Analysis
-
max time kernel
2s -
max time network
6s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
31/01/2025, 11:53
Static task
static1
General
-
Target
Aura.exe
-
Size
409KB
-
MD5
973518f7c6afa14ed8b86fd9052843b7
-
SHA1
1f7cc8b24bcfa8946de79dfbe85819208412d5fe
-
SHA256
f3863b441bb0dfac15f44a63956c1a046d1ad2fb1e3c8482f9b5033bb11e00da
-
SHA512
70ae0d89b57a395d1e9d4e5e628acd20a8334743605b41afa1ed401a982bf6de7c252dcffa90e45a01fda92edda0b3813ae68a4c88e292df1b031a5e0ffcd9f4
-
SSDEEP
12288:nWiz8MrfcCIwXt0isMZCT3x57kcmfZcvzB9eZmJ:n/z5QotJZCTh57nmK77eZmJ
Malware Config
Extracted
Family
lumma
C2
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4548 set thread context of 4984 4548 Aura.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 924 4548 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aura.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aura.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4548 wrote to memory of 3892 4548 Aura.exe 83 PID 4548 wrote to memory of 3892 4548 Aura.exe 83 PID 4548 wrote to memory of 3892 4548 Aura.exe 83 PID 4548 wrote to memory of 224 4548 Aura.exe 84 PID 4548 wrote to memory of 224 4548 Aura.exe 84 PID 4548 wrote to memory of 224 4548 Aura.exe 84 PID 4548 wrote to memory of 4356 4548 Aura.exe 85 PID 4548 wrote to memory of 4356 4548 Aura.exe 85 PID 4548 wrote to memory of 4356 4548 Aura.exe 85 PID 4548 wrote to memory of 4984 4548 Aura.exe 86 PID 4548 wrote to memory of 4984 4548 Aura.exe 86 PID 4548 wrote to memory of 4984 4548 Aura.exe 86 PID 4548 wrote to memory of 4984 4548 Aura.exe 86 PID 4548 wrote to memory of 4984 4548 Aura.exe 86 PID 4548 wrote to memory of 4984 4548 Aura.exe 86 PID 4548 wrote to memory of 4984 4548 Aura.exe 86 PID 4548 wrote to memory of 4984 4548 Aura.exe 86 PID 4548 wrote to memory of 4984 4548 Aura.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Aura.exe"C:\Users\Admin\AppData\Local\Temp\Aura.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Aura.exe"C:\Users\Admin\AppData\Local\Temp\Aura.exe"2⤵PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\Aura.exe"C:\Users\Admin\AppData\Local\Temp\Aura.exe"2⤵PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\Aura.exe"C:\Users\Admin\AppData\Local\Temp\Aura.exe"2⤵PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\Aura.exe"C:\Users\Admin\AppData\Local\Temp\Aura.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 8002⤵
- Program crash
PID:924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4548 -ip 45481⤵PID:3300