Analysis

  • max time kernel
    149s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    19-07-2020 19:53

General

  • Target

    pandabanker_2.6.7.vir.exe

  • Size

    293KB

  • MD5

    2526818feedf1748fa0de8ee290ad9ee

  • SHA1

    cd67a0ebd40d88d6d2f9b8df9b9c729479dad4f6

  • SHA256

    41ac9dd172ebc186c77cab9f12401ab18805e77c34eacdf9dfdbd570d8bd9c62

  • SHA512

    a50aeb2751592e3c51a851ff3e5daff131af22fd541ba16de93cfe6f17dd8ec3f5799b6ffc73207ee90004f6724db0ebb0efe0fb0ea6811abb414337e9812a59

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 96 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pandabanker_2.6.7.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\pandabanker_2.6.7.vir.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • Identifies Wine through registry keys
    • Loads dropped DLL
    PID:1140
    • C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\SelectUpdate.exe
      "C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\SelectUpdate.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Loads dropped DLL
      • Executes dropped EXE
      PID:836
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Adds Run key to start application
        PID:1792
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe
        3⤵
          PID:1872
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\updcdbad0f9.bat"
        2⤵
        • Deletes itself
        PID:1476

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\updcdbad0f9.bat

    • C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\SelectUpdate.exe

    • C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\SelectUpdate.exe

    • \Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\SelectUpdate.exe

    • \Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\SelectUpdate.exe

    • \Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\SelectUpdate.exe

    • \Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\SelectUpdate.exe

    • memory/836-8-0x0000000000A04000-0x0000000000A05000-memory.dmp

      Filesize

      4KB

    • memory/836-2-0x0000000000000000-mapping.dmp

    • memory/1140-0-0x0000000000751000-0x0000000000752000-memory.dmp

      Filesize

      4KB

    • memory/1476-9-0x0000000000000000-mapping.dmp

    • memory/1792-11-0x0000000000000000-mapping.dmp

    • memory/1792-13-0x0000000002530000-0x0000000002531000-memory.dmp

      Filesize

      4KB

    • memory/1872-12-0x0000000000000000-mapping.dmp