Analysis
-
max time kernel
146s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-04-2022 15:24
Static task
static1
Behavioral task
behavioral1
Sample
a91b3d9145212348534c3c034dbab63222a6c9f4486b91e9e2ed839a189be752.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
a91b3d9145212348534c3c034dbab63222a6c9f4486b91e9e2ed839a189be752.exe
-
Size
253KB
-
MD5
cec0e3b18affd7e948715d0e0800743e
-
SHA1
5661c94fc13b5ad409921fc04f01edf1073e12ee
-
SHA256
a91b3d9145212348534c3c034dbab63222a6c9f4486b91e9e2ed839a189be752
-
SHA512
259dfb416ac0a340bf3eb47c44e87668ff3a383a386e190c09bcd9b625f1254743c119dd037b3bfbdda862d5140c57a60b67df14eb3228c2535ef11adef858e3
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
resource yara_rule behavioral2/memory/4772-134-0x0000000004BF0000-0x0000000004C26000-memory.dmp family_taurus_stealer behavioral2/memory/4772-135-0x0000000000400000-0x0000000002FCA000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3048 4772 WerFault.exe 81 -
Delays execution with timeout.exe 1 IoCs
pid Process 1480 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4772 wrote to memory of 1656 4772 a91b3d9145212348534c3c034dbab63222a6c9f4486b91e9e2ed839a189be752.exe 91 PID 4772 wrote to memory of 1656 4772 a91b3d9145212348534c3c034dbab63222a6c9f4486b91e9e2ed839a189be752.exe 91 PID 4772 wrote to memory of 1656 4772 a91b3d9145212348534c3c034dbab63222a6c9f4486b91e9e2ed839a189be752.exe 91 PID 1656 wrote to memory of 1480 1656 cmd.exe 95 PID 1656 wrote to memory of 1480 1656 cmd.exe 95 PID 1656 wrote to memory of 1480 1656 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a91b3d9145212348534c3c034dbab63222a6c9f4486b91e9e2ed839a189be752.exe"C:\Users\Admin\AppData\Local\Temp\a91b3d9145212348534c3c034dbab63222a6c9f4486b91e9e2ed839a189be752.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\a91b3d9145212348534c3c034dbab63222a6c9f4486b91e9e2ed839a189be752.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 13562⤵
- Program crash
PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4772 -ip 47721⤵PID:1068