Analysis
-
max time kernel
68s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 20:17
Static task
static1
Behavioral task
behavioral1
Sample
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe
Resource
win10v2004-20220414-en
General
-
Target
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe
-
Size
5.6MB
-
MD5
850994426304c5a78d585c0e378c6160
-
SHA1
ffde6d0419876c305b8d50d89e0375a0e87a7da4
-
SHA256
73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7
-
SHA512
40fd58f86ea63fc9a587f9e8907628f2cfcb5322b532249e9a4685b1efd2e3ab064d217f94dabc720500864904ebdf42b96358a410cf345f7a2f61547e9e57ac
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 808 set thread context of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1816 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27 PID 808 wrote to memory of 1816 808 73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe"C:\Users\Admin\AppData\Local\Temp\73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe"C:\Users\Admin\AppData\Local\Temp\73771687cc99119179751de6ff92b29350a75c0b8cd53074cab5ce7edae001f7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-