Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02-08-2023 11:33
Behavioral task
behavioral1
Sample
b66f351c35212c7a265272d27aa09656.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b66f351c35212c7a265272d27aa09656.exe
Resource
win10v2004-20230703-en
General
-
Target
b66f351c35212c7a265272d27aa09656.exe
-
Size
4.4MB
-
MD5
b66f351c35212c7a265272d27aa09656
-
SHA1
c2994b2969f315b189a151d545b35a2c8ed6a2f9
-
SHA256
ba4c8e065f601de46ae7844e81921c68726d09345f3db13fb6e3f5ea2d413dde
-
SHA512
82ac249a9024085be3bd071682d15054696b0cd61a8b8a85d77c7ff4cd7703124ab07a3446b1b7b69015b5a30643f88030bef908644c88256d1784f992207fcb
-
SSDEEP
98304:sParA5bJxdz0l3YIMFQxMKsVCyGPPUpGieNjBVTRB7OQ8TZMQ7caYS3u:6a6rwlLSQxMKeiVRpSnYvIu
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2068-54-0x000000013FCE0000-0x00000001408F1000-memory.dmp upx behavioral1/memory/2068-114-0x000000013FCE0000-0x00000001408F1000-memory.dmp upx -
Executes dropped EXE 1 IoCs
Processes:
nPandaVPN.exepid process 2780 nPandaVPN.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
nPandaVPN.exepid process 2780 nPandaVPN.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
b66f351c35212c7a265272d27aa09656.exepid process 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe 2068 b66f351c35212c7a265272d27aa09656.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b66f351c35212c7a265272d27aa09656.exedescription pid process Token: SeDebugPrivilege 2068 b66f351c35212c7a265272d27aa09656.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
b66f351c35212c7a265272d27aa09656.execmd.exedescription pid process target process PID 2068 wrote to memory of 1644 2068 b66f351c35212c7a265272d27aa09656.exe cmd.exe PID 2068 wrote to memory of 1644 2068 b66f351c35212c7a265272d27aa09656.exe cmd.exe PID 2068 wrote to memory of 1644 2068 b66f351c35212c7a265272d27aa09656.exe cmd.exe PID 1644 wrote to memory of 2780 1644 cmd.exe nPandaVPN.exe PID 1644 wrote to memory of 2780 1644 cmd.exe nPandaVPN.exe PID 1644 wrote to memory of 2780 1644 cmd.exe nPandaVPN.exe PID 1644 wrote to memory of 2780 1644 cmd.exe nPandaVPN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b66f351c35212c7a265272d27aa09656.exe"C:\Users\Admin\AppData\Local\Temp\b66f351c35212c7a265272d27aa09656.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\cmd.execmd /C nPandaVPN.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\nPandaVPN.exenPandaVPN.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2780
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
2.1MB
MD5c83323d126469b0eaab04876edd391a3
SHA1dc9b1aeb0535cc30eff5f298e81de1476ec8e02a
SHA256318f8b901a0c9226f41409e97c4167cdf1836508f969ab13b8e004b4f6c9caac
SHA512edde3c33d83b5ba1d527073afbf99568737a82d1142003b7163d5c037e536761a7472b0245a85e0dcab9c89790a82a7470a57b2f1829e75875a92b8495825487
-
Filesize
2.1MB
MD5c83323d126469b0eaab04876edd391a3
SHA1dc9b1aeb0535cc30eff5f298e81de1476ec8e02a
SHA256318f8b901a0c9226f41409e97c4167cdf1836508f969ab13b8e004b4f6c9caac
SHA512edde3c33d83b5ba1d527073afbf99568737a82d1142003b7163d5c037e536761a7472b0245a85e0dcab9c89790a82a7470a57b2f1829e75875a92b8495825487