\RayFilesize
233KB
MD58f5dc8c2edd6d31892833f02c91e06d8
SHA13aa7a22e9c2b9ef55f6ab8fdbd871d905e693e81
SHA256177c7d6763739c7bd54cd62270a1a9e28560a1ec0dc3bc1d88ecd1d6e4a9e15f
SHA512c4e7feedad4d22356fd8aea8ae593ce40dd28e540cdb5162d1c0f8300bfaa22a05202cb91eb3eb4f37724008b3d9df966e58dbea0d76e66c0e5de8410a2a3daa
-
C:\Users\Admin\AppData\Local\Temp\SmokeFilesize
266KB
MD5cecbfa5f9956a5c0e60933b58288c280
SHA1715c43aae2eed1836e459bff9717ab97494704d8
SHA256bd6a32bb4829a271c4ae9f7c6dbffd920cb22865ed3bf356eddd9df596d99f7d
SHA51295dbba9961dd8411acafc04b2393f968d4544a5171a632632c0f114813f71498ff9033ba45f4b7c34afd4c6208f1349606b7548b1e125d8b38f77e508927ff7e
-
C:\Users\Admin\AppData\Local\Temp\SummaryFilesize
208KB
MD5c4b889b1379e2b3eeb956553b719b22a
SHA1678cd18741c398010aec9f59233d472644d0079f
SHA256c7a139b90d5d6c0a25d636b76fc32ebeeb06c426595063c925c383cf4bb6445d
SHA5122611b3b3ff0a0198e08375ac5614427c8e97e796b3e677430f13fb0993645fc80ba610f9e68c6418d6d859349af84372fe000ae26bf2e0ec605880d03c61a86c
-
C:\Users\Admin\AppData\Local\Temp\TurtleFilesize
261KB
MD57a6ca99cafcf2598d131d5d3e9d5cf65
SHA1360e087c9ba4a2cbb9ceec9401bc4d784430bc95
SHA256ef13ed4da127b37926ae39c90b1538facc29468d9a92be8d5c23f8e2042bf492
SHA5127c43b2d52fe70bf7608cb695bb68adde625daab0098b303382f0d66e05016b3c26cb9a717e82425c9744bbb3f8dfa79834554ca20e008d0b1af02fed4f0aded3
-
C:\Users\Admin\AppData\Local\Temp\TvFilesize
15KB
MD5b679ce0e773bb53d98bcca4938135ecf
SHA1b9607174cdc497bc424ed70402ac217f765244b0
SHA2569b032e9f6b36d85aed8ae30c2f1212096cc0fb48ca65f13ef11cee6ecf295839
SHA512c8492ad5a312108d266ea043461ffb8664b7a46dec83c270c924b7618215f7b2a882b1ab6d0223d6296b5105022b5659ff75837626b3fdd032caa93d1b21f4b2
-
memory/2940-45-0x0000000000810000-0x000000000086C000-memory.dmpFilesize
368KB
-
memory/2940-54-0x0000000007FC0000-0x00000000080CA000-memory.dmpFilesize
1.0MB
-
memory/2940-64-0x0000000073B90000-0x0000000074341000-memory.dmpFilesize
7.7MB
-
memory/2940-48-0x0000000073B90000-0x0000000074341000-memory.dmpFilesize
7.7MB
-
memory/2940-49-0x00000000054A0000-0x0000000005A46000-memory.dmpFilesize
5.6MB
-
memory/2940-50-0x0000000004E10000-0x0000000004EA2000-memory.dmpFilesize
584KB
-
memory/2940-51-0x00000000050D0000-0x00000000050E0000-memory.dmpFilesize
64KB
-
memory/2940-52-0x0000000004EC0000-0x0000000004ECA000-memory.dmpFilesize
40KB
-
memory/2940-53-0x0000000008460000-0x0000000008A78000-memory.dmpFilesize
6.1MB
-
memory/2940-62-0x000000000A220000-0x000000000A74C000-memory.dmpFilesize
5.2MB
-
memory/2940-55-0x0000000007F00000-0x0000000007F12000-memory.dmpFilesize
72KB
-
memory/2940-56-0x0000000007F60000-0x0000000007F9C000-memory.dmpFilesize
240KB
-
memory/2940-57-0x00000000080D0000-0x000000000811C000-memory.dmpFilesize
304KB
-
memory/2940-58-0x0000000008270000-0x00000000082D6000-memory.dmpFilesize
408KB
-
memory/2940-59-0x0000000008C00000-0x0000000008C76000-memory.dmpFilesize
472KB
-
memory/2940-60-0x0000000008430000-0x000000000844E000-memory.dmpFilesize
120KB
-
memory/2940-61-0x0000000009B20000-0x0000000009CE2000-memory.dmpFilesize
1.8MB
-
memory/4396-43-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/4396-34-0x00000000773C1000-0x00000000774E3000-memory.dmpFilesize
1.1MB