Analysis
-
max time kernel
123s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 07:33
Static task
static1
Behavioral task
behavioral1
Sample
11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe
Resource
win7-20220414-en
General
-
Target
11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe
-
Size
434KB
-
MD5
efb61fa61dbec5252ddefef9d91d30be
-
SHA1
e36c298cd6fce8554737a623f65b8ea2051ff750
-
SHA256
11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528
-
SHA512
b3d8aa251b330103cb5bc39ead6d8bbb09a104373b7bb12e90820c174317828792087b5afef7892598a6d0e5870be6ff63ec3b6d3f3967196117328baf9f1e50
Malware Config
Signatures
-
Taurus Stealer payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2012-66-0x0000000000240000-0x0000000000276000-memory.dmp family_taurus_stealer behavioral1/memory/2012-69-0x0000000000400000-0x00000000047D3000-memory.dmp family_taurus_stealer behavioral1/memory/2012-70-0x0000000000240000-0x0000000000276000-memory.dmp family_taurus_stealer behavioral1/memory/2012-71-0x0000000000400000-0x00000000047D3000-memory.dmp family_taurus_stealer behavioral1/memory/2012-74-0x0000000000400000-0x00000000047D3000-memory.dmp family_taurus_stealer -
Processes:
resource yara_rule behavioral1/memory/2008-56-0x0000000000400000-0x0000000004DC7000-memory.dmp upx behavioral1/memory/2012-55-0x0000000000400000-0x00000000047D3000-memory.dmp upx behavioral1/memory/2008-62-0x0000000000400000-0x0000000004DC7000-memory.dmp upx behavioral1/memory/2012-63-0x0000000000400000-0x00000000047D3000-memory.dmp upx behavioral1/memory/2012-64-0x0000000000400000-0x00000000047D3000-memory.dmp upx behavioral1/memory/2012-65-0x0000000000400000-0x00000000047D3000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2036 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exedescription pid process target process PID 2008 set thread context of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 992 timeout.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.execmd.exedescription pid process target process PID 2008 wrote to memory of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe PID 2008 wrote to memory of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe PID 2008 wrote to memory of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe PID 2008 wrote to memory of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe PID 2008 wrote to memory of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe PID 2008 wrote to memory of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe PID 2008 wrote to memory of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe PID 2008 wrote to memory of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe PID 2008 wrote to memory of 2012 2008 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe PID 2012 wrote to memory of 2036 2012 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe cmd.exe PID 2012 wrote to memory of 2036 2012 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe cmd.exe PID 2012 wrote to memory of 2036 2012 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe cmd.exe PID 2012 wrote to memory of 2036 2012 11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe cmd.exe PID 2036 wrote to memory of 992 2036 cmd.exe timeout.exe PID 2036 wrote to memory of 992 2036 cmd.exe timeout.exe PID 2036 wrote to memory of 992 2036 cmd.exe timeout.exe PID 2036 wrote to memory of 992 2036 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe"C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe"C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:992
-
-
-