Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 10:02
Behavioral task
behavioral1
Sample
bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe
Resource
win7-20220812-en
General
-
Target
bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe
-
Size
1.7MB
-
MD5
a4626ce09b592d661c3a053cffbbbbbf
-
SHA1
9210bac9eccce0b73afbeec21bce029fa873d024
-
SHA256
bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618
-
SHA512
99a0844367530a9be796c99d86fbf234dec9390b0c580b5303fd8cc9c0fd02ce7661a4f111c2652d3b3b26e6a1354bb6ef78119960066e27cc311d932975ced0
-
SSDEEP
49152:wLMHj1x0js2+7Z285wh2BOi3LaKLWaejEA:wAHjH0FKZ22wEwi3LPaa
Malware Config
Signatures
-
Taurus Stealer payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1724-55-0x00000000008A0000-0x0000000000CA5000-memory.dmp family_taurus_stealer behavioral1/memory/1724-56-0x00000000008A0000-0x0000000000CA5000-memory.dmp family_taurus_stealer behavioral1/memory/1724-57-0x00000000008A0000-0x0000000000CA5000-memory.dmp family_taurus_stealer behavioral1/memory/1724-58-0x00000000008A0000-0x0000000000CA5000-memory.dmp family_taurus_stealer behavioral1/memory/1724-59-0x00000000008A0000-0x0000000000CA5000-memory.dmp family_taurus_stealer behavioral1/memory/1724-60-0x0000000076E90000-0x0000000077010000-memory.dmp family_taurus_stealer behavioral1/memory/1724-61-0x00000000008A0000-0x0000000000CA5000-memory.dmp family_taurus_stealer behavioral1/memory/1724-64-0x00000000008A0000-0x0000000000CA5000-memory.dmp family_taurus_stealer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1076 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1724-55-0x00000000008A0000-0x0000000000CA5000-memory.dmp themida behavioral1/memory/1724-56-0x00000000008A0000-0x0000000000CA5000-memory.dmp themida behavioral1/memory/1724-57-0x00000000008A0000-0x0000000000CA5000-memory.dmp themida behavioral1/memory/1724-58-0x00000000008A0000-0x0000000000CA5000-memory.dmp themida behavioral1/memory/1724-59-0x00000000008A0000-0x0000000000CA5000-memory.dmp themida behavioral1/memory/1724-60-0x0000000076E90000-0x0000000077010000-memory.dmp themida behavioral1/memory/1724-61-0x00000000008A0000-0x0000000000CA5000-memory.dmp themida behavioral1/memory/1724-64-0x00000000008A0000-0x0000000000CA5000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exepid process 1724 bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1680 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.execmd.exedescription pid process target process PID 1724 wrote to memory of 1076 1724 bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe cmd.exe PID 1724 wrote to memory of 1076 1724 bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe cmd.exe PID 1724 wrote to memory of 1076 1724 bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe cmd.exe PID 1724 wrote to memory of 1076 1724 bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe cmd.exe PID 1076 wrote to memory of 1680 1076 cmd.exe timeout.exe PID 1076 wrote to memory of 1680 1076 cmd.exe timeout.exe PID 1076 wrote to memory of 1680 1076 cmd.exe timeout.exe PID 1076 wrote to memory of 1680 1076 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe"C:\Users\Admin\AppData\Local\Temp\bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\bf4a76c73c784edff7a499cdc5284f6a6e5d0e4ae6074097feaa5e9b086ee618.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1680
-
-