Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:36
Static task
static1
Behavioral task
behavioral1
Sample
7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe
Resource
win7-20220414-en
General
-
Target
7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe
-
Size
393KB
-
MD5
be689e507b251c23e0a5cb1b222f9f1f
-
SHA1
3c5725ccf1618c3e7fbd7eca4984f4ad2d7b4769
-
SHA256
7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e
-
SHA512
d8f158152090c5b278abe8f85e151fdbcfe6ddd9d309df0d934b699e5693e32c1881fded7d784001cf416fab00d4d7565a0fb2db9bfc6679d698f0afcd1e1e89
Malware Config
Signatures
-
Taurus Stealer Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1224-56-0x0000000000400000-0x0000000000466000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1184 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.execmd.exedescription pid process target process PID 1224 wrote to memory of 1184 1224 7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe cmd.exe PID 1224 wrote to memory of 1184 1224 7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe cmd.exe PID 1224 wrote to memory of 1184 1224 7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe cmd.exe PID 1224 wrote to memory of 1184 1224 7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe cmd.exe PID 1184 wrote to memory of 1108 1184 cmd.exe PING.EXE PID 1184 wrote to memory of 1108 1184 cmd.exe PING.EXE PID 1184 wrote to memory of 1108 1184 cmd.exe PING.EXE PID 1184 wrote to memory of 1108 1184 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe"C:\Users\Admin\AppData\Local\Temp\7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping google.com && erase C:\Users\Admin\AppData\Local\Temp\7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\PING.EXEping google.com3⤵
- Runs ping.exe
PID:1108
-
-