Analysis
-
max time kernel
95s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 00:00
Static task
static1
Behavioral task
behavioral1
Sample
7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe
-
Size
201KB
-
MD5
eb4c72c5d82142335c230eb4991c57e5
-
SHA1
07e29920a6c3ef51c21caa21cabf0d1dba95183c
-
SHA256
7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46
-
SHA512
17f38a0cc9836cb08b2c022af0bd28f6b4c5084afcd5bf46ceccc741f462854998421a9406b4d2cee4550ba2dd23baf41de2eb08b6705d74069de9b7ed35292b
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
resource yara_rule behavioral2/memory/1820-131-0x00000000001C0000-0x00000000001F5000-memory.dmp family_taurus_stealer behavioral2/memory/1820-132-0x0000000000400000-0x0000000000F8F000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1340 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2808 1820 7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe 85 PID 1820 wrote to memory of 2808 1820 7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe 85 PID 1820 wrote to memory of 2808 1820 7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe 85 PID 2808 wrote to memory of 1340 2808 cmd.exe 87 PID 2808 wrote to memory of 1340 2808 cmd.exe 87 PID 2808 wrote to memory of 1340 2808 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe"C:\Users\Admin\AppData\Local\Temp\7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\7dbd7913c8da967e42d276dca90aaff3725ea664f72e7a2de68750b430a3cc46.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1340
-
-