Analysis
-
max time kernel
153s -
max time network
33s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
19-07-2020 19:35
Static task
static1
Behavioral task
behavioral1
Sample
pandabanker_2.2.10.vir.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
pandabanker_2.2.10.vir.exe
Resource
win10
General
-
Target
pandabanker_2.2.10.vir.exe
-
Size
222KB
-
MD5
9a9734e363a41dcacff3cba04c8d9512
-
SHA1
6a7a319ae1472ef36a73bf3088706ed6acceff76
-
SHA256
0d61cc62923f2df6a74fd877cc41c5a4df61355a3ded608bab7b9dde0fb98f41
-
SHA512
7490d2204b4a879e60d63ec7e633a0bca10a309898df67c13dac7f6da9e47f4d41adcb9865895ddd50803a735281f1b0c0bd8a7ca8f2a325f2e6d45655664f82
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
pandabanker_2.2.10.vir.exepid process 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 300 IoCs
Processes:
pandabanker_2.2.10.vir.exesvchost.exepid process 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe 1480 pandabanker_2.2.10.vir.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe 1508 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
pandabanker_2.2.10.vir.exedescription pid process Token: SeSecurityPrivilege 1480 pandabanker_2.2.10.vir.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
pandabanker_2.2.10.vir.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\WINE pandabanker_2.2.10.vir.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\WINE pandabanker_2.2.10.vir.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\Currentversion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\StepUnblock.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\Flash Player\\macromedia.com\\support\\flashplayer\\sys\\StepUnblock.exe\"" svchost.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
pandabanker_2.2.10.vir.exeStepUnblock.exepid process 1400 pandabanker_2.2.10.vir.exe 1012 StepUnblock.exe -
Executes dropped EXE 2 IoCs
Processes:
StepUnblock.exeStepUnblock.exepid process 1012 StepUnblock.exe 1072 StepUnblock.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1496 cmd.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
pandabanker_2.2.10.vir.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pandabanker_2.2.10.vir.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
pandabanker_2.2.10.vir.exeStepUnblock.exedescription pid process target process PID 1400 set thread context of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1012 set thread context of 1072 1012 StepUnblock.exe StepUnblock.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
pandabanker_2.2.10.vir.exepandabanker_2.2.10.vir.exeStepUnblock.exeStepUnblock.exedescription pid process target process PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1400 wrote to memory of 1480 1400 pandabanker_2.2.10.vir.exe pandabanker_2.2.10.vir.exe PID 1480 wrote to memory of 1012 1480 pandabanker_2.2.10.vir.exe StepUnblock.exe PID 1480 wrote to memory of 1012 1480 pandabanker_2.2.10.vir.exe StepUnblock.exe PID 1480 wrote to memory of 1012 1480 pandabanker_2.2.10.vir.exe StepUnblock.exe PID 1480 wrote to memory of 1012 1480 pandabanker_2.2.10.vir.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1012 wrote to memory of 1072 1012 StepUnblock.exe StepUnblock.exe PID 1072 wrote to memory of 1508 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1508 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1508 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1508 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1508 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1508 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1508 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1508 1072 StepUnblock.exe svchost.exe PID 1480 wrote to memory of 1496 1480 pandabanker_2.2.10.vir.exe cmd.exe PID 1480 wrote to memory of 1496 1480 pandabanker_2.2.10.vir.exe cmd.exe PID 1480 wrote to memory of 1496 1480 pandabanker_2.2.10.vir.exe cmd.exe PID 1480 wrote to memory of 1496 1480 pandabanker_2.2.10.vir.exe cmd.exe PID 1072 wrote to memory of 1788 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1788 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1788 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1788 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1788 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1788 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1788 1072 StepUnblock.exe svchost.exe PID 1072 wrote to memory of 1788 1072 StepUnblock.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pandabanker_2.2.10.vir.exe"C:\Users\Admin\AppData\Local\Temp\pandabanker_2.2.10.vir.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pandabanker_2.2.10.vir.exe"C:\Users\Admin\AppData\Local\Temp\pandabanker_2.2.10.vir.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Identifies Wine through registry keys
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\StepUnblock.exe"C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\StepUnblock.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\StepUnblock.exe"C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\StepUnblock.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs5⤵
- Suspicious behavior: EnumeratesProcesses
- Adds Run key to start application
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\upd97c4e49a.bat"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\upd97c4e49a.bat
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\StepUnblock.exe
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\StepUnblock.exe
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\StepUnblock.exe
-
\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\StepUnblock.exe
-
\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\StepUnblock.exe
-
memory/1012-24-0x0000000002700000-0x0000000002704000-memory.dmpFilesize
16KB
-
memory/1012-22-0x0000000000330000-0x0000000000334000-memory.dmpFilesize
16KB
-
memory/1012-17-0x0000000002B00000-0x0000000002B04000-memory.dmpFilesize
16KB
-
memory/1012-16-0x0000000002570000-0x0000000002574000-memory.dmpFilesize
16KB
-
memory/1012-12-0x0000000000000000-mapping.dmp
-
memory/1072-20-0x000000000040C7AE-mapping.dmp
-
memory/1400-9-0x0000000002AB0000-0x0000000002AB4000-memory.dmpFilesize
16KB
-
memory/1400-8-0x0000000000300000-0x0000000000304000-memory.dmpFilesize
16KB
-
memory/1400-2-0x00000000025C0000-0x00000000025C4000-memory.dmpFilesize
16KB
-
memory/1400-4-0x0000000002EB0000-0x0000000002EB4000-memory.dmpFilesize
16KB
-
memory/1400-3-0x0000000002EB0000-0x0000000002EB4000-memory.dmpFilesize
16KB
-
memory/1480-7-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1480-6-0x000000000040C7AE-mapping.dmp
-
memory/1480-5-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1496-26-0x0000000000000000-mapping.dmp
-
memory/1508-25-0x0000000000000000-mapping.dmp
-
memory/1788-27-0x0000000000000000-mapping.dmp