Analysis
-
max time kernel
155s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-05-2022 16:24
Static task
static1
Behavioral task
behavioral1
Sample
49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe
-
Size
344KB
-
MD5
b3fad346307496a5c2bae39e984e77bd
-
SHA1
5d291bb4318d74ab00ee818bb43f5b91d6ca84cc
-
SHA256
49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701
-
SHA512
f04c16fc0208f37af50d9c9f991beff799fca269cabd5c8d188e15cdf7b3bf90c0eac11e6478d92d0b07e8ab3fdb02a0008e916aa8eee3f6b98925a57258ddb2
Malware Config
Signatures
-
Taurus Stealer Payload 2 IoCs
resource yara_rule behavioral2/memory/3380-132-0x0000000000400000-0x00000000004FC000-memory.dmp family_taurus_stealer behavioral2/memory/3380-131-0x0000000000670000-0x00000000006A5000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4292 3380 WerFault.exe 79 -
Delays execution with timeout.exe 1 IoCs
pid Process 4136 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4816 3380 49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe 80 PID 3380 wrote to memory of 4816 3380 49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe 80 PID 3380 wrote to memory of 4816 3380 49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe 80 PID 4816 wrote to memory of 4136 4816 cmd.exe 84 PID 4816 wrote to memory of 4136 4816 cmd.exe 84 PID 4816 wrote to memory of 4136 4816 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe"C:\Users\Admin\AppData\Local\Temp\49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\49dd1543bfee5615840f41c345db942cc0e8ed457a2aaaf9c2675aaf72872701.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:4136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 19322⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3380 -ip 33801⤵PID:5004