Analysis
-
max time kernel
173s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-05-2022 02:30
Static task
static1
Behavioral task
behavioral1
Sample
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe
Resource
win7-20220414-en
General
-
Target
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe
-
Size
506KB
-
MD5
71e7ec27f96d797f970ea15fd53f5ff9
-
SHA1
86fc93933a3764493aad680d4d1850a01999cc8e
-
SHA256
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889
-
SHA512
d5818a30a81946e56e73b60d84463237e71ce9ec0e059a0e01aa4947b90b208f523ce6b48b6ee8763c6babd79a0f0f285fa84567b60c66c68ce437c108ac52f0
Malware Config
Signatures
-
Taurus Stealer Payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1816-62-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1816-63-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1816-60-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1816-68-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1816-66-0x000000000041C9FC-mapping.dmp family_taurus_stealer behavioral1/memory/1816-65-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1816-70-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1292 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exedescription pid process target process PID 1476 set thread context of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1976 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exedescription pid process Token: SeDebugPrivilege 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.execmd.exedescription pid process target process PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1476 wrote to memory of 1816 1476 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 1816 wrote to memory of 1292 1816 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe cmd.exe PID 1816 wrote to memory of 1292 1816 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe cmd.exe PID 1816 wrote to memory of 1292 1816 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe cmd.exe PID 1816 wrote to memory of 1292 1816 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe cmd.exe PID 1292 wrote to memory of 1976 1292 cmd.exe timeout.exe PID 1292 wrote to memory of 1976 1292 cmd.exe timeout.exe PID 1292 wrote to memory of 1976 1292 cmd.exe timeout.exe PID 1292 wrote to memory of 1976 1292 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe"C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe"C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:1976
-
-
-