Analysis
-
max time kernel
67s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 22:02
Static task
static1
Behavioral task
behavioral1
Sample
27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe
Resource
win10v2004-20220414-en
General
-
Target
27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe
-
Size
1.3MB
-
MD5
518e2ebf1c5ac4f2cdfd5dd81fa60ec7
-
SHA1
cfc5904e2457fdf92230391b025acd9b607f0232
-
SHA256
27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9
-
SHA512
c147c0145231b255a4336354ecd1797f1b44c6b2a6b0766aed769fb550eac1a5af5c06f1ec364c7c1b71cc986ac52222695a810726bc293ac7830e3172c10cdc
Malware Config
Extracted
pandastealer
1.10
http://u808504gws.ha004.t.justns.ru
Signatures
-
Panda Stealer Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-68-0x0000000000444B97-mapping.dmp family_pandastealer behavioral1/memory/1736-70-0x0000000000400000-0x000000000045A000-memory.dmp family_pandastealer behavioral1/memory/1736-67-0x0000000000400000-0x000000000045A000-memory.dmp family_pandastealer behavioral1/memory/1736-64-0x0000000000400000-0x000000000045A000-memory.dmp family_pandastealer behavioral1/memory/1736-65-0x0000000000400000-0x000000000045A000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exedescription pid process target process PID 872 set thread context of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exepid process 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 1736 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exedescription pid process Token: SeDebugPrivilege 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exedescription pid process target process PID 872 wrote to memory of 1308 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1308 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1308 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1308 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1236 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1236 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1236 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1236 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe PID 872 wrote to memory of 1736 872 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe 27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe"C:\Users\Admin\AppData\Local\Temp\27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe"{path}"2⤵PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9.exe"{path}"2⤵PID:1236
-