Analysis
-
max time kernel
76s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 00:00
Static task
static1
Behavioral task
behavioral1
Sample
7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe
-
Size
201KB
-
MD5
eb4c72c5d82142335c230eb4991c57e5
-
SHA1
07e29920a6c3ef51c21caa21cabf0d1dba95183c
-
SHA256
7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46
-
SHA512
17f38a0cc9836cb08b2c022af0bd28f6b4c5084afcd5bf46ceccc741f462854998421a9406b4d2cee4550ba2dd23baf41de2eb08b6705d74069de9b7ed35292b
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1788-57-0x0000000000220000-0x0000000000255000-memory.dmp family_taurus_stealer behavioral1/memory/1788-58-0x0000000000400000-0x0000000000F8F000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
pid Process 1940 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
pid Process 852 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1940 1788 7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe 32 PID 1788 wrote to memory of 1940 1788 7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe 32 PID 1788 wrote to memory of 1940 1788 7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe 32 PID 1788 wrote to memory of 1940 1788 7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe 32 PID 1940 wrote to memory of 852 1940 cmd.exe 34 PID 1940 wrote to memory of 852 1940 cmd.exe 34 PID 1940 wrote to memory of 852 1940 cmd.exe 34 PID 1940 wrote to memory of 852 1940 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe"C:\Users\Admin\AppData\Local\Temp\7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:852
-
-