Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 02:16

General

  • Target

    Aura/com/google/gson/FieldNamingPolicy$1.class

  • Size

    711B

  • MD5

    7a46c39a76b08e750af645e5fdd87def

  • SHA1

    96a2fef015cd67667a761b14a670b6b5ca9463a9

  • SHA256

    c43df3769dac20d5cad76107848ae6e47c390361c032766843b144a8ecaffce8

  • SHA512

    a063d023b7dff37b1459d06f3391b40d044297c45d0733332af41f4eaacb33ac78973279dc7b7d2a34a4ce966eb5bff7e185e74c9d9ca70c70dd6cc2c13b18e9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Aura\com\google\gson\FieldNamingPolicy$1.class
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Aura\com\google\gson\FieldNamingPolicy$1.class
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Aura\com\google\gson\FieldNamingPolicy$1.class"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    5fd3a95cfe8988a1eea5e056065d8250

    SHA1

    3bd8752719ddc030ba29b0cc9b351801acd4185f

    SHA256

    2d528ab667ddce8b006ece12ad4a797a82a726d9c12677f7f6b7f982b2c8283d

    SHA512

    451b240865dbfc1cc85841dedd8bf22cf2043e7db435bb214b6e1e2759e9b66ac555ecf69fa6ed7985a2fb52370448b451ed20b233a728947f470da20fc2d08d