Analysis
-
max time kernel
132s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 15:25
Static task
static1
Behavioral task
behavioral1
Sample
acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe
-
Size
571KB
-
MD5
3b162f81c028a43f6b00e69043fdb295
-
SHA1
9f057b9561b55d8b81db0b4de8239791ea043349
-
SHA256
acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73
-
SHA512
029430b4f59b4be230b91615b2439f4e51233d1d9ac3c3bcff61982cbd98ffead3d089d8c093427ee9b7b6a3442152611e335aa704b8f3caa54e995bb00cdea9
Malware Config
Signatures
-
Taurus Stealer Payload 7 IoCs
resource yara_rule behavioral1/memory/1396-63-0x0000000000080000-0x00000000000B7000-memory.dmp family_taurus_stealer behavioral1/memory/1396-65-0x0000000000080000-0x00000000000B7000-memory.dmp family_taurus_stealer behavioral1/memory/1396-66-0x0000000000080000-0x00000000000B7000-memory.dmp family_taurus_stealer behavioral1/memory/1396-69-0x000000000041CC9E-mapping.dmp family_taurus_stealer behavioral1/memory/1396-70-0x0000000000080000-0x00000000000B7000-memory.dmp family_taurus_stealer behavioral1/memory/1396-73-0x0000000000080000-0x00000000000B7000-memory.dmp family_taurus_stealer behavioral1/memory/1396-76-0x0000000000080000-0x00000000000B7000-memory.dmp family_taurus_stealer -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1972 set thread context of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 -
Program crash 1 IoCs
pid pid_target Process procid_target 684 1972 WerFault.exe 19 -
Delays execution with timeout.exe 1 IoCs
pid Process 364 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 1396 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 27 PID 1972 wrote to memory of 684 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 30 PID 1972 wrote to memory of 684 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 30 PID 1972 wrote to memory of 684 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 30 PID 1972 wrote to memory of 684 1972 acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe 30 PID 1396 wrote to memory of 1488 1396 mscorsvw.exe 31 PID 1396 wrote to memory of 1488 1396 mscorsvw.exe 31 PID 1396 wrote to memory of 1488 1396 mscorsvw.exe 31 PID 1396 wrote to memory of 1488 1396 mscorsvw.exe 31 PID 1488 wrote to memory of 364 1488 cmd.exe 33 PID 1488 wrote to memory of 364 1488 cmd.exe 33 PID 1488 wrote to memory of 364 1488 cmd.exe 33 PID 1488 wrote to memory of 364 1488 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe"C:\Users\Admin\AppData\Local\Temp\acfb70e071355b050c3d3ad4e99c760b922d0ce85930b1d92403186c540d7d73.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:364
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 17682⤵
- Program crash
PID:684
-