Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe
Resource
win7-20221111-en
windows7-x64
7 signatures
150 seconds
General
-
Target
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe
-
Size
1.4MB
-
MD5
c28072106a3941932130c8db2a135555
-
SHA1
cc2aaeafa62ea06e5b07808f15a5263e04906e53
-
SHA256
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc
-
SHA512
0c3083f190c8a0d82340f6a3d0f64f76eb938e93d3070cf7ccd75aa501b58040b5b26ba57e1e5a5bd5d69bff07558733f68dfc00c50473842bdda9f9f7281b56
-
SSDEEP
12288:6Zzp1NI5x7k3+rcAT8U6x+3JYU82+/IvIh/QnviN9VzdvYhvb:6Zzp1YdkoUU82+Qwh/Qn89Vx
Malware Config
Signatures
-
Taurus Stealer payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1096-133-0x0000000000000000-mapping.dmp family_taurus_stealer behavioral2/memory/1096-134-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral2/memory/1096-136-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral2/memory/1096-135-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral2/memory/1096-137-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral2/memory/1096-139-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer -
Suspicious use of SetThreadContext 1 IoCs
Processes:
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exedescription pid process target process PID 4740 set thread context of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4220 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exedescription pid process Token: SeDebugPrivilege 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exeAddInProcess32.execmd.exedescription pid process target process PID 4740 wrote to memory of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe PID 4740 wrote to memory of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe PID 4740 wrote to memory of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe PID 4740 wrote to memory of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe PID 4740 wrote to memory of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe PID 4740 wrote to memory of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe PID 4740 wrote to memory of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe PID 4740 wrote to memory of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe PID 4740 wrote to memory of 1096 4740 06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe AddInProcess32.exe PID 1096 wrote to memory of 552 1096 AddInProcess32.exe cmd.exe PID 1096 wrote to memory of 552 1096 AddInProcess32.exe cmd.exe PID 1096 wrote to memory of 552 1096 AddInProcess32.exe cmd.exe PID 552 wrote to memory of 4220 552 cmd.exe timeout.exe PID 552 wrote to memory of 4220 552 cmd.exe timeout.exe PID 552 wrote to memory of 4220 552 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe"C:\Users\Admin\AppData\Local\Temp\06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:4220
-
-
-