Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2023 06:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Service60.exe
Resource
win7-20230712-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Service60.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Service60.exe
-
Size
2.9MB
-
MD5
da6044ea382bd3085c2f038f16248fdc
-
SHA1
709c46e8c5654f257c56ac9c4f0044c7ba36a330
-
SHA256
ffc30d0aff690cb2ecb49a995fee23daaaa480bb442ed6401451a3dc0f8c1ccd
-
SHA512
1685d14d4f24115ca5a8c0f9ec6e6f3d7db4bb238df14b2b0f42e836763f521369dcebd8709981e069356a29614868db767c0272d90991db413e0c5654ec2531
-
SSDEEP
24576:haJkhSY5VDigzPHoGT2gufcmyHHzxMy+xCsJMscr:9SY5VDi2pEcHTJs1c
Score
10/10
Malware Config
Signatures
-
Panda Stealer payload 6 IoCs
resource yara_rule behavioral2/memory/2220-134-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral2/memory/2324-136-0x0000000000090000-0x00000000003CD000-memory.dmp family_pandastealer behavioral2/memory/2220-135-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral2/memory/2220-137-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral2/memory/2220-138-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer behavioral2/memory/2220-139-0x0000000000400000-0x00000000004A3000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2324 set thread context of 2220 2324 Service60.exe 82 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2220 2324 Service60.exe 82 PID 2324 wrote to memory of 2220 2324 Service60.exe 82 PID 2324 wrote to memory of 2220 2324 Service60.exe 82 PID 2324 wrote to memory of 2220 2324 Service60.exe 82 PID 2324 wrote to memory of 2220 2324 Service60.exe 82 PID 2324 wrote to memory of 2220 2324 Service60.exe 82 PID 2324 wrote to memory of 2220 2324 Service60.exe 82 PID 2324 wrote to memory of 2220 2324 Service60.exe 82 PID 2324 wrote to memory of 2220 2324 Service60.exe 82 PID 2324 wrote to memory of 2220 2324 Service60.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Service60.exe"C:\Users\Admin\AppData\Local\Temp\Service60.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:2220
-