Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 16:53
Static task
static1
Behavioral task
behavioral1
Sample
0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe
Resource
win7-20220414-en
General
-
Target
0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe
-
Size
314KB
-
MD5
8391150bd1e9ee175e448aa45b58414f
-
SHA1
0e4aff0bc949292f5500539a655e684f22c9953a
-
SHA256
0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0
-
SHA512
1f3c19b3f635f7836bccc0eecffbb94f385acafdbb47b93201a63c73b906f223fa59bc5a4b5ba9ecb9d9b06085f80479341bc84aa9df6941dd5ae451c4476961
Malware Config
Signatures
-
Taurus Stealer payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/960-55-0x0000000000400000-0x00000000047D0000-memory.dmp family_taurus_stealer behavioral1/memory/960-57-0x0000000000250000-0x0000000000286000-memory.dmp family_taurus_stealer behavioral1/memory/960-58-0x0000000000400000-0x00000000047D0000-memory.dmp family_taurus_stealer behavioral1/memory/960-59-0x0000000000400000-0x00000000047D0000-memory.dmp family_taurus_stealer behavioral1/memory/960-62-0x0000000000400000-0x00000000047D0000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 864 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1624 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.execmd.exedescription pid process target process PID 960 wrote to memory of 864 960 0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe cmd.exe PID 960 wrote to memory of 864 960 0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe cmd.exe PID 960 wrote to memory of 864 960 0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe cmd.exe PID 960 wrote to memory of 864 960 0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe cmd.exe PID 864 wrote to memory of 1624 864 cmd.exe timeout.exe PID 864 wrote to memory of 1624 864 cmd.exe timeout.exe PID 864 wrote to memory of 1624 864 cmd.exe timeout.exe PID 864 wrote to memory of 1624 864 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe"C:\Users\Admin\AppData\Local\Temp\0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\0c70017cfb5a22479524853245888f9ed16de11134079af2c47acaff0af86af0.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1624
-
-