Analysis
-
max time kernel
75s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20/07/2021, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
top-macro.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
top-macro.exe
-
Size
6.1MB
-
MD5
dbf27edfd1c25b00cd4dfaed3fdc5050
-
SHA1
86d05ee92d2c4bb639849979802e93a7d495ac0d
-
SHA256
140a296066f4749fff13c3c8e75c92bf9e2a884a55826977733d4bdff90a059e
-
SHA512
ee139a213df23b222d08ef26133b95230d33ffb0b92efbd1c51036e3fa19905dda4c1512b24922b20579178549ed9b3b25dca9e6ca2cc94f2575f23c571f82ec
Score
10/10
Malware Config
Signatures
-
Panda Stealer Payload 2 IoCs
resource yara_rule behavioral1/files/0x000200000001ab55-120.dat family_pandastealer behavioral1/files/0x000200000001ab55-123.dat family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Executes dropped EXE 5 IoCs
pid Process 5112 54618456.exe 4140 build.exe 3460 Figma.exe 4204 5468456.sfx.exe 1208 5468456.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3460 Figma.exe 1208 5468456.exe 3460 Figma.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4140 build.exe 4140 build.exe 1208 5468456.exe 1208 5468456.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3460 Figma.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1208 5468456.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4648 wrote to memory of 5112 4648 top-macro.exe 74 PID 4648 wrote to memory of 5112 4648 top-macro.exe 74 PID 4648 wrote to memory of 5112 4648 top-macro.exe 74 PID 4648 wrote to memory of 4140 4648 top-macro.exe 75 PID 4648 wrote to memory of 4140 4648 top-macro.exe 75 PID 4648 wrote to memory of 4140 4648 top-macro.exe 75 PID 4648 wrote to memory of 3460 4648 top-macro.exe 76 PID 4648 wrote to memory of 3460 4648 top-macro.exe 76 PID 5112 wrote to memory of 4204 5112 54618456.exe 79 PID 5112 wrote to memory of 4204 5112 54618456.exe 79 PID 5112 wrote to memory of 4204 5112 54618456.exe 79 PID 4204 wrote to memory of 1208 4204 5468456.sfx.exe 81 PID 4204 wrote to memory of 1208 4204 5468456.sfx.exe 81 PID 4204 wrote to memory of 1208 4204 5468456.sfx.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\top-macro.exe"C:\Users\Admin\AppData\Local\Temp\top-macro.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\54618456.exe"C:\Users\Admin\AppData\Local\Temp\54618456.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\5468456.sfx.exe"C:\Users\Admin\AppData\Local\Temp\5468456.sfx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\5468456.exe"C:\Users\Admin\AppData\Local\Temp\5468456.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\Figma.exe"C:\Users\Admin\AppData\Local\Temp\Figma.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3460
-