Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2023 00:05

General

  • Target

    0x000500000000073b-142.exe

  • Size

    829KB

  • MD5

    d7ecaa18abc939e94eb7b751e14c2b2d

  • SHA1

    40b6d5eff1347182fcc22ff9a8982282432786bd

  • SHA256

    433acf938a74ef9ab5f556679a00963e2d67dc4921281192f6a4d9de485270ae

  • SHA512

    15c1cf8195f5d715af1958754fd06693472a649657484bf68198d41dc4931ef48c1c6d092d3bf2dbca68541933b5151fc9b13970d3930b7d2d868d0aaf046f2e

  • SSDEEP

    24576:woJEKZ6IEGTMxapRl2PSwHTehy6BP+pXSh0vpB:wouKZ6iMqRl2PSwzehy6cpXSh0vpB

Malware Config

Extracted

Family

pandastealer

Version

1.11

C2

http://thisisgenk.temp.swtest.ru

Extracted

Family

pandastealer

Version

��H

C2

http://�H

Signatures

  • Panda Stealer payload 5 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000500000000073b-142.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000500000000073b-142.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\build.exe
      "C:\Users\Admin\AppData\Local\Temp\build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1624
    • C:\Users\Admin\AppData\Local\Temp\Kurome.Builder.exe
      "C:\Users\Admin\AppData\Local\Temp\Kurome.Builder.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 680
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1332

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Kurome.Builder.exe
    Filesize

    137KB

    MD5

    cf38a4bde3fe5456dcaf2b28d3bfb709

    SHA1

    711518af5fa13f921f3273935510627280730543

    SHA256

    c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

    SHA512

    3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

  • C:\Users\Admin\AppData\Local\Temp\Kurome.Builder.exe
    Filesize

    137KB

    MD5

    cf38a4bde3fe5456dcaf2b28d3bfb709

    SHA1

    711518af5fa13f921f3273935510627280730543

    SHA256

    c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

    SHA512

    3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    681KB

    MD5

    43aa2880830859585b3c6a15e915b8db

    SHA1

    6780b3f4d54a43b22223629e14c676addb3ac400

    SHA256

    378f2b1055dd7f1a150e0d86889b9bd3336225e38fc3c8cafb390ebf347ad46d

    SHA512

    6d35bd792aefe5c1b42caae9e50ed66967a74bb476985e17d3a5bc8d6b87111b7bb1af56cb216bff24f056da33bc14c4bddc81fabbfa07d569bab98ec679289d

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    681KB

    MD5

    43aa2880830859585b3c6a15e915b8db

    SHA1

    6780b3f4d54a43b22223629e14c676addb3ac400

    SHA256

    378f2b1055dd7f1a150e0d86889b9bd3336225e38fc3c8cafb390ebf347ad46d

    SHA512

    6d35bd792aefe5c1b42caae9e50ed66967a74bb476985e17d3a5bc8d6b87111b7bb1af56cb216bff24f056da33bc14c4bddc81fabbfa07d569bab98ec679289d

  • \Users\Admin\AppData\Local\Temp\Kurome.Builder.exe
    Filesize

    137KB

    MD5

    cf38a4bde3fe5456dcaf2b28d3bfb709

    SHA1

    711518af5fa13f921f3273935510627280730543

    SHA256

    c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

    SHA512

    3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

  • \Users\Admin\AppData\Local\Temp\Kurome.Builder.exe
    Filesize

    137KB

    MD5

    cf38a4bde3fe5456dcaf2b28d3bfb709

    SHA1

    711518af5fa13f921f3273935510627280730543

    SHA256

    c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

    SHA512

    3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

  • \Users\Admin\AppData\Local\Temp\Kurome.Builder.exe
    Filesize

    137KB

    MD5

    cf38a4bde3fe5456dcaf2b28d3bfb709

    SHA1

    711518af5fa13f921f3273935510627280730543

    SHA256

    c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

    SHA512

    3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

  • \Users\Admin\AppData\Local\Temp\Kurome.Builder.exe
    Filesize

    137KB

    MD5

    cf38a4bde3fe5456dcaf2b28d3bfb709

    SHA1

    711518af5fa13f921f3273935510627280730543

    SHA256

    c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

    SHA512

    3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

  • \Users\Admin\AppData\Local\Temp\Kurome.Builder.exe
    Filesize

    137KB

    MD5

    cf38a4bde3fe5456dcaf2b28d3bfb709

    SHA1

    711518af5fa13f921f3273935510627280730543

    SHA256

    c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

    SHA512

    3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

  • \Users\Admin\AppData\Local\Temp\Kurome.Builder.exe
    Filesize

    137KB

    MD5

    cf38a4bde3fe5456dcaf2b28d3bfb709

    SHA1

    711518af5fa13f921f3273935510627280730543

    SHA256

    c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

    SHA512

    3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

  • \Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    681KB

    MD5

    43aa2880830859585b3c6a15e915b8db

    SHA1

    6780b3f4d54a43b22223629e14c676addb3ac400

    SHA256

    378f2b1055dd7f1a150e0d86889b9bd3336225e38fc3c8cafb390ebf347ad46d

    SHA512

    6d35bd792aefe5c1b42caae9e50ed66967a74bb476985e17d3a5bc8d6b87111b7bb1af56cb216bff24f056da33bc14c4bddc81fabbfa07d569bab98ec679289d

  • \Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    681KB

    MD5

    43aa2880830859585b3c6a15e915b8db

    SHA1

    6780b3f4d54a43b22223629e14c676addb3ac400

    SHA256

    378f2b1055dd7f1a150e0d86889b9bd3336225e38fc3c8cafb390ebf347ad46d

    SHA512

    6d35bd792aefe5c1b42caae9e50ed66967a74bb476985e17d3a5bc8d6b87111b7bb1af56cb216bff24f056da33bc14c4bddc81fabbfa07d569bab98ec679289d

  • memory/468-76-0x0000000000830000-0x0000000000858000-memory.dmp
    Filesize

    160KB

  • memory/468-83-0x0000000004FA0000-0x0000000004FE0000-memory.dmp
    Filesize

    256KB

  • memory/468-84-0x0000000000380000-0x0000000000381000-memory.dmp
    Filesize

    4KB

  • memory/468-92-0x0000000004FA0000-0x0000000004FE0000-memory.dmp
    Filesize

    256KB

  • memory/1696-69-0x0000000000400000-0x00000000004D7000-memory.dmp
    Filesize

    860KB