Analysis
-
max time kernel
153s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2023 16:00
Static task
static1
Behavioral task
behavioral1
Sample
26ebf4b16a7b59e42a4bb77818d6fd31.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
26ebf4b16a7b59e42a4bb77818d6fd31.exe
Resource
win10v2004-20220812-en
General
-
Target
26ebf4b16a7b59e42a4bb77818d6fd31.exe
-
Size
196KB
-
MD5
26ebf4b16a7b59e42a4bb77818d6fd31
-
SHA1
3b76faa23a88fa0937eab421e4c8f2c4a8d070f0
-
SHA256
b06b1b4d5a9dddb0d067a38fdf2b3b872d974ce1379c4101ab13aa1a6f143b13
-
SHA512
14675781ec3b69d01aafc6fa18d3184b29b3b8c68f90b002f2fe7bfe39f5fdb4fdae7a1fe87c12d10f53c166ea077cb533e997c8d069b67ecb966eda1c97df6a
-
SSDEEP
3072:dpnVxDLhdvd+kfHkJbWU5TszWKsQ0U99qpz0kDB1sh02qR9wBA:3nVxDLl+Dpf5TYWKsQzbqKkzshALu
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/4804-133-0x0000000000620000-0x0000000000629000-memory.dmp family_smokeloader -
Panda Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/656-149-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral2/memory/656-150-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral2/memory/656-151-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral2/memory/656-152-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 3176 A587.exe 3460 A931.exe 2960 AE24.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2960 set thread context of 656 2960 AE24.exe 92 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 26ebf4b16a7b59e42a4bb77818d6fd31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 26ebf4b16a7b59e42a4bb77818d6fd31.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 26ebf4b16a7b59e42a4bb77818d6fd31.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4804 26ebf4b16a7b59e42a4bb77818d6fd31.exe 4804 26ebf4b16a7b59e42a4bb77818d6fd31.exe 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 4804 26ebf4b16a7b59e42a4bb77818d6fd31.exe 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found 2520 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2520 Process not Found Token: SeCreatePagefilePrivilege 2520 Process not Found Token: SeShutdownPrivilege 2520 Process not Found Token: SeCreatePagefilePrivilege 2520 Process not Found Token: SeShutdownPrivilege 2520 Process not Found Token: SeCreatePagefilePrivilege 2520 Process not Found Token: SeShutdownPrivilege 2520 Process not Found Token: SeCreatePagefilePrivilege 2520 Process not Found -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3176 2520 Process not Found 88 PID 2520 wrote to memory of 3176 2520 Process not Found 88 PID 2520 wrote to memory of 3460 2520 Process not Found 89 PID 2520 wrote to memory of 3460 2520 Process not Found 89 PID 2520 wrote to memory of 2960 2520 Process not Found 90 PID 2520 wrote to memory of 2960 2520 Process not Found 90 PID 2520 wrote to memory of 2960 2520 Process not Found 90 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2960 wrote to memory of 656 2960 AE24.exe 92 PID 2520 wrote to memory of 1152 2520 Process not Found 93 PID 2520 wrote to memory of 1152 2520 Process not Found 93 PID 2520 wrote to memory of 1152 2520 Process not Found 93 PID 2520 wrote to memory of 1152 2520 Process not Found 93 PID 2520 wrote to memory of 1708 2520 Process not Found 94 PID 2520 wrote to memory of 1708 2520 Process not Found 94 PID 2520 wrote to memory of 1708 2520 Process not Found 94 PID 2520 wrote to memory of 4192 2520 Process not Found 95 PID 2520 wrote to memory of 4192 2520 Process not Found 95 PID 2520 wrote to memory of 4192 2520 Process not Found 95 PID 2520 wrote to memory of 4192 2520 Process not Found 95 PID 2520 wrote to memory of 3256 2520 Process not Found 96 PID 2520 wrote to memory of 3256 2520 Process not Found 96 PID 2520 wrote to memory of 3256 2520 Process not Found 96 PID 2520 wrote to memory of 372 2520 Process not Found 97 PID 2520 wrote to memory of 372 2520 Process not Found 97 PID 2520 wrote to memory of 372 2520 Process not Found 97 PID 2520 wrote to memory of 372 2520 Process not Found 97 PID 2520 wrote to memory of 4332 2520 Process not Found 98 PID 2520 wrote to memory of 4332 2520 Process not Found 98 PID 2520 wrote to memory of 4332 2520 Process not Found 98 PID 2520 wrote to memory of 4332 2520 Process not Found 98 PID 2520 wrote to memory of 1400 2520 Process not Found 99 PID 2520 wrote to memory of 1400 2520 Process not Found 99 PID 2520 wrote to memory of 1400 2520 Process not Found 99 PID 2520 wrote to memory of 1400 2520 Process not Found 99 PID 2520 wrote to memory of 428 2520 Process not Found 100 PID 2520 wrote to memory of 428 2520 Process not Found 100 PID 2520 wrote to memory of 428 2520 Process not Found 100 PID 2520 wrote to memory of 3076 2520 Process not Found 101 PID 2520 wrote to memory of 3076 2520 Process not Found 101 PID 2520 wrote to memory of 3076 2520 Process not Found 101 PID 2520 wrote to memory of 3076 2520 Process not Found 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ebf4b16a7b59e42a4bb77818d6fd31.exe"C:\Users\Admin\AppData\Local\Temp\26ebf4b16a7b59e42a4bb77818d6fd31.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4804
-
C:\Users\Admin\AppData\Local\Temp\A587.exeC:\Users\Admin\AppData\Local\Temp\A587.exe1⤵
- Executes dropped EXE
PID:3176
-
C:\Users\Admin\AppData\Local\Temp\A931.exeC:\Users\Admin\AppData\Local\Temp\A931.exe1⤵
- Executes dropped EXE
PID:3460
-
C:\Users\Admin\AppData\Local\Temp\AE24.exeC:\Users\Admin\AppData\Local\Temp\AE24.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:656
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1152
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1708
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4192
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3256
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:372
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4332
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1400
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:428
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
Filesize
1.0MB
MD5a47863a63a1fc5ed2ff15ec362212778
SHA16e28be0dc0a3fc248ce4d04856705fce9c23b977
SHA256f25844c12c72e3f984cc6afef123e01d7b2ab1d1955f1408fd86f8403a79c570
SHA5129f056168558cf37ac10d5fea9e86dd9bc09ae7ce3f158c7f66f5f6c63b461b88f10a5917d99cfad3b0d6f98e8b4657a558f2e28240a70d7e19bfd94d3244ae22
-
Filesize
1.0MB
MD5a47863a63a1fc5ed2ff15ec362212778
SHA16e28be0dc0a3fc248ce4d04856705fce9c23b977
SHA256f25844c12c72e3f984cc6afef123e01d7b2ab1d1955f1408fd86f8403a79c570
SHA5129f056168558cf37ac10d5fea9e86dd9bc09ae7ce3f158c7f66f5f6c63b461b88f10a5917d99cfad3b0d6f98e8b4657a558f2e28240a70d7e19bfd94d3244ae22