Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 23:36
Static task
static1
Behavioral task
behavioral1
Sample
7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe
Resource
win7-20220414-en
General
-
Target
7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe
-
Size
393KB
-
MD5
be689e507b251c23e0a5cb1b222f9f1f
-
SHA1
3c5725ccf1618c3e7fbd7eca4984f4ad2d7b4769
-
SHA256
7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e
-
SHA512
d8f158152090c5b278abe8f85e151fdbcfe6ddd9d309df0d934b699e5693e32c1881fded7d784001cf416fab00d4d7565a0fb2db9bfc6679d698f0afcd1e1e89
Malware Config
Signatures
-
Taurus Stealer Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3160-131-0x0000000000400000-0x0000000000466000-memory.dmp family_taurus_stealer -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.execmd.exedescription pid process target process PID 3160 wrote to memory of 4884 3160 7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe cmd.exe PID 3160 wrote to memory of 4884 3160 7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe cmd.exe PID 3160 wrote to memory of 4884 3160 7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe cmd.exe PID 4884 wrote to memory of 4352 4884 cmd.exe PING.EXE PID 4884 wrote to memory of 4352 4884 cmd.exe PING.EXE PID 4884 wrote to memory of 4352 4884 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe"C:\Users\Admin\AppData\Local\Temp\7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping google.com && erase C:\Users\Admin\AppData\Local\Temp\7696dc4cf76ec19ea14c00e31269a2caabc64c49e3c33e98ab14bb09783bc74e.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\PING.EXEping google.com3⤵
- Runs ping.exe
PID:4352
-
-