Analysis
-
max time kernel
174s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 02:43
Static task
static1
Behavioral task
behavioral1
Sample
3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe
-
Size
561KB
-
MD5
f8150dbb66a9dd18903253fb1855ddbf
-
SHA1
705dacea137f1336a250388b719cc878af49ea91
-
SHA256
3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f
-
SHA512
9a8d6185d316757617f7433c8cc9e3ed74dabd1c08ee31fc01eb4d403eddafb9a6c228187e39641167e4913ca819da699393d80bcacd3a205ae823b7cc9bfc2b
Malware Config
Signatures
-
Taurus Stealer Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1652-134-0x0000000000400000-0x0000000000477000-memory.dmp family_taurus_stealer behavioral2/memory/1652-135-0x0000000000400000-0x0000000000477000-memory.dmp family_taurus_stealer behavioral2/memory/1652-136-0x0000000000400000-0x0000000000477000-memory.dmp family_taurus_stealer behavioral2/memory/1652-137-0x0000000000400000-0x0000000000477000-memory.dmp family_taurus_stealer -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exedescription pid process target process PID 4756 set thread context of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3196 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exepid process 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exedescription pid process Token: SeDebugPrivilege 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exeCasPol.execmd.exedescription pid process target process PID 4756 wrote to memory of 764 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 764 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 764 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 4756 wrote to memory of 1652 4756 3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe CasPol.exe PID 1652 wrote to memory of 2616 1652 CasPol.exe cmd.exe PID 1652 wrote to memory of 2616 1652 CasPol.exe cmd.exe PID 1652 wrote to memory of 2616 1652 CasPol.exe cmd.exe PID 2616 wrote to memory of 3196 2616 cmd.exe timeout.exe PID 2616 wrote to memory of 3196 2616 cmd.exe timeout.exe PID 2616 wrote to memory of 3196 2616 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe"C:\Users\Admin\AppData\Local\Temp\3cba12289fc819e20fef12301eedad1a3dd079dd93a7b866c814babd7fa4c33f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:764
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:3196
-
-
-