Analysis
-
max time kernel
17s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18-06-2021 00:46
Static task
static1
Behavioral task
behavioral1
Sample
ee8ec71a488cd06f09e1a1ada0637709.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ee8ec71a488cd06f09e1a1ada0637709.exe
Resource
win10v20210408
General
-
Target
ee8ec71a488cd06f09e1a1ada0637709.exe
-
Size
3.5MB
-
MD5
ee8ec71a488cd06f09e1a1ada0637709
-
SHA1
8d1868ea322f936b848054297739bc4eebcfd961
-
SHA256
79e0a26bc2c9c902744c618ad7af045e5b1ced50f98ca066a33df44218f84702
-
SHA512
6c99c713997b5278af673edcc12f02ea0e72ee2acabd6fa7b7114fea2e3807c93e94a98441c9527856824696a063f1036f40eef217e11a52832d47f09837e6c5
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Executes dropped EXE 2 IoCs
pid Process 708 fsFEWEFwfsd_protected.sfx.exe 3988 fsFEWEFwfsd_protected.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3988 fsFEWEFwfsd_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3988 fsFEWEFwfsd_protected.exe 3988 fsFEWEFwfsd_protected.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3988 fsFEWEFwfsd_protected.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 568 wrote to memory of 708 568 ee8ec71a488cd06f09e1a1ada0637709.exe 75 PID 568 wrote to memory of 708 568 ee8ec71a488cd06f09e1a1ada0637709.exe 75 PID 568 wrote to memory of 708 568 ee8ec71a488cd06f09e1a1ada0637709.exe 75 PID 708 wrote to memory of 3988 708 fsFEWEFwfsd_protected.sfx.exe 77 PID 708 wrote to memory of 3988 708 fsFEWEFwfsd_protected.sfx.exe 77 PID 708 wrote to memory of 3988 708 fsFEWEFwfsd_protected.sfx.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee8ec71a488cd06f09e1a1ada0637709.exe"C:\Users\Admin\AppData\Local\Temp\ee8ec71a488cd06f09e1a1ada0637709.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\fsFEWEFwfsd_protected.sfx.exe"C:\Users\Admin\AppData\Local\Temp\fsFEWEFwfsd_protected.sfx.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\fsFEWEFwfsd_protected.exe"C:\Users\Admin\AppData\Local\Temp\fsFEWEFwfsd_protected.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3988
-
-