Analysis

  • max time kernel
    149s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 07:33

General

  • Target

    11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe

  • Size

    434KB

  • MD5

    efb61fa61dbec5252ddefef9d91d30be

  • SHA1

    e36c298cd6fce8554737a623f65b8ea2051ff750

  • SHA256

    11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528

  • SHA512

    b3d8aa251b330103cb5bc39ead6d8bbb09a104373b7bb12e90820c174317828792087b5afef7892598a6d0e5870be6ff63ec3b6d3f3967196117328baf9f1e50

Malware Config

Signatures

  • Taurus Stealer

    Taurus is an infostealer first seen in June 2020.

  • Taurus Stealer payload 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe
    "C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe
      "C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Windows\SysWOW64\cmd.exe
        /c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\11652a522645a5127f7d5a2e8e9acef96cdb89fd4cc649752da37381d70b9528.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 3
          4⤵
          • Delays execution with timeout.exe
          PID:3328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 1284
        3⤵
        • Program crash
        PID:4580
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2516 -ip 2516
    1⤵
      PID:4596

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2516-139-0x0000000000400000-0x00000000047D3000-memory.dmp
      Filesize

      67.8MB

    • memory/2516-142-0x0000000004C60000-0x0000000004C96000-memory.dmp
      Filesize

      216KB

    • memory/2516-146-0x0000000000400000-0x00000000047D3000-memory.dmp
      Filesize

      67.8MB

    • memory/2516-133-0x0000000000000000-mapping.dmp
    • memory/2516-136-0x0000000000400000-0x00000000047D3000-memory.dmp
      Filesize

      67.8MB

    • memory/2516-143-0x0000000000400000-0x00000000047D3000-memory.dmp
      Filesize

      67.8MB

    • memory/2516-141-0x0000000004C40000-0x0000000004C60000-memory.dmp
      Filesize

      128KB

    • memory/2516-134-0x0000000000400000-0x00000000047D3000-memory.dmp
      Filesize

      67.8MB

    • memory/2516-140-0x0000000000400000-0x00000000047D3000-memory.dmp
      Filesize

      67.8MB

    • memory/3328-145-0x0000000000000000-mapping.dmp
    • memory/4456-130-0x0000000000400000-0x0000000004DC7000-memory.dmp
      Filesize

      73.8MB

    • memory/4456-138-0x0000000004E79000-0x0000000004EB5000-memory.dmp
      Filesize

      240KB

    • memory/4456-131-0x0000000004E79000-0x0000000004EB5000-memory.dmp
      Filesize

      240KB

    • memory/4456-137-0x0000000000400000-0x0000000004DC7000-memory.dmp
      Filesize

      73.8MB

    • memory/4456-132-0x0000000005230000-0x0000000005282000-memory.dmp
      Filesize

      328KB

    • memory/4492-144-0x0000000000000000-mapping.dmp