Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
281s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05/06/2021, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
Program.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Program.exe
Resource
win10v20210410
General
-
Target
Program.exe
-
Size
783KB
-
MD5
a5ce4452b72ef5e005a652256aa4b842
-
SHA1
570c2099012673bff0b4bbd8bac54bde38f4832f
-
SHA256
64b5e1a70578e66ff0c849e4b06a1460065b820970748d4f6a959773aaae122f
-
SHA512
69d090e9d91861b787e027e4c7dd4d6b500910f92262c4e2e8e9a9fb46b9cfb33caba7d9e0b4e5882adc178028ab7582641bc6625b7561700f3bfcfdf0855ee8
Malware Config
Signatures
-
Panda Stealer Payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001559d-128.dat family_pandastealer behavioral2/files/0x000400000001559d-129.dat family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2636 Автономная Установка.exe 3712 Install.sfx.exe 2636 bui3ld.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2084 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Program.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Program.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2636 bui3ld.exe 2636 bui3ld.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2636 Автономная Установка.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3560 Program.exe 3560 Program.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2636 wrote to memory of 1376 2636 Автономная Установка.exe 82 PID 2636 wrote to memory of 1376 2636 Автономная Установка.exe 82 PID 2636 wrote to memory of 1376 2636 Автономная Установка.exe 82 PID 1376 wrote to memory of 4088 1376 cmd.exe 84 PID 1376 wrote to memory of 4088 1376 cmd.exe 84 PID 1376 wrote to memory of 4088 1376 cmd.exe 84 PID 1376 wrote to memory of 2084 1376 cmd.exe 85 PID 1376 wrote to memory of 2084 1376 cmd.exe 85 PID 1376 wrote to memory of 2084 1376 cmd.exe 85 PID 3712 wrote to memory of 2636 3712 Install.sfx.exe 86 PID 3712 wrote to memory of 2636 3712 Install.sfx.exe 86 PID 3712 wrote to memory of 2636 3712 Install.sfx.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Program.exe"C:\Users\Admin\AppData\Local\Temp\Program.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3560
-
C:\Users\Admin\Desktop\Автономная Установка.exe"C:\Users\Admin\Desktop\Автономная Установка.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Desktop\Автономная Установка.exe" & schtasks /create /tn \gqcnx55g\cinr4gwe /tr C:\Users\Admin\AppData\Roaming\svchost.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:4088
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \gqcnx55g\cinr4gwe /tr C:\Users\Admin\AppData\Roaming\svchost.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f3⤵
- Creates scheduled task(s)
PID:2084
-
-
-
C:\Users\Admin\Desktop\Install.sfx.exe"C:\Users\Admin\Desktop\Install.sfx.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\bui3ld.exe"C:\Users\Admin\AppData\Local\Temp\bui3ld.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2636
-