Analysis
-
max time kernel
213s -
max time network
239s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23-01-2025 14:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2344.mediafire.com/a84ux21q27tgQ6VhtlUTPk5yw_FoYOWg2Ppvzb9EwLmTB1QkqzzMKAyqwZQ4UU6RI_ffaZSW6tNkL8J4bit9NvRD7JvGxR-hLQav4Vp-NVcfZD1f8noXAf55IgIXZ5DH04bbgARu2KaysBqsbZZRCnyGu4N6tLEyyTpFguT4zDO3/ui2doo7ug0ci0at/Aura.zip
Resource
win10ltsc2021-20250113-en
General
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
https://suggestyuoz.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 2432 Aura.exe 4924 Aura.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2432 set thread context of 4924 2432 Aura.exe 142 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\6bb6b63a-4261-461c-8b3e-545aa7f3a4e6.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250123143124.pma setup.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 772 2432 WerFault.exe 140 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aura.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aura.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e8005398e082303024b98265d99428e115f0000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\NodeSlot = "5" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\NodeSlot = "6" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0\0 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "4" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = 00000000ffffffff msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616257" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Downloads" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe10000000bc685b7dc065db01a0b32c6cce65db0171eb2ea7a36ddb0114000000 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = ffffffff msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 msedge.exe Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 5168 msedge.exe 5168 msedge.exe 1204 identity_helper.exe 1204 identity_helper.exe 4972 msedge.exe 4972 msedge.exe 472 msedge.exe 472 msedge.exe 5664 msedge.exe 5664 msedge.exe 5664 msedge.exe 5664 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 5968 7zG.exe Token: 35 5968 7zG.exe Token: SeSecurityPrivilege 5968 7zG.exe Token: SeSecurityPrivilege 5968 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe 5168 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5168 wrote to memory of 6060 5168 msedge.exe 84 PID 5168 wrote to memory of 6060 5168 msedge.exe 84 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 4324 5168 msedge.exe 85 PID 5168 wrote to memory of 2248 5168 msedge.exe 86 PID 5168 wrote to memory of 2248 5168 msedge.exe 86 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 PID 5168 wrote to memory of 2000 5168 msedge.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://download2344.mediafire.com/a84ux21q27tgQ6VhtlUTPk5yw_FoYOWg2Ppvzb9EwLmTB1QkqzzMKAyqwZQ4UU6RI_ffaZSW6tNkL8J4bit9NvRD7JvGxR-hLQav4Vp-NVcfZD1f8noXAf55IgIXZ5DH04bbgARu2KaysBqsbZZRCnyGu4N6tLEyyTpFguT4zDO3/ui2doo7ug0ci0at/Aura.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x124,0x134,0x7ff9f20446f8,0x7ff9f2044708,0x7ff9f20447182⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:4880 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff626db5460,0x7ff626db5470,0x7ff626db54803⤵PID:5436
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:12⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6700 /prefetch:82⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6916 /prefetch:12⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7012 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7208 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7564 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6872 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2236 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7944 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7848 /prefetch:82⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6732 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4834021634918642873,2130502235248136546,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1472
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Aura\" -spe -an -ai#7zMap15938:70:7zEvent158101⤵
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
C:\Users\Admin\Downloads\Aura\Aura.exe"C:\Users\Admin\Downloads\Aura\Aura.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Users\Admin\Downloads\Aura\Aura.exe"C:\Users\Admin\Downloads\Aura\Aura.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 8082⤵
- Program crash
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2432 -ip 24321⤵PID:5140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ef0e81b130f8dcf42e80097a75e5d04d
SHA1d8694b7c5fba1ee2e73e69dd7790ca5b1cb882db
SHA256fc53158d948d1742e3f960124f9fdb138eaa4aa711d0f43833fa893247de4918
SHA512c85df1696537dfce601de46183b1b22d7f0007b0f695f1904bbd1a6e429d7787c3d6199bcecdb21936d811b35eeca57a9800bcd3a3b585569aabeb0b5b497efd
-
Filesize
152B
MD560b4c78e9eb27ebcdb2fe29982c1d37e
SHA114f89b9642766a02945586205a79e9a2798f465f
SHA2569ea7d5b79708bfeb3058f8a6a1e0463f22480f793c95ff4f88ec135fb38f1c6e
SHA512caed905cff1db31fa95a30d9bbf43da085d7f4dc8273b7168faa92fd1bcf1fff39c1998c188443ee8e95a08476c70506156be891c29a84f179890a60cc27ce58
-
Filesize
152B
MD5c58ccb4da696442ae40d3db9e4b41c3f
SHA1e27933a94d57f04c75b8bff25ad7012171917f87
SHA256d0d75be801bf0c5f715665c73214bfa38fd714dd9ee846de410855d96dd75931
SHA51282a7cd39758d67f1d177ce7f46a5ee560eb60207ca7ca1e39b9a08a269ed140532bf1ec85899a033a54d20a0d59592d1cd5f5d35f71da98f6b6e35cd904e1872
-
Filesize
215KB
MD57b49e7ed72d5c3ab75ea4aa12182314a
SHA11338fc8f099438e5465615ace45c245450f98c84
SHA256747c584047f6a46912d5c5354b6186e04ea24cf61246a89c57077faf96679db6
SHA5126edf4594e2b850f3ede5a68738e6482dd6e9a5312bffa61b053312aa383df787641f6747ac91fa71bb80c51ed52a0c23cc911f063cd6e322d9a1210aea64e985
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD50b521381e9622e80d6093d3fb8aa00a3
SHA15906a4f2db32e3d48ba5f89ab82b76983b0cae42
SHA2565ea4258c34fd41b9af0cd07edbe76e03cc926dbe074f48bc8ef78b2db997643e
SHA51270b775e25868e0ce0c208eacde099d1a892c6883f2e5e29faa19847890c3f661b1dceef03d395a42f37a98bcbbc18dad4d6d504a0d115e38c2791b5d9601ade3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD574d078ebd0406d44c4f31a55b95361f4
SHA1af93c2a9e688131982be8815965d7c28b5ec13ba
SHA256fbdcaff1c73508a95b8322e54106bcb6ae686215a3b90e3868c612379cc1be94
SHA51205d012cc5fed98dec60a9e2288148d4ced71c02169f4b99326d57b7b5ceb9658923a7019704b0978db97b8fbdc832c34424bc99e82e023d316e685b83ff78182
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5df7fac6d55dea4fe8f9c18c729c1d188
SHA14808409e849b6ebd670eb80c200d4be5f7735aff
SHA25650e39110ff4f4997909473786cfaec53bd84f728e14446fd9a9eec97ebb96bc0
SHA512c17dbd96096e7ce0fec221d77599125112020919bdceb350b4198671c98ec83415a4d28df21db1cf6effde56fed372a70605220611f1cab6c436b1b9961bf6d9
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
5KB
MD5c4859ff13fc5ca4dee0fd241eeaf5765
SHA17208c1ec9663d7827002e617ed0be241f7b424d9
SHA256f291191d25836bdd9f8f405366104a48edcc662453424dc840a6789649cf0019
SHA512b143f7ae3934d465446e3d33c019b18639f3703bb3291ff356dbb463cc4ccd0f9df9fa1357d2a5a08984df1cd6707c84df02528936e7c65345de0fdc48b91ddd
-
Filesize
5KB
MD51b39cf428740a0644e9261a2fdce69a4
SHA1413e4c90d5b83a5fa95d11e1b6fe063ca079ed87
SHA256e3b3384de602ad1613f0b57248c8a6aad3ef7b761e62981aefd6f23885f2e6b5
SHA5127c2286e175895e363abb6cd89600185b308ef3af2f4288a7a7a83ce3f1883c25ab06e42bd0c5417e79875abf4f4056b99d01ed33750461d397687caf18d99d88
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe588316.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
6KB
MD53284c066bd4c70dd438034af66e0a067
SHA16d13bdd6ac21708c3b578e2ed6adad25e69110bf
SHA256fbdc79ae43303970d4d065137b7fb9966b74b67d346d55c6dc28f2e419e32b1b
SHA5121112a8ef010c904c3d71c4b13d18ce9c69909677e4cc3c4cd7fc7ab7ae6d10b2591241525475cf557c795b88e9da902606bdbfa685e498ed7db543695b8109dc
-
Filesize
8KB
MD554e649662c8e287e79d7b030154d3fa7
SHA18f3684e27ebef1d1643785e3f90cd1c8adab35ec
SHA256bc5ffb6492ea692cb86eaef8d1c8b57684af783211fc10512087273191743e4b
SHA512ce2ba3686424ce41cb290465086eb8e2a1ee9cdeb3ac2ad99ee302ef3c6323a3e2a4e4b0ee84e1f2c8b82e775457a9c0f7e38e2fadd3a0b9467401697af68e98
-
Filesize
5KB
MD56223cc78607e2c666bba1d366ebc1734
SHA19d037a02013bb46f402dc27ab705b0971743c3aa
SHA2567106650e96328054e749f91684416e62f2a3662b8373bfbd35415802989a4075
SHA51289cecfc35e2ac67e7e7afaeb49d242b2d2bad411f7d6de9f79d2258e4db50506b5b48ae0b2862a3739315792bd614da8e8eeb57530a281eed4ca715ebb90859a
-
Filesize
10KB
MD52c813ea0b5da8fe53fda63f5bb5f5016
SHA1ab2da30bcd0a7c3acfafed5f9e8519c9cdaee8a6
SHA256e1f69594350bd77dfc4f807db75249ce394deaf9d996c41480dc6f59a5092fed
SHA512ccf30351cce1c24b8fe4f39df3129894c23997ceab303b4ea7a5d52278309e3941e5e74ce9888ac92f4ebaddb285905e914adc2bc479bf5ae567fad9ef5f8595
-
Filesize
7KB
MD5938a61845d24b072c13b9bcd87625ab9
SHA1a864bbd4d8410b298faef40b46f5f6e7a4283b1d
SHA256a9b2f2d6353906843d74d426620651a155de6f99d52d4d47acb21fcf0b4dadb6
SHA512e86f48a68bf6ace8c6bbe3849b40de8fdc526d6de6807a3306c3b050cce165f042db67625eebc67a23473a2c462d5914f793a4e8deaa318b55b1beef226d1a2f
-
Filesize
10KB
MD530c8bb9b7a7c2018114d2bdb729cad76
SHA1fe7bfd4286998c27fbaa7cddf3fe9dd3b04a00c5
SHA256cff75b2c606e904f23d64dd87061e1db26810baad37bebf4073f7f56d70fb948
SHA512bd01ae2bd54fab9a773b2df4fa32eb88963e632f793e89266158012b4d37fa60dc4046bd683f78b2c50720007463f7c65e2714beb5e55ffd1f725c72cff43ccb
-
Filesize
24KB
MD562aee047a3c6cf2fec2a29a34157633b
SHA151b6eed704d65a62d8793ea18885d12aa39a5cf2
SHA256342e67b65a4070bbd6e7c2fbf75c98e727d9db45fa071181cae0f5eade726ddf
SHA51221ee4907a0dcf077f9233542462b8bfd01d976dc1fe4a7b7c4ad70d691e7b9101bddcc292e13fc83a22f56355aa5b93949ac124c84da1f43a80851bf313d895e
-
Filesize
24KB
MD5a18e33a424007376b810134dde07fec6
SHA13acbb4070e7fab6fea0f6c618aeca0964e39f7f8
SHA25612852fe3bc04c3a3f6cdb76d7fa37cf0d7f91ffe801c70caf5ee4f5bb34e2821
SHA5123a08afee6762546ba967965d72b90a0e0ed2a45bee0e195696c92f511c4b92634acdb669e6320359cb436e809c9672c0371042990aaf26b90da06da523ce6b9b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55926d320ee24d4e3e5bf298a92f66810
SHA13c8c055824b1ee66ca0b4ec93bc5a232a771dd10
SHA25649b1f3d8882162b6a90f0f2cf3a46b7d96a7203acfb9d92284a28619abb42436
SHA512befd1997bf8acfcfe8e254b255d5912f0fc8464c1911e2eccecab459c67817de3fdf5e0623aff9984a426fd9993d521ffb0f720fd494077a39680f7718e6ed75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe583a45.TMP
Filesize48B
MD5da5b8d57ad884283261a426e4b0ce368
SHA1852d679923be4e6a4f659d20e20accb3ba8bde4b
SHA25613567527ff2a1ced78ea7ed2bbf4a38dc07f1778a9eeb9f46a2b8372fc4b0b21
SHA512773135717304ce9d341e5d686f744f40c998f66857d57ee9fd96f9c1e08a56f266d60bcb51dc5cc6096b437b316dc45ce67c59fa74dd6f1d64de2d86615abe14
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5c9047de1386ca8f6f77811f6e7b2815e
SHA13bf247f2e8f91c748e2688feed880cb4a1350cff
SHA25613b7ffb3bb537be0446fdc3832138af9d28feb1d9a4adbba2208e777102cc556
SHA512be6b133e904ab209af3d9afbdba314c906f4dcf5c16b31a18fa5fbd42c057e36a48959f533d5a28721db1a5a92c3c774436c60932bf61c4f2638ac4b2b1b0cec
-
Filesize
1KB
MD5acae3e75503bfd19732c1eab7b2123d7
SHA123a1c3e6f8fa57910adc987957853ab07adcd9bb
SHA2560114a50072595bdc3f3c91a0d5a76514873a90a2e1b3d03aa811658bbd57e2de
SHA5128c40f3eb46c585f93a817559da5b7b3630acd20c0c267e38d34a0ffcd6b811343bcb6f69f4fdaba53b7b2ec73d8582c05e0e46c9b62aec6dc36e8bb747f19ac1
-
Filesize
706B
MD5f1abfe1a68eb072264516a6c97d97474
SHA163b093a61e0f91e6abc95903c8488243bb1b9daa
SHA256654b4c2695cf7bc48b7549d1b20465b56b5d6817fff9c00d9d70eb190b8a71d2
SHA512da00e6d590fd2e64a5a995b24d159de9e42b12fc82c859c79bfeed29f318856339d831a1c7287473c36b84a8e42fe399d49c0d583eba4c1891956508628a7ace
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5f03bb9faf87b9dadfaaa86c9b1a142cf
SHA107e7426145f2ac4dc6da14c5d098b6c7e9363f29
SHA2561c427fa3d14f13112af8d1d1fbf89252c155277f9af8e680f4289f9a28d34643
SHA5125bb372c30717a76b7959f7b05109200a8f7653c575928f31f4a0ada517d7d7f78e49f46a1ffd7c9fcbe70435e2e8e6024b2b0c23421994675130786370c6bebd
-
Filesize
11KB
MD5a93870e3d73c912ae915fb64820182cc
SHA15fcac998b202b2f3193f2c00da149e453f91f8a4
SHA25657a3edb40371868e83c1ca0719472b046c8a21d614b4307af055543728b5da2b
SHA5126fae1af2d4c195cdee4c2ce988af9e1a6c49d310d481c3c47c19d3529ccde8af6689ac0a15545c37342b426746a187d662143e5b0c3d7a1d82aacacefa7e8487
-
Filesize
8KB
MD52f1cdb2edac57da0bdc9efe6c30cf1eb
SHA147951aff83138cb751c3b7a835b43ba33ccfca8e
SHA2568e8ce7d8597e25d1e139506ef2bd7523a5efca867d933204007701f093cb8fc1
SHA512ddaa3bc0d12f27c0576ce88e295cae7abf2f103f541bad778b1b51ce4d9fe487a9cfca771b2f0360a258503288c675ebac543b4f18790abc43ea725077c1519d
-
Filesize
11KB
MD5c91a21f5a5b7140ebd2c60e2512e8ff6
SHA1b3a90cd57660ae0b9270a85799695733044569f7
SHA2562de4ef569a1827ef21f82a65c061d596ca49021396ff055f9b11ff975eed8e17
SHA512b0b70548469b83e314dec1ee8177adf0653e5de6664c78805f8c79c43c9a6744092f289d4cf8021a75d1e3ce656592ab6162b8f2ab47848acaf9beaf8fe8f5bf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD55e90b3d121ba2048fa95403b949d5a71
SHA1f52fb9d6c08b8cd73c458e2e9519759d09753fe4
SHA256c0805cedaaa9feef5491b7c042573e649ada0e4bf6447b9ffc0fb9cb12a89118
SHA512d3621be83d5f5fc9e4d151ffa1ca32cbd76b808bc931b164ae33195d28b70c2d4db9bc8a6b5d2f1cb8cbe9a2552e185718dbbd82406c72f8fa7e2bc7f4115ea3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5ec403c7288e481e04bebf50c8a32ccad
SHA1687edd77bbc1fa5ff3f71ef24f7e6ab4e9c5bec3
SHA256dddaa89786e460e3fad00db42753144a6adc0e723df0e64468da066bcf27b282
SHA5122503b3033b0941943846898419a1bb7bfb3a4ef4dbaca1232f7cedeb2654cc8b9e3825fcb23cf050c0f440d1301ace9643b6a7940a4172b0cf33477d5f66008d
-
Filesize
494KB
MD54a0b331b2989396ec96ba086515716cb
SHA1bc83cfc66f9feb3e3a8e73a0c1a97e057b2599f2
SHA256ac5d5310123af70db0e6985072448e19e1e714f709a74743a04094807f25c363
SHA5120425e5883f985b685fa390e03f7c6b49de8ca7ab52f3038fcdc564c4e1a8be26405fcbe2810b08b2c0ee75501920a411bbac8b0b2009b633eb2eac479d7e0b4a