Analysis
-
max time kernel
4294178s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
09-03-2022 14:20
Static task
static1
Behavioral task
behavioral1
Sample
1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe
Resource
win10v2004-en-20220112
General
-
Target
1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe
-
Size
1.6MB
-
MD5
f1a70d656879dbdc6c3ce4f4fdfdb555
-
SHA1
9c9e1f1e03c0ae58cbe5cae2a2cb86847b3af653
-
SHA256
1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634
-
SHA512
95f2903f99798903b0802408307345874e126b15b313f249becf87453edc1c3a38001d35c5ce40f0462cb2daf5fabe6a1c77a00b69d19d205c0b721eb32e0679
Malware Config
Signatures
-
Panda Stealer Payload 4 IoCs
resource yara_rule behavioral1/memory/864-66-0x0000000000400000-0x00000000004AD000-memory.dmp family_pandastealer behavioral1/memory/864-68-0x0000000000400000-0x00000000004AD000-memory.dmp family_pandastealer behavioral1/memory/864-70-0x0000000000400000-0x00000000004AD000-memory.dmp family_pandastealer behavioral1/memory/864-72-0x0000000000400000-0x00000000004AD000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1792 set thread context of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 -
Program crash 1 IoCs
pid pid_target Process procid_target 1524 864 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 1792 wrote to memory of 864 1792 1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe 27 PID 864 wrote to memory of 1524 864 mscorsvw.exe 28 PID 864 wrote to memory of 1524 864 mscorsvw.exe 28 PID 864 wrote to memory of 1524 864 mscorsvw.exe 28 PID 864 wrote to memory of 1524 864 mscorsvw.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe"C:\Users\Admin\AppData\Local\Temp\1c41760f68b7a46f7c3a75a202a24ac5e7487fb7ae30db9e95d01c4ca7dee634.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 1363⤵
- Program crash
PID:1524
-
-