Analysis
-
max time kernel
96s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 15:51
Static task
static1
Behavioral task
behavioral1
Sample
bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673.exe
-
Size
324KB
-
MD5
8518c709d0e64df3e63585cfcd33babf
-
SHA1
dc16e4941ce319e715ccc2f2d24289288f8f1596
-
SHA256
bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673
-
SHA512
26d8ce100a421a1b644db72025a7b974d2e22d775200e213a4ed28892e2c968d704f07df343316850c5d358720b25583733b2c72e8b2bef5e84c303944bbe34a
Malware Config
Signatures
-
Taurus Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/2136-130-0x0000000000F00000-0x0000000000F37000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
pid Process 4880 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4400 2136 bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673.exe 82 PID 2136 wrote to memory of 4400 2136 bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673.exe 82 PID 2136 wrote to memory of 4400 2136 bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673.exe 82 PID 4400 wrote to memory of 4880 4400 cmd.exe 84 PID 4400 wrote to memory of 4880 4400 cmd.exe 84 PID 4400 wrote to memory of 4880 4400 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673.exe"C:\Users\Admin\AppData\Local\Temp\bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\bcc1140c693034f8d9683d4cb0943b72566985b89c4f080c4f953317a9f79673.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:4880
-
-