Analysis

  • max time kernel
    119s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    26-03-2022 08:20

General

  • Target

    9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d.exe

  • Size

    899KB

  • MD5

    9a2d07cf1b75929a35b3f66f4c3838bf

  • SHA1

    3e2bbb2a0a4ece23c4e4010a9c463aed08f6e4be

  • SHA256

    9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d

  • SHA512

    89e573759266316dfd5976a1a1c7788e71fc89427f4dcce14f9ff845ad2c9c577471ad1f9adac87765f60cf1891f002c1d0fe9478176a4287145703ee1cc8554

Score
10/10

Malware Config

Signatures

  • Panda Stealer Payload 3 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d.exe
    "C:\Users\Admin\AppData\Local\Temp\9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d.exe
      "C:\Users\Admin\AppData\Local\Temp\9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d.exe"
      2⤵
        PID:4284
      • C:\Users\Admin\AppData\Local\Temp\9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d.exe
        "C:\Users\Admin\AppData\Local\Temp\9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d.exe"
        2⤵
          PID:980
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 372
            3⤵
            • Program crash
            PID:3648
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k netsvcs -p
        1⤵
        • Drops file in System32 directory
        PID:3380
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
        1⤵
        • Modifies data under HKEY_USERS
        PID:4248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 980 -ip 980
        1⤵
          PID:2092

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/980-137-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/980-138-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/980-139-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/2816-134-0x0000000000230000-0x0000000000316000-memory.dmp

          Filesize

          920KB