Analysis
-
max time kernel
151s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2023 16:37
Static task
static1
Behavioral task
behavioral1
Sample
928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe
Resource
win10v2004-20220812-en
General
-
Target
928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe
-
Size
189KB
-
MD5
04b1711beba9284f46e355b5d22eed54
-
SHA1
a81642aec480505036852d22d5b8ee2bd76e604f
-
SHA256
928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907
-
SHA512
d9c09a5761fa8637853c705e3bb5489f43bea5a36092712e7021e701bd2ca10edb9531653c8c58e5014afef243231d17ded7dac820e3225886ea57c1be8a90f9
-
SSDEEP
3072:d/ipHQ6o8/MXs3pTtKSKg4XTZLNJjgn1ZiYqRr7xW:JoHU8/MXs3pBqT9zjmWRr
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/1544-133-0x00000000022A0000-0x00000000022A9000-memory.dmp family_smokeloader -
Panda Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1316-145-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral1/memory/1316-146-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral1/memory/1316-147-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral1/memory/1316-148-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 3204 82BD.exe 4708 8A20.exe 2064 932A.exe 1776 twuihgd -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{33E0FF4A-8D7A-453D-9637-8D342AFD96EB}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{29F82376-ECF3-421B-8501-FF69D876C6A9}.catalogItem svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4708 set thread context of 1316 4708 8A20.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 2332 2064 WerFault.exe 86 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI twuihgd Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI twuihgd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI twuihgd -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1544 928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe 1544 928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3004 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 1544 928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 1776 twuihgd -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found Token: SeDebugPrivilege 2064 932A.exe Token: SeShutdownPrivilege 3004 Process not Found Token: SeCreatePagefilePrivilege 3004 Process not Found -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3004 Process not Found 3004 Process not Found 3004 Process not Found -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found 3004 Process not Found -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3204 3004 Process not Found 75 PID 3004 wrote to memory of 3204 3004 Process not Found 75 PID 3004 wrote to memory of 4708 3004 Process not Found 79 PID 3004 wrote to memory of 4708 3004 Process not Found 79 PID 3004 wrote to memory of 4708 3004 Process not Found 79 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 4708 wrote to memory of 1316 4708 8A20.exe 84 PID 3004 wrote to memory of 2064 3004 Process not Found 86 PID 3004 wrote to memory of 2064 3004 Process not Found 86 PID 3004 wrote to memory of 2064 3004 Process not Found 86 PID 3004 wrote to memory of 392 3004 Process not Found 87 PID 3004 wrote to memory of 392 3004 Process not Found 87 PID 3004 wrote to memory of 392 3004 Process not Found 87 PID 3004 wrote to memory of 392 3004 Process not Found 87 PID 3004 wrote to memory of 4572 3004 Process not Found 88 PID 3004 wrote to memory of 4572 3004 Process not Found 88 PID 3004 wrote to memory of 4572 3004 Process not Found 88 PID 3004 wrote to memory of 588 3004 Process not Found 89 PID 3004 wrote to memory of 588 3004 Process not Found 89 PID 3004 wrote to memory of 588 3004 Process not Found 89 PID 3004 wrote to memory of 588 3004 Process not Found 89 PID 3004 wrote to memory of 2640 3004 Process not Found 90 PID 3004 wrote to memory of 2640 3004 Process not Found 90 PID 3004 wrote to memory of 2640 3004 Process not Found 90 PID 3004 wrote to memory of 4604 3004 Process not Found 91 PID 3004 wrote to memory of 4604 3004 Process not Found 91 PID 3004 wrote to memory of 4604 3004 Process not Found 91 PID 3004 wrote to memory of 4604 3004 Process not Found 91 PID 3004 wrote to memory of 308 3004 Process not Found 92 PID 3004 wrote to memory of 308 3004 Process not Found 92 PID 3004 wrote to memory of 308 3004 Process not Found 92 PID 3004 wrote to memory of 308 3004 Process not Found 92 PID 3004 wrote to memory of 212 3004 Process not Found 93 PID 3004 wrote to memory of 212 3004 Process not Found 93 PID 3004 wrote to memory of 212 3004 Process not Found 93 PID 3004 wrote to memory of 212 3004 Process not Found 93 PID 3004 wrote to memory of 3804 3004 Process not Found 94 PID 3004 wrote to memory of 3804 3004 Process not Found 94 PID 3004 wrote to memory of 3804 3004 Process not Found 94 PID 3004 wrote to memory of 1896 3004 Process not Found 95 PID 3004 wrote to memory of 1896 3004 Process not Found 95 PID 3004 wrote to memory of 1896 3004 Process not Found 95 PID 3004 wrote to memory of 1896 3004 Process not Found 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe"C:\Users\Admin\AppData\Local\Temp\928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1544
-
C:\Users\Admin\AppData\Local\Temp\82BD.exeC:\Users\Admin\AppData\Local\Temp\82BD.exe1⤵
- Executes dropped EXE
PID:3204
-
C:\Users\Admin\AppData\Local\Temp\8A20.exeC:\Users\Admin\AppData\Local\Temp\8A20.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:1316
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:2248
-
C:\Users\Admin\AppData\Local\Temp\932A.exeC:\Users\Admin\AppData\Local\Temp\932A.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 12202⤵
- Program crash
PID:2332
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:392
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4572
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:588
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2640
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4604
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:308
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:212
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3804
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 2064 -ip 20641⤵PID:1568
-
C:\Users\Admin\AppData\Roaming\twuihgdC:\Users\Admin\AppData\Roaming\twuihgd1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
3.1MB
MD59be366e3eead805c905977cf03900368
SHA12b54c4b41e4cf54beb888bad6b795d9bc0179554
SHA2561ab08663f123eceac52565a05cf46d5eacabf57c02ac401cbfb6258f6b099847
SHA512d8adccf92392248f5674cc1b69c9533add0913b0307194d41ba78d81b533f57ec4b39e225bd0656441f70214a01cf0a9d64adcf307e06548f0b2f138bc68871f
-
Filesize
3.1MB
MD59be366e3eead805c905977cf03900368
SHA12b54c4b41e4cf54beb888bad6b795d9bc0179554
SHA2561ab08663f123eceac52565a05cf46d5eacabf57c02ac401cbfb6258f6b099847
SHA512d8adccf92392248f5674cc1b69c9533add0913b0307194d41ba78d81b533f57ec4b39e225bd0656441f70214a01cf0a9d64adcf307e06548f0b2f138bc68871f
-
Filesize
299KB
MD54044277808862af81c94098f33ef040d
SHA1d249a425325fb6cf3ff431450492e5e8467cfe07
SHA25600f8d989336d2e4e3a4544f8bdb5ae97500f16e3d0dc262a78d7e75f9abe3288
SHA512cc88af60599447479d49b0ffe2ef78a211a4b597d7171ab8105595f4809c0e363e5dba66b5f0cf3b2957fc5df1b9589e730d10235af0dff5bdbd957686435039
-
Filesize
299KB
MD54044277808862af81c94098f33ef040d
SHA1d249a425325fb6cf3ff431450492e5e8467cfe07
SHA25600f8d989336d2e4e3a4544f8bdb5ae97500f16e3d0dc262a78d7e75f9abe3288
SHA512cc88af60599447479d49b0ffe2ef78a211a4b597d7171ab8105595f4809c0e363e5dba66b5f0cf3b2957fc5df1b9589e730d10235af0dff5bdbd957686435039
-
Filesize
189KB
MD504b1711beba9284f46e355b5d22eed54
SHA1a81642aec480505036852d22d5b8ee2bd76e604f
SHA256928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907
SHA512d9c09a5761fa8637853c705e3bb5489f43bea5a36092712e7021e701bd2ca10edb9531653c8c58e5014afef243231d17ded7dac820e3225886ea57c1be8a90f9
-
Filesize
189KB
MD504b1711beba9284f46e355b5d22eed54
SHA1a81642aec480505036852d22d5b8ee2bd76e604f
SHA256928b339a13c0dcfbaae8b9fc1d0489de4795a0f6c21b6d94832b30c31bf10907
SHA512d9c09a5761fa8637853c705e3bb5489f43bea5a36092712e7021e701bd2ca10edb9531653c8c58e5014afef243231d17ded7dac820e3225886ea57c1be8a90f9