Analysis
-
max time kernel
232s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-06-2023 18:58
Static task
static1
Behavioral task
behavioral1
Sample
Setup app.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Setup app.exe
Resource
win10v2004-20230220-en
General
-
Target
Setup app.exe
-
Size
8.5MB
-
MD5
3d1b6eebe4f703befa68842a2d0e9cb4
-
SHA1
df688e6cf11742bf8f6a65dee4bd52758f33660d
-
SHA256
ef9c84f01fb46f8ffc7829abc2b0de296fc2dc8ff93eee949c5f2171092b70da
-
SHA512
8d4844ee5de6e01336f9a67e64efd10ee305173a54dbf945a41fc5e0d71e6195b70127c9345069cdd816f07aa78021da2bfa3049f15831b07888844e50f4fd9c
-
SSDEEP
196608:35OllhOTapKB1erCbptqBYHvTYTVHJack+YlGlSRRbCvY:35WlhOTapG1erqpICHvTMacJYlTFP
Malware Config
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/300-220-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral1/memory/300-222-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral1/memory/300-223-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 612 Service64.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 612 set thread context of 300 612 Service64.exe 34 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2040 javaw.exe 2040 javaw.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2040 1368 Setup app.exe 28 PID 1368 wrote to memory of 2040 1368 Setup app.exe 28 PID 1368 wrote to memory of 2040 1368 Setup app.exe 28 PID 1368 wrote to memory of 2040 1368 Setup app.exe 28 PID 1368 wrote to memory of 2040 1368 Setup app.exe 28 PID 1368 wrote to memory of 2040 1368 Setup app.exe 28 PID 1368 wrote to memory of 2040 1368 Setup app.exe 28 PID 2040 wrote to memory of 520 2040 javaw.exe 29 PID 2040 wrote to memory of 520 2040 javaw.exe 29 PID 2040 wrote to memory of 520 2040 javaw.exe 29 PID 2040 wrote to memory of 520 2040 javaw.exe 29 PID 2040 wrote to memory of 520 2040 javaw.exe 29 PID 2040 wrote to memory of 520 2040 javaw.exe 29 PID 2040 wrote to memory of 520 2040 javaw.exe 29 PID 764 wrote to memory of 612 764 explorer.exe 31 PID 764 wrote to memory of 612 764 explorer.exe 31 PID 764 wrote to memory of 612 764 explorer.exe 31 PID 764 wrote to memory of 612 764 explorer.exe 31 PID 612 wrote to memory of 1968 612 Service64.exe 33 PID 612 wrote to memory of 1968 612 Service64.exe 33 PID 612 wrote to memory of 1968 612 Service64.exe 33 PID 612 wrote to memory of 1968 612 Service64.exe 33 PID 612 wrote to memory of 1968 612 Service64.exe 33 PID 612 wrote to memory of 1968 612 Service64.exe 33 PID 612 wrote to memory of 1968 612 Service64.exe 33 PID 612 wrote to memory of 1968 612 Service64.exe 33 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34 PID 612 wrote to memory of 300 612 Service64.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup app.exe"C:\Users\Admin\AppData\Local\Temp\Setup app.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe"C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "C:\Users\Admin\AppData\Local\Temp\Setup app.exe" org.develnext.jphp.ext.javafx.FXLauncher2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\Service64.exe3⤵PID:520
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Service64.exe"C:\Users\Admin\AppData\Local\Temp\Service64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:1968
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:300
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5c845efe0b7345f8a3bcfa5f7a5681b9b
SHA1f603aa58a11dc002161180b401e998ee7c2794ff
SHA256cb058d57e98615b394f8cdf007049b606781570cf7647b32cb7d100c651146d4
SHA512ac2478188aa2b57a147a38a0c344c9e3112b89a85d92750de61c267668ee9e6e3e208572456939c70559087d7fb32a8a199471f7a2a0d599b2cd83b9dd7f57dc
-
Filesize
1.5MB
MD5c845efe0b7345f8a3bcfa5f7a5681b9b
SHA1f603aa58a11dc002161180b401e998ee7c2794ff
SHA256cb058d57e98615b394f8cdf007049b606781570cf7647b32cb7d100c651146d4
SHA512ac2478188aa2b57a147a38a0c344c9e3112b89a85d92750de61c267668ee9e6e3e208572456939c70559087d7fb32a8a199471f7a2a0d599b2cd83b9dd7f57dc