Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    182s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2024, 22:19

General

  • Target

    AURORA_STEALER.zip

  • Size

    13.0MB

  • MD5

    5fa1d8bed0a6cd19007923b7e0512075

  • SHA1

    9fadb9f7f943bc61519cc6fba17e33723ee8b9d9

  • SHA256

    3834b805ba68b1d8bbb041e6789d1cf564af626954d7d03b592b3dfc58522746

  • SHA512

    f6731839bfc69434bede686ec44e1df83498b8572eaf55ad0e6805764b56344c10858333d181bb69b5c6d25d22089ce4d8049255c5f3a58920c10b2331c207ba

  • SSDEEP

    393216:cFEaPdyKmdMrLUrekEAlgyGVG7rNfFujxUh7f6hiL0bQPF:AEahmTxlL9yxaosN

Malware Config

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Aurora family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\AURORA_STEALER.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\7zO42038CA7\Aurora.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO42038CA7\Aurora.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1636
      • C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe
        "C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe"
        3⤵
        • Executes dropped EXE
        PID:4052
    • C:\Users\Admin\AppData\Local\Temp\7zO420B1509\crack.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO420B1509\crack.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5092
    • C:\Users\Admin\AppData\Local\Temp\7zO42019C09\crack.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO42019C09\crack.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3620
    • C:\Users\Admin\AppData\Local\Temp\7zO420B3729\crack.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO420B3729\crack.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4544
    • C:\Users\Admin\AppData\Local\Temp\7zO420CDC29\crack.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO420CDC29\crack.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2488
    • C:\Users\Admin\AppData\Local\Temp\7zO4208B139\Aurora.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO4208B139\Aurora.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe
        "C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe"
        3⤵
        • Executes dropped EXE
        PID:2756
    • C:\Users\Admin\AppData\Local\Temp\7zO42060099\Aurora.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO42060099\Aurora.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe
        "C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:3944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zO42038CA7\Aurora.exe

    Filesize

    25.9MB

    MD5

    be0aabd5d53378099712611c6bc8b56c

    SHA1

    b4c03dc06e24b0d9ae3978f0e5b2ad96629abc3c

    SHA256

    b37537ab33af1470ef80f5b61c430802d97656aa07fd2533a1de62322ea52720

    SHA512

    e4709de3cc96e20880d3aa14339687201eda54ee0eeb111df11a702949f4b21ac2c088da0d3d5ead049294804ec5f8d2be27ab176b99f1110785b4d078b91639

  • C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe

    Filesize

    25.4MB

    MD5

    ad9aa927339dc830a38021afbe20a85f

    SHA1

    8017bea5f073064a27f61390ce6433cc110f55ea

    SHA256

    6815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71

    SHA512

    43d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd

  • C:\Users\Admin\AppData\Local\Temp\build.exe

    Filesize

    506KB

    MD5

    e5fb57e8214483fd395bd431cb3d1c4b

    SHA1

    60e22fc9e0068c8156462f003760efdcac82766b

    SHA256

    e389fc5782f754918a10b020adcd8faa11c25658b8d6f8cbc49f9ac3a7637684

    SHA512

    dc2ed0421db7dd5a3afeacb6a9f5017c97fc07d0b2d1745b50ede50087a58245d31d6669077a672b32541dbfa233ef87260a37be48de3bd407d8c587fc903d89

  • memory/1636-22-0x0000000000500000-0x0000000000556000-memory.dmp

    Filesize

    344KB

  • memory/1636-30-0x0000000005290000-0x00000000058A8000-memory.dmp

    Filesize

    6.1MB

  • memory/1636-31-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

    Filesize

    72KB

  • memory/1636-32-0x0000000004D80000-0x0000000004E8A000-memory.dmp

    Filesize

    1.0MB

  • memory/1636-33-0x0000000004C00000-0x0000000004C3C000-memory.dmp

    Filesize

    240KB

  • memory/1636-34-0x0000000004C70000-0x0000000004CBC000-memory.dmp

    Filesize

    304KB

  • memory/2488-84-0x00000000009E0000-0x0000000000A36000-memory.dmp

    Filesize

    344KB

  • memory/2728-28-0x0000000000400000-0x0000000001DF6000-memory.dmp

    Filesize

    26.0MB

  • memory/2756-106-0x00007FF7FA800000-0x00007FF7FC10B000-memory.dmp

    Filesize

    25.0MB

  • memory/2756-107-0x00007FF7FA800000-0x00007FF7FC10B000-memory.dmp

    Filesize

    25.0MB

  • memory/2820-124-0x0000000000400000-0x0000000001DF6000-memory.dmp

    Filesize

    26.0MB

  • memory/3620-58-0x0000000000A10000-0x0000000000A66000-memory.dmp

    Filesize

    344KB

  • memory/3944-126-0x00007FF603770000-0x00007FF60507B000-memory.dmp

    Filesize

    25.0MB

  • memory/4052-35-0x00007FF797240000-0x00007FF798B4B000-memory.dmp

    Filesize

    25.0MB

  • memory/4544-71-0x00000000008F0000-0x0000000000946000-memory.dmp

    Filesize

    344KB

  • memory/4912-104-0x0000000000400000-0x0000000001DF6000-memory.dmp

    Filesize

    26.0MB

  • memory/5092-46-0x0000000000D10000-0x0000000000D66000-memory.dmp

    Filesize

    344KB