Analysis
-
max time kernel
1792s -
max time network
1595s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-02-2023 17:20
Static task
static1
Behavioral task
behavioral1
Sample
000165.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
000165.exe
Resource
win10v2004-20230220-en
General
-
Target
000165.exe
-
Size
1.9MB
-
MD5
ba7115a88a1f3f2abcbcbb40e9093505
-
SHA1
57b57c3b158055925979b7154326a1b8ecda03f4
-
SHA256
1deff3018628c28bea0312b3e126a2138a934edec119134e3a6cca7bb0aefa5e
-
SHA512
3d2d9cf68dea8bb4e5234b396f6e9e67e79cbd196ce640cb936a8a415c9b37cae9e9989f4b272b295f47fd65a32d92423e63abe30045bc12885db0ba249e4330
-
SSDEEP
49152:ABRAIJEM7Y4c8qOwlYb6pJL89eHWQQPlZlJ7:aLh73EmbKp89KhClZ/
Malware Config
Signatures
-
Panda Stealer payload 64 IoCs
resource yara_rule behavioral1/memory/1776-91-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-92-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-94-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-95-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-96-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-97-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-98-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-99-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-100-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-101-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-102-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-103-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-104-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-105-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-106-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-107-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-108-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-109-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-110-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-111-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-112-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-113-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-114-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-115-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-116-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-117-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-118-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-119-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-120-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-121-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-122-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-123-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-124-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-125-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-126-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-127-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-128-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-129-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-130-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-131-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-132-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-133-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-134-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-135-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-136-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-137-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-138-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-139-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-140-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-141-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-142-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-143-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-144-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-145-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-146-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-147-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-148-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-149-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-150-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-151-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-152-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-153-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-154-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer behavioral1/memory/1776-155-0x0000000001040000-0x000000000144A000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Executes dropped EXE 2 IoCs
pid Process 772 work.exe 1776 dwarg.exe -
Loads dropped DLL 4 IoCs
pid Process 572 cmd.exe 772 work.exe 772 work.exe 772 work.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe 1776 dwarg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1776 dwarg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1408 wrote to memory of 572 1408 000165.exe 28 PID 1408 wrote to memory of 572 1408 000165.exe 28 PID 1408 wrote to memory of 572 1408 000165.exe 28 PID 1408 wrote to memory of 572 1408 000165.exe 28 PID 572 wrote to memory of 772 572 cmd.exe 30 PID 572 wrote to memory of 772 572 cmd.exe 30 PID 572 wrote to memory of 772 572 cmd.exe 30 PID 572 wrote to memory of 772 572 cmd.exe 30 PID 772 wrote to memory of 1776 772 work.exe 31 PID 772 wrote to memory of 1776 772 work.exe 31 PID 772 wrote to memory of 1776 772 work.exe 31 PID 772 wrote to memory of 1776 772 work.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\000165.exe"C:\Users\Admin\AppData\Local\Temp\000165.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\dwarg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\dwarg.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
1.7MB
MD516ae950fa8755ba3792c3c2a9acd1f01
SHA1a9c6563a0ed440cda17f3c7db420cd27b3fcab5b
SHA256b5166ba06d9d93c73efeaadde520001bbe3cc6fad56b9c1cdfb1303609cafb6f
SHA5123e032d82e07e1fca62ef6ee6292295761ccd2066f44c2e43e73237e4c3492ecdb919e277f5d8e84d0d25fd7bbe25e0af20bcb4b89f0bc588b08a704fbefec8bd
-
Filesize
1.7MB
MD516ae950fa8755ba3792c3c2a9acd1f01
SHA1a9c6563a0ed440cda17f3c7db420cd27b3fcab5b
SHA256b5166ba06d9d93c73efeaadde520001bbe3cc6fad56b9c1cdfb1303609cafb6f
SHA5123e032d82e07e1fca62ef6ee6292295761ccd2066f44c2e43e73237e4c3492ecdb919e277f5d8e84d0d25fd7bbe25e0af20bcb4b89f0bc588b08a704fbefec8bd
-
Filesize
1.4MB
MD518f763a122078328f748e6865f813967
SHA1839c148beb6a144330d3690a1831cee004a64b2b
SHA256e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d
SHA512fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe
-
Filesize
1.4MB
MD518f763a122078328f748e6865f813967
SHA1839c148beb6a144330d3690a1831cee004a64b2b
SHA256e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d
SHA512fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe
-
Filesize
1.4MB
MD518f763a122078328f748e6865f813967
SHA1839c148beb6a144330d3690a1831cee004a64b2b
SHA256e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d
SHA512fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe
-
Filesize
1.7MB
MD516ae950fa8755ba3792c3c2a9acd1f01
SHA1a9c6563a0ed440cda17f3c7db420cd27b3fcab5b
SHA256b5166ba06d9d93c73efeaadde520001bbe3cc6fad56b9c1cdfb1303609cafb6f
SHA5123e032d82e07e1fca62ef6ee6292295761ccd2066f44c2e43e73237e4c3492ecdb919e277f5d8e84d0d25fd7bbe25e0af20bcb4b89f0bc588b08a704fbefec8bd
-
Filesize
1.4MB
MD518f763a122078328f748e6865f813967
SHA1839c148beb6a144330d3690a1831cee004a64b2b
SHA256e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d
SHA512fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe
-
Filesize
1.4MB
MD518f763a122078328f748e6865f813967
SHA1839c148beb6a144330d3690a1831cee004a64b2b
SHA256e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d
SHA512fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe
-
Filesize
1.4MB
MD518f763a122078328f748e6865f813967
SHA1839c148beb6a144330d3690a1831cee004a64b2b
SHA256e438b9bde4c5d29c463a697ebcf0480bd69fe775c11ebe38628262e6e0520b9d
SHA512fdb9728af46f057dfc181471ce8e586f3afa0f3e85ed7512f06f3982e3789399b377aee3e23dfc0cae5f3e82b13350f5ae024231540d5b26ff0b25ae4ca52fbe