Analysis
-
max time kernel
158s -
max time network
215s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-05-2022 00:59
Static task
static1
Behavioral task
behavioral1
Sample
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe
Resource
win7-20220414-en
General
-
Target
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe
-
Size
787KB
-
MD5
73485f0a753288ff5f7b4a62ecbf051d
-
SHA1
cf9e21945490fb9a64d5414d0683da0b770059b0
-
SHA256
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4
-
SHA512
ecd43dd38927343c458f10ef5fa560560f73f59faf7fcf0708ea8422c1551539a3aa781342f24bdeb83fb47b9c13e06eb7e1e546a845783ec3b7a16bd97ecf70
Malware Config
Signatures
-
Taurus Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/1768-56-0x0000000001170000-0x000000000132B000-memory.dmp family_taurus_stealer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe -
Deletes itself 1 IoCs
pid Process 108 cmd.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1768 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1972 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1768 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1768 wrote to memory of 108 1768 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe 30 PID 1768 wrote to memory of 108 1768 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe 30 PID 1768 wrote to memory of 108 1768 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe 30 PID 1768 wrote to memory of 108 1768 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe 30 PID 108 wrote to memory of 1972 108 cmd.exe 31 PID 108 wrote to memory of 1972 108 cmd.exe 31 PID 108 wrote to memory of 1972 108 cmd.exe 31 PID 108 wrote to memory of 1972 108 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe"C:\Users\Admin\AppData\Local\Temp\3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1972
-
-