Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 04:02
Static task
static1
Behavioral task
behavioral1
Sample
1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe
-
Size
2.2MB
-
MD5
a8db0614d948db39b865c1efa5d9eabc
-
SHA1
4f9561138254cbbde7b8f5a0bf1798d3c2a10bda
-
SHA256
1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c
-
SHA512
0641650fef34bdfc9de12ab1c02c12cf0e9d30eb1e525cf60eec5c0470614b6d7b7203c58761ba11338fd461570b6ab49e4d63e90b4f9270ee8eb142c4319a70
Malware Config
Signatures
-
Taurus Stealer Payload 7 IoCs
resource yara_rule behavioral1/memory/1720-60-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1720-62-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1720-63-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1720-65-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1720-66-0x000000000041C8D1-mapping.dmp family_taurus_stealer behavioral1/memory/1720-68-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1720-70-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
pid Process 1912 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1012 set thread context of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 -
Delays execution with timeout.exe 1 IoCs
pid Process 1492 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1012 wrote to memory of 1720 1012 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 28 PID 1720 wrote to memory of 1912 1720 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 34 PID 1720 wrote to memory of 1912 1720 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 34 PID 1720 wrote to memory of 1912 1720 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 34 PID 1720 wrote to memory of 1912 1720 1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe 34 PID 1912 wrote to memory of 1492 1912 cmd.exe 36 PID 1912 wrote to memory of 1492 1912 cmd.exe 36 PID 1912 wrote to memory of 1492 1912 cmd.exe 36 PID 1912 wrote to memory of 1492 1912 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe"C:\Users\Admin\AppData\Local\Temp\1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe"C:\Users\Admin\AppData\Local\Temp\1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\1a2d0633e0273b5a9583a6e7673651d24aea85545793d804a6d4f692fcda325c.exe3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:1492
-
-
-