Analysis
-
max time kernel
4294181s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
27-02-2022 07:08
Static task
static1
Behavioral task
behavioral1
Sample
telegram_soft/Activator.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
telegram_soft/Activator.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
telegram_soft/telegram_soft.exe
Resource
win7-20220223-en
Behavioral task
behavioral4
Sample
telegram_soft/telegram_soft.exe
Resource
win10v2004-en-20220112
General
-
Target
telegram_soft/Activator.exe
-
Size
2.9MB
-
MD5
f18597c66c2170583ec174a7baa8d93b
-
SHA1
c3917128a7da6ece2ef8dae83ea2d6a1d50d92a6
-
SHA256
ec17568c233a62a0d6460b2234b818d91354de9b48005dcbc4454145a0f176c2
-
SHA512
69c3ac1a9320749457d3ad5d8d71e0619097bc98977baf37eeebba1cb4247f1a46df92644ae3ce077e4b3f1cc96475f332534ddfb1e3829ff02787df36af66a9
Malware Config
Signatures
-
Panda Stealer Payload 3 IoCs
resource yara_rule behavioral1/memory/1128-56-0x0000000000E80000-0x00000000015D4000-memory.dmp family_pandastealer behavioral1/memory/1128-57-0x0000000000E80000-0x00000000015D4000-memory.dmp family_pandastealer behavioral1/memory/1128-58-0x0000000000E80000-0x00000000015D4000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Activator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Activator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1128-55-0x0000000000E80000-0x00000000015D4000-memory.dmp themida behavioral1/memory/1128-56-0x0000000000E80000-0x00000000015D4000-memory.dmp themida behavioral1/memory/1128-57-0x0000000000E80000-0x00000000015D4000-memory.dmp themida behavioral1/memory/1128-58-0x0000000000E80000-0x00000000015D4000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Activator.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1128 Activator.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1128 Activator.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\telegram_soft\Activator.exe"C:\Users\Admin\AppData\Local\Temp\telegram_soft\Activator.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1128