Analysis

  • max time kernel
    4294178s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    09-03-2022 14:20

General

  • Target

    1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe

  • Size

    1.6MB

  • MD5

    f1a70d656879dbdc6c3ce4f4fdfdb555

  • SHA1

    9c9e1f1e03c0ae58cbe5cae2a2cb86847b3af653

  • SHA256

    1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634

  • SHA512

    95f2903f99798903b0802408307345874e126b15b313f249becf87453edc1c3a38001d35c5ce40f0462cb2daf5fabe6a1c77a00b69d19d205c0b721eb32e0679

Score
10/10

Malware Config

Signatures

  • Panda Stealer Payload 4 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe
    "C:\Users\Admin\AppData\Local\Temp\1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 136
        3⤵
        • Program crash
        PID:1524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/864-66-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/864-60-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/864-62-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/864-64-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/864-68-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/864-70-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/864-72-0x0000000000400000-0x00000000004AD000-memory.dmp

    Filesize

    692KB

  • memory/1792-55-0x0000000073FF0000-0x00000000746DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1792-56-0x0000000000390000-0x00000000003B0000-memory.dmp

    Filesize

    128KB

  • memory/1792-57-0x00000000003D0000-0x00000000003F4000-memory.dmp

    Filesize

    144KB

  • memory/1792-58-0x0000000004F60000-0x0000000004F61000-memory.dmp

    Filesize

    4KB

  • memory/1792-59-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1792-54-0x0000000000D90000-0x0000000000F38000-memory.dmp

    Filesize

    1.7MB