Analysis
-
max time kernel
12s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
22-02-2021 11:13
Static task
static1
Behavioral task
behavioral1
Sample
frank_2021-02-22_02-03.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
frank_2021-02-22_02-03.exe
-
Size
347KB
-
MD5
5ae9b47fd2a505049a7f6f405f6f512c
-
SHA1
fe53ef52e27877450865d074ef2f3e67e2af2ca3
-
SHA256
708c8e26689e83a82460bfcf611f78eaf39ee6e77e12c23ea012489deb57e72c
-
SHA512
677ea2876ddf6ba738e7eee769c100264b4eaf850ffbf92dba531d1b0351b43ac235c70500bacea8ddd502aefc133ffa0330e855ca3a9eeb35cac300dfca4ec5
Score
10/10
Malware Config
Signatures
-
Taurus Stealer
Taurus is an infostealer first seen in June 2020.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1168 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
frank_2021-02-22_02-03.exedescription pid Process procid_target PID 548 set thread context of 1820 548 frank_2021-02-22_02-03.exe 26 -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 840 timeout.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
frank_2021-02-22_02-03.exefrank_2021-02-22_02-03.execmd.exedescription pid Process procid_target PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 548 wrote to memory of 1820 548 frank_2021-02-22_02-03.exe 26 PID 1820 wrote to memory of 1168 1820 frank_2021-02-22_02-03.exe 32 PID 1820 wrote to memory of 1168 1820 frank_2021-02-22_02-03.exe 32 PID 1820 wrote to memory of 1168 1820 frank_2021-02-22_02-03.exe 32 PID 1820 wrote to memory of 1168 1820 frank_2021-02-22_02-03.exe 32 PID 1168 wrote to memory of 840 1168 cmd.exe 34 PID 1168 wrote to memory of 840 1168 cmd.exe 34 PID 1168 wrote to memory of 840 1168 cmd.exe 34 PID 1168 wrote to memory of 840 1168 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe"C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe"C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\frank_2021-02-22_02-03.exe3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:840
-
-
-