Analysis

  • max time kernel
    75s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-02-2022 07:43

General

  • Target

    ee7c97b8f6d16ec0ba83e60e99f625be58bbcf24c0ddeba40461324661732170.exe

  • Size

    657KB

  • MD5

    8ed6d907728a4b6647b1283abbfc2233

  • SHA1

    34965adb74613e90a0b0777098fd39c97ff6f877

  • SHA256

    ee7c97b8f6d16ec0ba83e60e99f625be58bbcf24c0ddeba40461324661732170

  • SHA512

    6da65cb2956f23efb19b4082fa768b9affc4a4e3f1c36532b471e47d5bf392f7976bac9c04b22bec7992d614785a347e0e9592e104fdb0503491fb61afaf3e1a

Malware Config

Signatures

  • Panda Stealer Payload 8 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee7c97b8f6d16ec0ba83e60e99f625be58bbcf24c0ddeba40461324661732170.exe
    "C:\Users\Admin\AppData\Local\Temp\ee7c97b8f6d16ec0ba83e60e99f625be58bbcf24c0ddeba40461324661732170.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Users\Admin\AppData\Local\Temp\dqwqdqwdqwqwd.exe
      "C:\Users\Admin\AppData\Local\Temp\dqwqdqwdqwqwd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Users\Admin\AppData\Local\dwdqdfqwfqwbbvv.exe
        "C:\Users\Admin\AppData\Local\dwdqdfqwfqwbbvv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1180-61-0x00000000013C0000-0x0000000001476000-memory.dmp

    Filesize

    728KB

  • memory/1180-62-0x000007FEFC4A1000-0x000007FEFC4A3000-memory.dmp

    Filesize

    8KB

  • memory/1180-63-0x0000000002880000-0x000000001A940000-memory.dmp

    Filesize

    384.8MB

  • memory/1584-54-0x0000000076921000-0x0000000076923000-memory.dmp

    Filesize

    8KB