Analysis
-
max time kernel
91s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 07:03
Static task
static1
Behavioral task
behavioral1
Sample
5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe
Resource
win7-20220414-en
General
-
Target
5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe
-
Size
331KB
-
MD5
61353e0ab916788ac8343dc97b773c92
-
SHA1
b81bad475d327b60b80228c9f41b2c4b2abab81f
-
SHA256
5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07
-
SHA512
9e9403f711739960afc048e45a8b234be149dd50df74912b5f3c89af2c775a4b9c1f0efb59794baefc1c5d738bda0569d1f2fb12094766968fce951a0983f249
Malware Config
Signatures
-
Taurus Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3124-131-0x00000000001C0000-0x00000000001F6000-memory.dmp family_taurus_stealer behavioral2/memory/3124-132-0x0000000000400000-0x0000000004DB8000-memory.dmp family_taurus_stealer behavioral2/memory/3124-137-0x0000000000400000-0x0000000004DB8000-memory.dmp family_taurus_stealer -
Processes:
resource yara_rule behavioral2/memory/3124-130-0x0000000000400000-0x0000000004DB8000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4364 3124 WerFault.exe 5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4312 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.execmd.exedescription pid process target process PID 3124 wrote to memory of 5060 3124 5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe cmd.exe PID 3124 wrote to memory of 5060 3124 5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe cmd.exe PID 3124 wrote to memory of 5060 3124 5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe cmd.exe PID 5060 wrote to memory of 4312 5060 cmd.exe timeout.exe PID 5060 wrote to memory of 4312 5060 cmd.exe timeout.exe PID 5060 wrote to memory of 4312 5060 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe"C:\Users\Admin\AppData\Local\Temp\5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\5b4a80afd50b793ceb6058b9e1595b3835b660fbce20299a878a4bd19b276e07.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:4312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 13042⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3124 -ip 31241⤵PID:1840