Resubmissions

27-02-2023 17:20

230227-vww2dseg95 10

27-02-2023 17:14

230227-vrzlqaee6t 10

Analysis

  • max time kernel
    1792s
  • max time network
    1595s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2023 17:20

General

  • Target

    000165.exe

  • Size

    1.9MB

  • MD5

    ba7115a88a1f3f2abcbcbb40e9093505

  • SHA1

    57b57c3b158055925979b7154326a1b8ecda03f4

  • SHA256

    1deff3018628c28bea0312b3e126a2138a934edec119134e3a6cca7bb0aefa5e

  • SHA512

    3d2d9cf68dea8bb4e5234b396f6e9e67e79cbd196ce640cb936a8a415c9b37cae9e9989f4b272b295f47fd65a32d92423e63abe30045bc12885db0ba249e4330

  • SSDEEP

    49152:ABRAIJEM7Y4c8qOwlYb6pJL89eHWQQPlZlJ7:aLh73EmbKp89KhClZ/

Score
10/10

Malware Config

Signatures

  • Panda Stealer payload 64 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\000165.exe
    "C:\Users\Admin\AppData\Local\Temp\000165.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
        work.exe -priverdD
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\dwarg.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\dwarg.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetWindowsHookEx
          PID:1776

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat
    Filesize

    35B

    MD5

    ff59d999beb970447667695ce3273f75

    SHA1

    316fa09f467ba90ac34a054daf2e92e6e2854ff8

    SHA256

    065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2

    SHA512

    d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat
    Filesize

    35B

    MD5

    ff59d999beb970447667695ce3273f75

    SHA1

    316fa09f467ba90ac34a054daf2e92e6e2854ff8

    SHA256

    065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2

    SHA512

    d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
    Filesize

    1.7MB

    MD5

    16ae950fa8755ba3792c3c2a9acd1f01

    SHA1

    a9c6563a0ed440cda17f3c7db420cd27b3fcab5b

    SHA256

    b5166ba06d9d93c73efeaadde520001bbe3cc6fad56b9c1cdfb1303609cafb6f

    SHA512

    3e032d82e07e1fca62ef6ee6292295761ccd2066f44c2e43e73237e4c3492ecdb919e277f5d8e84d0d25fd7bbe25e0af20bcb4b89f0bc588b08a704fbefec8bd

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
    Filesize

    1.7MB

    MD5

    16ae950fa8755ba3792c3c2a9acd1f01

    SHA1

    a9c6563a0ed440cda17f3c7db420cd27b3fcab5b

    SHA256

    b5166ba06d9d93c73efeaadde520001bbe3cc6fad56b9c1cdfb1303609cafb6f

    SHA512

    3e032d82e07e1fca62ef6ee6292295761ccd2066f44c2e43e73237e4c3492ecdb919e277f5d8e84d0d25fd7bbe25e0af20bcb4b89f0bc588b08a704fbefec8bd

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\dwarg.exe
    Filesize

    1.4MB

    MD5

    18f763a122078328f748e6865f813967

    SHA1

    839c148beb6a144330d3690a1831cee004a64b2b

    SHA256

    e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d

    SHA512

    fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\dwarg.exe
    Filesize

    1.4MB

    MD5

    18f763a122078328f748e6865f813967

    SHA1

    839c148beb6a144330d3690a1831cee004a64b2b

    SHA256

    e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d

    SHA512

    fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe

  • \??\c:\users\admin\appdata\local\temp\rarsfx1\dwarg.exe
    Filesize

    1.4MB

    MD5

    18f763a122078328f748e6865f813967

    SHA1

    839c148beb6a144330d3690a1831cee004a64b2b

    SHA256

    e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d

    SHA512

    fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe

  • \Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
    Filesize

    1.7MB

    MD5

    16ae950fa8755ba3792c3c2a9acd1f01

    SHA1

    a9c6563a0ed440cda17f3c7db420cd27b3fcab5b

    SHA256

    b5166ba06d9d93c73efeaadde520001bbe3cc6fad56b9c1cdfb1303609cafb6f

    SHA512

    3e032d82e07e1fca62ef6ee6292295761ccd2066f44c2e43e73237e4c3492ecdb919e277f5d8e84d0d25fd7bbe25e0af20bcb4b89f0bc588b08a704fbefec8bd

  • \Users\Admin\AppData\Local\Temp\RarSFX1\dwarg.exe
    Filesize

    1.4MB

    MD5

    18f763a122078328f748e6865f813967

    SHA1

    839c148beb6a144330d3690a1831cee004a64b2b

    SHA256

    e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d

    SHA512

    fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe

  • \Users\Admin\AppData\Local\Temp\RarSFX1\dwarg.exe
    Filesize

    1.4MB

    MD5

    18f763a122078328f748e6865f813967

    SHA1

    839c148beb6a144330d3690a1831cee004a64b2b

    SHA256

    e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d

    SHA512

    fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe

  • \Users\Admin\AppData\Local\Temp\RarSFX1\dwarg.exe
    Filesize

    1.4MB

    MD5

    18f763a122078328f748e6865f813967

    SHA1

    839c148beb6a144330d3690a1831cee004a64b2b

    SHA256

    e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d

    SHA512

    fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe

  • memory/772-90-0x0000000003750000-0x0000000003B5A000-memory.dmp
    Filesize

    4.0MB

  • memory/772-93-0x0000000003750000-0x0000000003B5A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-116-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-124-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-92-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-94-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-95-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-96-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-97-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-98-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-99-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-100-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-101-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-102-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-103-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-104-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-105-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-106-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-107-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-108-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-109-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-110-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-111-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-112-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-113-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-114-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-115-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-88-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-117-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-118-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-119-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-120-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-121-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-122-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-123-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-91-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-125-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-126-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-127-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-128-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-129-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-130-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-131-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-132-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-133-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-134-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-135-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-136-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-137-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-138-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-139-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-140-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-141-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-142-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-143-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-144-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-145-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-146-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-147-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-148-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-149-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-150-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-151-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-152-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-153-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-154-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-155-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB

  • memory/1776-156-0x0000000001040000-0x000000000144A000-memory.dmp
    Filesize

    4.0MB