Analysis
-
max time kernel
202s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 00:59
Static task
static1
Behavioral task
behavioral1
Sample
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe
Resource
win7-20220414-en
General
-
Target
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe
-
Size
787KB
-
MD5
73485f0a753288ff5f7b4a62ecbf051d
-
SHA1
cf9e21945490fb9a64d5414d0683da0b770059b0
-
SHA256
3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4
-
SHA512
ecd43dd38927343c458f10ef5fa560560f73f59faf7fcf0708ea8422c1551539a3aa781342f24bdeb83fb47b9c13e06eb7e1e546a845783ec3b7a16bd97ecf70
Malware Config
Signatures
-
Taurus Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/2228-131-0x00000000002F0000-0x00000000004AB000-memory.dmp family_taurus_stealer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2228 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4656 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe 2228 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3148 2228 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe 87 PID 2228 wrote to memory of 3148 2228 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe 87 PID 2228 wrote to memory of 3148 2228 3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe 87 PID 3148 wrote to memory of 4656 3148 cmd.exe 90 PID 3148 wrote to memory of 4656 3148 cmd.exe 90 PID 3148 wrote to memory of 4656 3148 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe"C:\Users\Admin\AppData\Local\Temp\3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\3b8d8d08318bddad928f55c81d4f0d7e7188ce9658e25110f4e0d3e74256d8a4.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:4656
-
-