Analysis
-
max time kernel
53s -
max time network
74s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
15-07-2022 06:13
Static task
static1
General
-
Target
0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.exe
-
Size
344KB
-
MD5
8ae3e9c831721116174321d4edb76b42
-
SHA1
b21b1c681e8258fc6ddda02121171c0dbe85a6b9
-
SHA256
0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0
-
SHA512
50cfe6223a49aee036fece9ef4e44bbc31c3f2f510fb5cabdb5203a4f0332a2d0ec28561fe525c0dbe11deacafc20381feba7926aade00f426736c8d398d5b08
Malware Config
Signatures
-
Taurus Stealer payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2380-135-0x00000000001C0000-0x00000000001F8000-memory.dmp family_taurus_stealer behavioral1/memory/2380-168-0x0000000000400000-0x0000000000483000-memory.dmp family_taurus_stealer behavioral1/memory/2380-181-0x00000000001C0000-0x00000000001F8000-memory.dmp family_taurus_stealer behavioral1/memory/2380-179-0x0000000000400000-0x0000000000483000-memory.dmp family_taurus_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2328 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.execmd.exedescription pid process target process PID 2380 wrote to memory of 4296 2380 0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.exe cmd.exe PID 2380 wrote to memory of 4296 2380 0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.exe cmd.exe PID 2380 wrote to memory of 4296 2380 0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.exe cmd.exe PID 4296 wrote to memory of 2328 4296 cmd.exe timeout.exe PID 4296 wrote to memory of 2328 4296 cmd.exe timeout.exe PID 4296 wrote to memory of 2328 4296 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.exe"C:\Users\Admin\AppData\Local\Temp\0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\0b9f635e4fdcd604301232cbf99882303bded31ab572e692b688f10cac5677a0.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:2328
-
-