Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
09-03-2022 14:00
Static task
static1
Behavioral task
behavioral1
Sample
5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe
Resource
win10v2004-en-20220112
General
-
Target
5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe
-
Size
1.3MB
-
MD5
396f2b95ceaa2a0f978b514b7552b2b4
-
SHA1
b7bc8fc2437026235c0183cfe1f444a72cefc55a
-
SHA256
5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab
-
SHA512
207b36b3282323ac0ccaaf3ebc077ee1d2f0bc7a36f3c0c1dea454af116f56682dfa8aabf04f52704a8f926f1264b7cc9ea9ee4c6555f5c44099db1aadf12562
Malware Config
Signatures
-
Panda Stealer Payload 3 IoCs
resource yara_rule behavioral2/memory/3848-138-0x0000000000400000-0x00000000004AE000-memory.dmp family_pandastealer behavioral2/memory/3848-139-0x0000000000400000-0x00000000004AE000-memory.dmp family_pandastealer behavioral2/memory/3848-140-0x0000000000400000-0x00000000004AE000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 676 set thread context of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64 -
Program crash 1 IoCs
pid pid_target Process procid_target 464 3848 WerFault.exe 64 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 676 wrote to memory of 3060 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 63 PID 676 wrote to memory of 3060 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 63 PID 676 wrote to memory of 3060 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 63 PID 676 wrote to memory of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64 PID 676 wrote to memory of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64 PID 676 wrote to memory of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64 PID 676 wrote to memory of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64 PID 676 wrote to memory of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64 PID 676 wrote to memory of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64 PID 676 wrote to memory of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64 PID 676 wrote to memory of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64 PID 676 wrote to memory of 3848 676 5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe 64
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe"C:\Users\Admin\AppData\Local\Temp\5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe"{path}"2⤵PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\5cbe850f672ab2ba13bef9015eca0712fa071c918b4a435b6486e41f42862aab.exe"{path}"2⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 3723⤵
- Program crash
PID:464
-
-
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 01⤵
- Checks processor information in registry
PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3848 -ip 38481⤵PID:928