Analysis
-
max time kernel
45s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 19:01
Static task
static1
Behavioral task
behavioral1
Sample
59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7.exe
-
Size
258KB
-
MD5
e57729bd7827e80b2603bee3b1616770
-
SHA1
30cb7e60ed49b060b5965e6a4dd7f71ec31b1e07
-
SHA256
59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7
-
SHA512
2980cb69f488f6a157498039bab7833b1ef18b6212dd7f05945a6db54159bc43aa0d3c0c11a994b34d96ce7861d4adfea3b38d4fe2b6b8d8625c643d1224a6e7
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1352-56-0x0000000000220000-0x0000000000256000-memory.dmp family_taurus_stealer behavioral1/memory/1352-57-0x0000000000400000-0x0000000004D98000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
pid Process 1780 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
pid Process 428 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1780 1352 59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7.exe 29 PID 1352 wrote to memory of 1780 1352 59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7.exe 29 PID 1352 wrote to memory of 1780 1352 59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7.exe 29 PID 1352 wrote to memory of 1780 1352 59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7.exe 29 PID 1780 wrote to memory of 428 1780 cmd.exe 31 PID 1780 wrote to memory of 428 1780 cmd.exe 31 PID 1780 wrote to memory of 428 1780 cmd.exe 31 PID 1780 wrote to memory of 428 1780 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7.exe"C:\Users\Admin\AppData\Local\Temp\59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\59ea8628f8db0acac2af2c00525b3aea9007c00336747f95516d3b7f475631a7.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:428
-
-