Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 23:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Aurora.exe
Resource
win10v2004-20240704-en
3 signatures
150 seconds
General
-
Target
Aurora.exe
-
Size
1.7MB
-
MD5
4f2e0ef960be166b1edf5f40d35a90a9
-
SHA1
1dab94a1787a28419f3cfac6aaa35578e802422d
-
SHA256
c8e2614c29774aeda24974a8bbf2dbfde24be7814997346d17e4ee0e15d553a3
-
SHA512
85c919d747914c4555fed535d5be5a5bd32c8db51dfe3850099a7ee6fb8afcb22cfe3b206424ffa435294bb3ec2f7c170548decdc504895d5fce8818ec57d24c
-
SSDEEP
49152:GMbYbt4nwWgWRXJnfWQijyeSqSWRQ6jLx:lbYKnwWR/8
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation Aurora.exe Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation Aurora.exe Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation Aurora.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4764 2872 Aurora.exe 85 PID 2872 wrote to memory of 4764 2872 Aurora.exe 85 PID 4760 wrote to memory of 4476 4760 Aurora.exe 98 PID 4760 wrote to memory of 4476 4760 Aurora.exe 98 PID 960 wrote to memory of 4780 960 Aurora.exe 103 PID 960 wrote to memory of 4780 960 Aurora.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aurora.exe"C:\Users\Admin\AppData\Local\Temp\Aurora.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\Aurora2⤵PID:4764
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\Aurora.exe"C:\Users\Admin\AppData\Local\Temp\Aurora.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\Aurora2⤵PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\Aurora.exe"C:\Users\Admin\AppData\Local\Temp\Aurora.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\Aurora2⤵PID:4780
-