Analysis
-
max time kernel
155s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-05-2022 16:24
Static task
static1
Behavioral task
behavioral1
Sample
49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe
Resource
win7-20220414-en
General
-
Target
49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe
-
Size
344KB
-
MD5
b3fad346307496a5c2bae39e984e77bd
-
SHA1
5d291bb4318d74ab00ee818bb43f5b91d6ca84cc
-
SHA256
49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701
-
SHA512
f04c16fc0208f37af50d9c9f991beff799fca269cabd5c8d188e15cdf7b3bf90c0eac11e6478d92d0b07e8ab3fdb02a0008e916aa8eee3f6b98925a57258ddb2
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3380-132-0x0000000000400000-0x00000000004FC000-memory.dmp family_taurus_stealer behavioral2/memory/3380-131-0x0000000000670000-0x00000000006A5000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4292 3380 WerFault.exe 49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4136 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.execmd.exedescription pid process target process PID 3380 wrote to memory of 4816 3380 49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe cmd.exe PID 3380 wrote to memory of 4816 3380 49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe cmd.exe PID 3380 wrote to memory of 4816 3380 49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe cmd.exe PID 4816 wrote to memory of 4136 4816 cmd.exe timeout.exe PID 4816 wrote to memory of 4136 4816 cmd.exe timeout.exe PID 4816 wrote to memory of 4136 4816 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe"C:\Users\Admin\AppData\Local\Temp\49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:4136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 19322⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3380 -ip 33801⤵PID:5004