Analysis
-
max time kernel
12s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-03-2021 12:10
Static task
static1
Behavioral task
behavioral1
Sample
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe
Resource
win7v20201028
General
-
Target
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe
-
Size
2.0MB
-
MD5
602c4fc857abdc65397927df41fc638d
-
SHA1
57dd28ad57e53751dbf68959a5a8fc4012d905a4
-
SHA256
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84
-
SHA512
c7da5aff57e4c125a4b42bf6a7e319509b9786fd673f4e3320ed0e2124cdf649ac4708ed2430bc7f550e2ba260383cf2a1099d0b4f9ac7ec6af3516c815d84ad
Malware Config
Signatures
-
Taurus Stealer
Taurus is an infostealer first seen in June 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exepid Process 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exedescription pid Process procid_target PID 2028 set thread context of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid Process 2000 timeout.exe 1888 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exepid Process 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exedescription pid Process Token: SeDebugPrivilege 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.execmd.execmd.exedescription pid Process procid_target PID 2028 wrote to memory of 1972 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 26 PID 2028 wrote to memory of 1972 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 26 PID 2028 wrote to memory of 1972 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 26 PID 2028 wrote to memory of 1972 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 26 PID 1972 wrote to memory of 1888 1972 cmd.exe 28 PID 1972 wrote to memory of 1888 1972 cmd.exe 28 PID 1972 wrote to memory of 1888 1972 cmd.exe 28 PID 1972 wrote to memory of 1888 1972 cmd.exe 28 PID 2028 wrote to memory of 1892 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 32 PID 2028 wrote to memory of 1892 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 32 PID 2028 wrote to memory of 1892 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 32 PID 2028 wrote to memory of 1892 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 32 PID 1892 wrote to memory of 2000 1892 cmd.exe 34 PID 1892 wrote to memory of 2000 1892 cmd.exe 34 PID 1892 wrote to memory of 2000 1892 cmd.exe 34 PID 1892 wrote to memory of 2000 1892 cmd.exe 34 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35 PID 2028 wrote to memory of 1500 2028 7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c timeout 42⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:1888
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2000
-
-
-
C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"C:\Users\Admin\AppData\Local\Temp\7fc9d4a00d0a1482b4b320feb5bed172f354c48705caae9d52db720ce7d98d84.exe"2⤵PID:1500
-