Analysis
-
max time kernel
117s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 22:28
Static task
static1
Behavioral task
behavioral1
Sample
Aura.zip
Resource
win7-20240903-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
Aura.zip
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Aura.zip
-
Size
55.6MB
-
MD5
246a8013f9599338b17db8b13aa91ca5
-
SHA1
a325552e79253dbf5445c9769bce86848acf0682
-
SHA256
caf35c1c37e5639b184e09ca043271a427925c2481a34cc6aaeed225909d55ad
-
SHA512
e4b47a0559464ab14d6ebdfcb44baf0df610e57ae58467d532bdf11348c1d3624e19785c67dec97a9263c54041bbf78dcd971fbceca838f41898aa4291c89638
-
SSDEEP
1572864:bl/OTRb/yq7nuJmNKatPPYdh9ym/I+9j8uIbREQd:xob/ysnuIMatPPY4+NYEW
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2388 7zFM.exe Token: 35 2388 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 7zFM.exe