Analysis
-
max time kernel
131s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 02:30
Static task
static1
Behavioral task
behavioral1
Sample
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe
Resource
win7-20220414-en
General
-
Target
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe
-
Size
506KB
-
MD5
71e7ec27f96d797f970ea15fd53f5ff9
-
SHA1
86fc93933a3764493aad680d4d1850a01999cc8e
-
SHA256
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889
-
SHA512
d5818a30a81946e56e73b60d84463237e71ce9ec0e059a0e01aa4947b90b208f523ce6b48b6ee8763c6babd79a0f0f285fa84567b60c66c68ce437c108ac52f0
Malware Config
Signatures
-
Taurus Stealer Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3840-132-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral2/memory/3840-133-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral2/memory/3840-134-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral2/memory/3840-135-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exedescription pid process target process PID 4124 set thread context of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3604 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exedescription pid process Token: SeDebugPrivilege 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.execmd.exedescription pid process target process PID 4124 wrote to memory of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 4124 wrote to memory of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 4124 wrote to memory of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 4124 wrote to memory of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 4124 wrote to memory of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 4124 wrote to memory of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 4124 wrote to memory of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 4124 wrote to memory of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 4124 wrote to memory of 3840 4124 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe PID 3840 wrote to memory of 2432 3840 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe cmd.exe PID 3840 wrote to memory of 2432 3840 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe cmd.exe PID 3840 wrote to memory of 2432 3840 9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe cmd.exe PID 2432 wrote to memory of 3604 2432 cmd.exe timeout.exe PID 2432 wrote to memory of 3604 2432 cmd.exe timeout.exe PID 2432 wrote to memory of 3604 2432 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe"C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe"C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\9c602b2b5991e9b964c863fdec27a4a0e9d8e13ad6e2a1aa27a716a1fed42889.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:3604
-
-
-