Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 16:53
Static task
static1
Behavioral task
behavioral1
Sample
0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe
-
Size
314KB
-
MD5
8391150bd1e9ee175e448aa45b58414f
-
SHA1
0e4aff0bc949292f5500539a655e684f22c9953a
-
SHA256
0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0
-
SHA512
1f3c19b3f635f7836bccc0eecffbb94f385acafdbb47b93201a63c73b906f223fa59bc5a4b5ba9ecb9d9b06085f80479341bc84aa9df6941dd5ae451c4476961
Malware Config
Signatures
-
Taurus Stealer payload 5 IoCs
resource yara_rule behavioral1/memory/960-55-0x0000000000400000-0x00000000047D0000-memory.dmp family_taurus_stealer behavioral1/memory/960-57-0x0000000000250000-0x0000000000286000-memory.dmp family_taurus_stealer behavioral1/memory/960-58-0x0000000000400000-0x00000000047D0000-memory.dmp family_taurus_stealer behavioral1/memory/960-59-0x0000000000400000-0x00000000047D0000-memory.dmp family_taurus_stealer behavioral1/memory/960-62-0x0000000000400000-0x00000000047D0000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
pid Process 864 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1624 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 960 wrote to memory of 864 960 0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe 28 PID 960 wrote to memory of 864 960 0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe 28 PID 960 wrote to memory of 864 960 0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe 28 PID 960 wrote to memory of 864 960 0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe 28 PID 864 wrote to memory of 1624 864 cmd.exe 30 PID 864 wrote to memory of 1624 864 cmd.exe 30 PID 864 wrote to memory of 1624 864 cmd.exe 30 PID 864 wrote to memory of 1624 864 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe"C:\Users\Admin\AppData\Local\Temp\0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1624
-
-