Analysis
-
max time kernel
131s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
28-03-2022 21:01
Static task
static1
Behavioral task
behavioral1
Sample
f7568b876220f09e36a56846ceb13604f98bcc1b6ba22201fb708c07cd071087.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
f7568b876220f09e36a56846ceb13604f98bcc1b6ba22201fb708c07cd071087.exe
Resource
win10v2004-20220310-en
General
-
Target
f7568b876220f09e36a56846ceb13604f98bcc1b6ba22201fb708c07cd071087.exe
-
Size
681KB
-
MD5
dd1dfb2adfb2c1d72938fa717f8c3b33
-
SHA1
d9b5cebd98b53554c3ffe6709d837cfd1e2ba0d5
-
SHA256
f7568b876220f09e36a56846ceb13604f98bcc1b6ba22201fb708c07cd071087
-
SHA512
2617040663ab8ad9c17d31ac4787edbff2be4f0cf36f104f1a5806f0a5f66c9fdb9947111efa559f20cc3003094c9b3283ef633cbd1a6496c1a37a356d2a52b3
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{70B6CBB2-426A-4F12-A9B6-DB6B6788DB17}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{2AE4C8A6-B581-46E6-959F-AAA718BD947E}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2152 f7568b876220f09e36a56846ceb13604f98bcc1b6ba22201fb708c07cd071087.exe 2152 f7568b876220f09e36a56846ceb13604f98bcc1b6ba22201fb708c07cd071087.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7568b876220f09e36a56846ceb13604f98bcc1b6ba22201fb708c07cd071087.exe"C:\Users\Admin\AppData\Local\Temp\f7568b876220f09e36a56846ceb13604f98bcc1b6ba22201fb708c07cd071087.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3712