Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 07:03
Static task
static1
Behavioral task
behavioral1
Sample
5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe
Resource
win7-20220414-en
General
-
Target
5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe
-
Size
331KB
-
MD5
61353e0ab916788ac8343dc97b773c92
-
SHA1
b81bad475d327b60b80228c9f41b2c4b2abab81f
-
SHA256
5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07
-
SHA512
9e9403f711739960afc048e45a8b234be149dd50df74912b5f3c89af2c775a4b9c1f0efb59794baefc1c5d738bda0569d1f2fb12094766968fce951a0983f249
Malware Config
Signatures
-
Taurus Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1972-55-0x0000000000400000-0x0000000004DB8000-memory.dmp family_taurus_stealer behavioral1/memory/1972-57-0x00000000002A0000-0x00000000002D6000-memory.dmp family_taurus_stealer behavioral1/memory/1972-60-0x0000000000400000-0x0000000004DB8000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1892 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1076 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.execmd.exedescription pid process target process PID 1972 wrote to memory of 1892 1972 5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe cmd.exe PID 1972 wrote to memory of 1892 1972 5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe cmd.exe PID 1972 wrote to memory of 1892 1972 5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe cmd.exe PID 1972 wrote to memory of 1892 1972 5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe cmd.exe PID 1892 wrote to memory of 1076 1892 cmd.exe timeout.exe PID 1892 wrote to memory of 1076 1892 cmd.exe timeout.exe PID 1892 wrote to memory of 1076 1892 cmd.exe timeout.exe PID 1892 wrote to memory of 1076 1892 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe"C:\Users\Admin\AppData\Local\Temp\5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1076
-
-