Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2023, 17:35
Behavioral task
behavioral1
Sample
3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe
Resource
win10v2004-20220812-en
General
-
Target
3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe
-
Size
5.8MB
-
MD5
46f70d5e7ae38ac852b3f4cabbc4260d
-
SHA1
9e2069059d1f7cff461f5e5fc02d3a5ebca8b44c
-
SHA256
3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907
-
SHA512
9333dd121128fcb0ec2399f4afb89e9febcfb8b07d91393a15efaf4f3020905b8fb55e4e718e5d5c93c66146a7786a5c3e1fc4bb5c7ee248b20ddb3f9778bebd
-
SSDEEP
98304:e1nTr6CuVbNM8lcJHjfF0EIL1xpouxJjEvl+KTmeg8mn59EhZQCINZwbP2:cTWCuVJRlUHTFQbxJjEvpT+znAhZQCOK
Malware Config
Extracted
pandastealer
1.11
http://gfgjhfgjfghgfghghg.ffox.site
Signatures
-
Panda Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/1904-132-0x0000000000550000-0x0000000000F16000-memory.dmp family_pandastealer behavioral2/memory/1904-135-0x0000000000550000-0x0000000000F16000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
resource yara_rule behavioral2/memory/1904-132-0x0000000000550000-0x0000000000F16000-memory.dmp vmprotect behavioral2/memory/1904-135-0x0000000000550000-0x0000000000F16000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1904 3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1904 3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe 1904 3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe 1904 3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe 1904 3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe"C:\Users\Admin\AppData\Local\Temp\3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1904