Analysis
-
max time kernel
44s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe
Resource
win7-20221111-en
7 signatures
150 seconds
General
-
Target
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe
-
Size
1.4MB
-
MD5
c28072106a3941932130c8db2a135555
-
SHA1
cc2aaeafa62ea06e5b07808f15a5263e04906e53
-
SHA256
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc
-
SHA512
0c3083f190c8a0d82340f6a3d0f64f76eb938e93d3070cf7ccd75aa501b58040b5b26ba57e1e5a5bd5d69bff07558733f68dfc00c50473842bdda9f9f7281b56
-
SSDEEP
12288:6Zzp1NI5x7k3+rcAT8U6x+3JYU82+/IvIh/QnviN9VzdvYhvb:6Zzp1YdkoUU82+Qwh/Qn89Vx
Malware Config
Signatures
-
Taurus Stealer payload 6 IoCs
resource yara_rule behavioral1/memory/1188-57-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1188-58-0x000000000041CD22-mapping.dmp family_taurus_stealer behavioral1/memory/1188-60-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1188-63-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1188-64-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1188-66-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1776 set thread context of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 -
Delays execution with timeout.exe 1 IoCs
pid Process 1356 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1776 wrote to memory of 1188 1776 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe 28 PID 1188 wrote to memory of 1064 1188 AddInProcess32.exe 31 PID 1188 wrote to memory of 1064 1188 AddInProcess32.exe 31 PID 1188 wrote to memory of 1064 1188 AddInProcess32.exe 31 PID 1188 wrote to memory of 1064 1188 AddInProcess32.exe 31 PID 1064 wrote to memory of 1356 1064 cmd.exe 33 PID 1064 wrote to memory of 1356 1064 cmd.exe 33 PID 1064 wrote to memory of 1356 1064 cmd.exe 33 PID 1064 wrote to memory of 1356 1064 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe"C:\Users\Admin\AppData\Local\Temp\06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:1356
-
-
-