Analysis
-
max time kernel
14s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-04-2021 22:10
Static task
static1
Behavioral task
behavioral1
Sample
60580df56a0acf9033a460559bd5330b.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
60580df56a0acf9033a460559bd5330b.exe
-
Size
357KB
-
MD5
60580df56a0acf9033a460559bd5330b
-
SHA1
5414b1e9da7a8009afaf982b94c5c044a508646d
-
SHA256
77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013
-
SHA512
11441237d7536ed0ceaa4ff4457410973261b12d2bcdee70228918b01d97c960f2507a6dcf3e17ae3ab31a0cd3aa421925063818d7a3195ecf9859863ff25600
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 1104 created 2208 1104 WerFault.exe 32 -
Taurus Stealer Payload 2 IoCs
resource yara_rule behavioral2/memory/2208-114-0x00000000001C0000-0x00000000001F8000-memory.dmp family_taurus_stealer behavioral2/memory/2208-115-0x0000000000400000-0x0000000000486000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1104 2208 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1104 WerFault.exe Token: SeBackupPrivilege 1104 WerFault.exe Token: SeDebugPrivilege 1104 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60580df56a0acf9033a460559bd5330b.exe"C:\Users\Admin\AppData\Local\Temp\60580df56a0acf9033a460559bd5330b.exe"1⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 10762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-