Analysis
-
max time kernel
6s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
19-07-2021 00:25
Static task
static1
Behavioral task
behavioral1
Sample
Skinchanger.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Skinchanger.exe
Resource
win10v20210408
General
-
Target
Skinchanger.exe
-
Size
7.0MB
-
MD5
3ec2afd717e1874cd5b5beffee26fa03
-
SHA1
89172e4caa7a368c525ffc70868d07ea4b963b4b
-
SHA256
5a819f7cddb64f6ada6803b0eb5eeab0df6a789583049cbdd11a57b679e99029
-
SHA512
ab6bb583102f3047f05b0f447f60b7836bdbc84de51efb95503c2069e26d3566aceaa575999123c2603ff22bc439215e7960ecfb7ed955fc40884e1af0e4f8fc
Malware Config
Signatures
-
Panda Stealer Payload 3 IoCs
resource yara_rule behavioral1/files/0x00040000000130df-60.dat family_pandastealer behavioral1/files/0x00040000000130df-61.dat family_pandastealer behavioral1/files/0x00040000000130df-63.dat family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Executes dropped EXE 1 IoCs
pid Process 1608 build.exe -
Loads dropped DLL 2 IoCs
pid Process 2004 Skinchanger.exe 2004 Skinchanger.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1608 build.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1608 2004 Skinchanger.exe 26 PID 2004 wrote to memory of 1608 2004 Skinchanger.exe 26 PID 2004 wrote to memory of 1608 2004 Skinchanger.exe 26 PID 2004 wrote to memory of 1608 2004 Skinchanger.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\Skinchanger.exe"C:\Users\Admin\AppData\Local\Temp\Skinchanger.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1608
-