Analysis
-
max time kernel
156s -
max time network
209s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23-01-2025 17:56
Static task
static1
1 signatures
General
-
Target
Aura/Aura.exe
-
Size
404KB
-
MD5
506a4835ab7625ea0ff913b3d95d347a
-
SHA1
45c2d181da28afdd7e216efcd9a1659feaf4913e
-
SHA256
32f67406aa2fbcfff60e9f8b9aca6d1e27be306901ac6078df0ed3c3516582d8
-
SHA512
79f59ec0df8d6a37bac31b23687e38b7e791b037df37cd3016c8d3585b6bdd2768552cf3ac3f70dda5911e0ab80c8d630bb4f23497fa2dfe6c6ae454283b26fb
-
SSDEEP
12288:l1nhH51gsmIu0Wxwsq1OL7kmLTexPGtzEO:7hHUymworexPkzt
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
https://suggestyuoz.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 236 set thread context of 4412 236 Aura.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 2352 236 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aura.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aura.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 236 wrote to memory of 4412 236 Aura.exe 82 PID 236 wrote to memory of 4412 236 Aura.exe 82 PID 236 wrote to memory of 4412 236 Aura.exe 82 PID 236 wrote to memory of 4412 236 Aura.exe 82 PID 236 wrote to memory of 4412 236 Aura.exe 82 PID 236 wrote to memory of 4412 236 Aura.exe 82 PID 236 wrote to memory of 4412 236 Aura.exe 82 PID 236 wrote to memory of 4412 236 Aura.exe 82 PID 236 wrote to memory of 4412 236 Aura.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aura\Aura.exe"C:\Users\Admin\AppData\Local\Temp\Aura\Aura.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\Aura\Aura.exe"C:\Users\Admin\AppData\Local\Temp\Aura\Aura.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 236 -s 8402⤵
- Program crash
PID:2352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 236 -ip 2361⤵PID:4380