Analysis
-
max time kernel
24s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10-07-2023 02:57
Static task
static1
Behavioral task
behavioral1
Sample
FilmoraPromоtiоnVidео.scr
Resource
win7-20230703-en
windows7-x64
8 signatures
1800 seconds
General
-
Target
FilmoraPromоtiоnVidео.scr
-
Size
690.5MB
-
MD5
396e65b6305c12f93342ec94e9dbd7b0
-
SHA1
462ec73a270961e773357222a57540f77c446013
-
SHA256
92d11ab454c85909e43c2d970b2b19101efd5deb16b5d56957a7eacce2c2052d
-
SHA512
b51d93a64d43cd5e9f9965cf6ac152df265150f32a22d02deb4085c905ce7baa8796d98dfd9d20768ab0c5ce63def624cde98a8f74b0c4d9b3efdf5c2ef04510
-
SSDEEP
6144:tK/fF/coWpbk9kwiY7PQHTPy/hHnzhAWNIvZhaj7zMh9gmxY5r:tK/fCfykkEiHzeWNIvZA7IhOmxY5r
Malware Config
Signatures
-
Taurus Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1676-54-0x0000000000400000-0x000000000047C000-memory.dmp family_taurus_stealer behavioral1/memory/1676-56-0x0000000000400000-0x000000000047C000-memory.dmp family_taurus_stealer -
Deletes itself 1 IoCs
pid Process 2108 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1328 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2108 1676 FilmoraPromоtiоnVidео.scr 30 PID 1676 wrote to memory of 2108 1676 FilmoraPromоtiоnVidео.scr 30 PID 1676 wrote to memory of 2108 1676 FilmoraPromоtiоnVidео.scr 30 PID 1676 wrote to memory of 2108 1676 FilmoraPromоtiоnVidео.scr 30 PID 2108 wrote to memory of 1328 2108 cmd.exe 32 PID 2108 wrote to memory of 1328 2108 cmd.exe 32 PID 2108 wrote to memory of 1328 2108 cmd.exe 32 PID 2108 wrote to memory of 1328 2108 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\FilmoraPromоtiоnVidео.scr"C:\Users\Admin\AppData\Local\Temp\FilmoraPromоtiоnVidео.scr" /S1⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\Temp\FilmoraProm?ti?nVid??.scr2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1328
-
-