Analysis
-
max time kernel
50s -
max time network
76s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
15-07-2022 06:11
Static task
static1
General
-
Target
77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013.exe
-
Size
357KB
-
MD5
60580df56a0acf9033a460559bd5330b
-
SHA1
5414b1e9da7a8009afaf982b94c5c044a508646d
-
SHA256
77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013
-
SHA512
11441237d7536ed0ceaa4ff4457410973261b12d2bcdee70228918b01d97c960f2507a6dcf3e17ae3ab31a0cd3aa421925063818d7a3195ecf9859863ff25600
Malware Config
Signatures
-
Taurus Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3940-138-0x0000000000400000-0x0000000000486000-memory.dmp family_taurus_stealer behavioral1/memory/3940-136-0x00000000001C0000-0x00000000001F8000-memory.dmp family_taurus_stealer behavioral1/memory/3940-179-0x0000000000400000-0x0000000000486000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2424 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013.execmd.exedescription pid process target process PID 3940 wrote to memory of 2204 3940 77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013.exe cmd.exe PID 3940 wrote to memory of 2204 3940 77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013.exe cmd.exe PID 3940 wrote to memory of 2204 3940 77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013.exe cmd.exe PID 2204 wrote to memory of 2424 2204 cmd.exe timeout.exe PID 2204 wrote to memory of 2424 2204 cmd.exe timeout.exe PID 2204 wrote to memory of 2424 2204 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013.exe"C:\Users\Admin\AppData\Local\Temp\77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\77d58783013a7d18f57937c53e5ac21840df059a8119b47c5c68dbc3a4809013.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:2424
-
-