Analysis
-
max time kernel
155s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 07:26
Static task
static1
Behavioral task
behavioral1
Sample
c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe
Resource
win7-20220414-en
General
-
Target
c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe
-
Size
364KB
-
MD5
dcaaf7e60681293bfff9b059201e4199
-
SHA1
44756b74511fb39fa32a90a0e7981f254ed576c8
-
SHA256
c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41
-
SHA512
4ab6987a27f21cea6e776741831fc3100c365d8f919647094e53f4925eeed05d5f6838f61ff5da29f33c6b89d939c7a4a1b29f8e4d30bc2ebc888d3ba2763aa9
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1724-132-0x00000000020F0000-0x0000000002125000-memory.dmp family_taurus_stealer behavioral2/memory/1724-133-0x0000000000400000-0x00000000004FF000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4588 1724 WerFault.exe c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4856 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.execmd.exedescription pid process target process PID 1724 wrote to memory of 2668 1724 c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe cmd.exe PID 1724 wrote to memory of 2668 1724 c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe cmd.exe PID 1724 wrote to memory of 2668 1724 c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe cmd.exe PID 2668 wrote to memory of 4856 2668 cmd.exe timeout.exe PID 2668 wrote to memory of 4856 2668 cmd.exe timeout.exe PID 2668 wrote to memory of 4856 2668 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe"C:\Users\Admin\AppData\Local\Temp\c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\c9237f48fc92a85c6e5bb1820b41d940d2cd9237fe7812d4902c4e9ee7a1ec41.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:4856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 13282⤵
- Program crash
PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1724 -ip 17241⤵PID:4488