Analysis
-
max time kernel
99s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 07:26
Static task
static1
Behavioral task
behavioral1
Sample
c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe
Resource
win7-20220414-en
General
-
Target
c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe
-
Size
364KB
-
MD5
dcaaf7e60681293bfff9b059201e4199
-
SHA1
44756b74511fb39fa32a90a0e7981f254ed576c8
-
SHA256
c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41
-
SHA512
4ab6987a27f21cea6e776741831fc3100c365d8f919647094e53f4925eeed05d5f6838f61ff5da29f33c6b89d939c7a4a1b29f8e4d30bc2ebc888d3ba2763aa9
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1636-56-0x0000000000500000-0x0000000000535000-memory.dmp family_taurus_stealer behavioral1/memory/1636-57-0x0000000000400000-0x00000000004FF000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 572 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 748 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.execmd.exedescription pid process target process PID 1636 wrote to memory of 572 1636 c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe cmd.exe PID 1636 wrote to memory of 572 1636 c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe cmd.exe PID 1636 wrote to memory of 572 1636 c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe cmd.exe PID 1636 wrote to memory of 572 1636 c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe cmd.exe PID 572 wrote to memory of 748 572 cmd.exe timeout.exe PID 572 wrote to memory of 748 572 cmd.exe timeout.exe PID 572 wrote to memory of 748 572 cmd.exe timeout.exe PID 572 wrote to memory of 748 572 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe"C:\Users\Admin\AppData\Local\Temp\c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:748
-
-