Analysis
-
max time kernel
68s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 20:17
Static task
static1
Behavioral task
behavioral1
Sample
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe
Resource
win10v2004-20220414-en
General
-
Target
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe
-
Size
5.6MB
-
MD5
850994426304c5a78d585c0e378c6160
-
SHA1
ffde6d0419876c305b8d50d89e0375a0e87a7da4
-
SHA256
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7
-
SHA512
40fd58f86ea63fc9a587f9e8907628f2cfcb5322b532249e9a4685b1efd2e3ab064d217f94dabc720500864904ebdf42b96358a410cf345f7a2f61547e9e57ac
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exedescription pid process target process PID 808 set thread context of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exepid process 1816 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exedescription pid process target process PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe"C:\Users\Admin\AppData\Local\Temp\73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe"C:\Users\Admin\AppData\Local\Temp\73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/808-54-0x0000000000E00000-0x00000000013A0000-memory.dmpFilesize
5.6MB
-
memory/808-55-0x0000000006250000-0x0000000006312000-memory.dmpFilesize
776KB
-
memory/1816-56-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/1816-57-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/1816-59-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/1816-61-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/1816-63-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/1816-64-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/1816-66-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/1816-67-0x000000000045EA1E-mapping.dmp
-
memory/1816-69-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/1816-70-0x0000000075DE1000-0x0000000075DE3000-memory.dmpFilesize
8KB
-
memory/1816-71-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB
-
memory/1816-72-0x0000000000400000-0x00000000004AF000-memory.dmpFilesize
700KB