Analysis
-
max time kernel
11s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
01/03/2021, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe
Resource
win7v20201028
General
-
Target
9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe
-
Size
291KB
-
MD5
ce29efcf5510c0a9dcb38f62d50a5e8b
-
SHA1
eb9a28d284303663ab5bbbab9e8cc7db88cf7a2f
-
SHA256
9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e
-
SHA512
dee3945c894c586f1a4d42581796e1ce257cc5ec8a98368de391d664328ac7318163aff9edcd5eac9b9ab4c3b3407c2448add2d07b3863a74f513bf0541a77aa
Malware Config
Signatures
-
Taurus Stealer
Taurus is an infostealer first seen in June 2020.
-
Deletes itself 1 IoCs
pid Process 1956 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 -
Delays execution with timeout.exe 1 IoCs
pid Process 1648 timeout.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 2004 wrote to memory of 1736 2004 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 29 PID 1736 wrote to memory of 1956 1736 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 32 PID 1736 wrote to memory of 1956 1736 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 32 PID 1736 wrote to memory of 1956 1736 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 32 PID 1736 wrote to memory of 1956 1736 9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe 32 PID 1956 wrote to memory of 1648 1956 cmd.exe 34 PID 1956 wrote to memory of 1648 1956 cmd.exe 34 PID 1956 wrote to memory of 1648 1956 cmd.exe 34 PID 1956 wrote to memory of 1648 1956 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe"C:\Users\Admin\AppData\Local\Temp\9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe"C:\Users\Admin\AppData\Local\Temp\9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\9bec30afd640d68be28fef4e6b5abcc14d90b2c7293d7709619b8f9b9e685b7e.exe3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:1648
-
-
-