File name:

Aura.exe

Full analysis: https://app.any.run/tasks/c7a6143c-537d-454a-bcbb-0dd21109b38d
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 27, 2024, 17:44:22
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
loader
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 5 sections
MD5:

D4C99337BC1F8E9BA7C0CF81DD01C39D

SHA1:

E34E7FC7D3F41FE73DC5735B9EE7ED41F198543F

SHA256:

714D338600B157FE68E58271223BC1387E1E63F8C3511E4E76FAA774269E30A6

SSDEEP:

196608:u4gWWjjdF5T7J49PeZAjbC0ik0uWg6NtJ:ZgWWjjdF5T7J49PeZAjbC0ik0uWg6NtJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • Aura.exe (PID: 6692)
      • svchost.exe (PID: 2172)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2172)
      • Aura.exe (PID: 6692)
    • Process requests binary or script from the Internet

      • Aura.exe (PID: 6692)
    • Executable content was dropped or overwritten

      • Aura.exe (PID: 6692)
      • 917DVOIRCPWKI3K7BK4L6.exe (PID: 2652)
      • 7z.exe (PID: 5564)
      • cmd.exe (PID: 6960)
    • Connects to the server without a host name

      • Aura.exe (PID: 6692)
    • Drops 7-zip archiver for unpacking

      • 917DVOIRCPWKI3K7BK4L6.exe (PID: 2652)
    • Starts CMD.EXE for commands execution

      • 917DVOIRCPWKI3K7BK4L6.exe (PID: 2652)
    • Executing commands from a ".bat" file

      • 917DVOIRCPWKI3K7BK4L6.exe (PID: 2652)
    • The executable file from the user directory is run by the CMD process

      • 7z.exe (PID: 1580)
      • 7z.exe (PID: 6276)
      • 7z.exe (PID: 5168)
      • 7z.exe (PID: 5984)
      • 7z.exe (PID: 6772)
      • 7z.exe (PID: 7052)
      • 7z.exe (PID: 6432)
      • 7z.exe (PID: 4236)
      • 7z.exe (PID: 4464)
      • 7z.exe (PID: 824)
      • 7z.exe (PID: 6128)
      • 7z.exe (PID: 5564)
      • Installer.exe (PID: 6308)
    • Potential Corporate Privacy Violation

      • Aura.exe (PID: 6692)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 6960)
  • INFO

    • Reads the computer name

      • Aura.exe (PID: 6692)
    • Checks supported languages

      • Aura.exe (PID: 6692)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 5948)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (35.3)
.exe | Win32 Executable MS Visual C++ (generic) (26.5)
.exe | Win64 Executable (generic) (23.4)
.dll | Win32 Dynamic Link Library (generic) (5.5)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:25 18:26:55+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.41
CodeSize: 6453248
InitializedDataSize: 3438080
UninitializedDataSize: -
EntryPoint: 0x5df13c
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 4.7.9.7
ProductVersionNumber: 4.7.9.7
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Slitters Inscribableness
FileDescription: Gypsite
FileVersion: 4.7.9.7
InternalName: Gypsite
LegalCopyright: Copyright (C) 2024
OriginalFileName: Gypsite.exe
ProductName: Gypsite
ProductVersion: 4.7.9.7
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
22
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LUMMA aura.exe conhost.exe no specs #LUMMA svchost.exe rundll32.exe no specs 917dvoircpwki3k7bk4l6.exe cmd.exe conhost.exe no specs mode.com no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe attrib.exe no specs installer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
8247z.exe e extracted/file_4.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
15807z.exe e extracted/file_9.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2652"C:\Users\admin\AppData\Local\Temp\917DVOIRCPWKI3K7BK4L6.exe"C:\Users\admin\AppData\Local\Temp\917DVOIRCPWKI3K7BK4L6.exe
Aura.exe
User:
admin
Company:
AnalystSoft Inc
Integrity Level:
MEDIUM
Description:
StatPlus v7
Version:
7.7.0.0
Modules
Images
c:\users\admin\appdata\local\temp\917dvoircpwki3k7bk4l6.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
3972attrib +H "Installer.exe"C:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
42367z.exe e extracted/file_5.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
44647z.exe e extracted/file_3.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
51687z.exe e extracted/file_8.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
55647z.exe e extracted/file_1.zip -oextractedC:\Users\admin\AppData\Local\Temp\main\7z.exe
cmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Console
Exit code:
0
Version:
19.00
Modules
Images
c:\users\admin\appdata\local\temp\main\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5948mode 65,10C:\Windows\System32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
DOS Device MODE Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
1 197
Read events
1 197
Write events
0
Delete events
0

Modification events

No data
Executable files
5
Suspicious files
14
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
6692Aura.exeC:\Users\admin\AppData\Local\Temp\917DVOIRCPWKI3K7BK4L6.exeexecutable
MD5:CE901A874C9D157E48F83B1BE3D32AA6
SHA256:35401B151F704F6BBBF4F8B36D886E4DC391809822181B396C02D243C0ACA7F0
2652917DVOIRCPWKI3K7BK4L6.exeC:\Users\admin\AppData\Local\Temp\main\file.bincompressed
MD5:AE5771940899F79E634B6E4475040467
SHA256:B9740CF94F4A77BB2D61EC79FF342E7C739BB35B2B61F32E9B5F2D09218C24FC
2652917DVOIRCPWKI3K7BK4L6.exeC:\Users\admin\AppData\Local\Temp\main\KillDuplicate.cmdtext
MD5:68CECDF24AA2FD011ECE466F00EF8450
SHA256:64929489DC8A0D66EA95113D4E676368EDB576EA85D23564D53346B21C202770
2652917DVOIRCPWKI3K7BK4L6.exeC:\Users\admin\AppData\Local\Temp\main\main.battext
MD5:A6D611790D8AFE6E81448CDF6DDB9EA4
SHA256:0C7BE4C51CD64A8B6D2235EE0EEAB8C98C565ED9B74B50C0EBA02750C3B24B2F
6960cmd.exeC:\Users\admin\AppData\Local\Temp\main\file.zipcompressed
MD5:AE5771940899F79E634B6E4475040467
SHA256:B9740CF94F4A77BB2D61EC79FF342E7C739BB35B2B61F32E9B5F2D09218C24FC
70527z.exeC:\Users\admin\AppData\Local\Temp\main\extracted\file_5.zipcompressed
MD5:FC6106C411428E421DE593673892B72F
SHA256:C165A3D777629605669D5C7AC7D55240A8DF0CB59686DD91D8A6111C03C67EBE
15807z.exeC:\Users\admin\AppData\Local\Temp\main\extracted\file_8.zipcompressed
MD5:C9C7BB282A5727DA7E9E1F4E9D8D3FBA
SHA256:BE879EFDEC472650B101D7BAFE4A1903A7CDDDB8A623A154921C230014D1A19E
8247z.exeC:\Users\admin\AppData\Local\Temp\main\extracted\file_3.zipcompressed
MD5:8854D4E74C1AE01EAA463330A17CF2BD
SHA256:DF9ADC70A263FCEBE4F6EF88404AC0ACF424F2596F3F191A2FFB752B9D4BB064
42367z.exeC:\Users\admin\AppData\Local\Temp\main\extracted\file_4.zipcompressed
MD5:FEA1BC14AFA3E37F1E15EB337E72B12C
SHA256:6C1795FC843B77D29BD5F103DFC100C8928B7551F01FD8135F21C078B8533A7F
55647z.exeC:\Users\admin\AppData\Local\Temp\main\extracted\Installer.exeexecutable
MD5:89A069871324D35E25922F6FB881D514
SHA256:7FAF92E0275F06214930A5EBBE11F1E98781CCD7CF4B95A0C23E5FCB013AD1AB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
46
DNS requests
21
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3860
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3788
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4816
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6692
Aura.exe
GET
200
147.45.47.81:80
http://147.45.47.81/conhost.exe
unknown
unknown
3860
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.18:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2.23.209.140:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
3788
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.18
  • 2.16.164.49
  • 2.16.164.9
  • 2.16.164.97
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.52.120.96
whitelisted
www.bing.com
  • 2.23.209.140
  • 2.23.209.182
  • 2.23.209.149
  • 2.23.209.185
  • 2.23.209.130
  • 2.23.209.189
  • 2.23.209.133
  • 2.23.209.179
  • 2.23.209.176
whitelisted
google.com
  • 142.250.185.142
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.76
  • 40.126.32.140
  • 20.190.160.20
  • 40.126.32.72
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.74
whitelisted
th.bing.com
  • 2.23.209.179
  • 2.23.209.176
  • 2.23.209.140
  • 2.23.209.130
  • 2.23.209.187
  • 2.23.209.185
  • 2.23.209.189
  • 2.23.209.149
  • 2.23.209.182
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted

Threats

PID
Process
Class
Message
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ostracizez .sbs)
6692
Aura.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (ostracizez .sbs in TLS SNI)
2172
svchost.exe
Domain Observed Used for C2 Detected
STEALER [ANY.RUN] Suspected Lumma domain by CrossDomain (ostracizez .sbs)
6692
Aura.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (ostracizez .sbs in TLS SNI)
6692
Aura.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (ostracizez .sbs in TLS SNI)
6692
Aura.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (ostracizez .sbs in TLS SNI)
6692
Aura.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (ostracizez .sbs in TLS SNI)
6692
Aura.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (ostracizez .sbs in TLS SNI)
6692
Aura.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (ostracizez .sbs in TLS SNI)
6692
Aura.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
No debug info