Analysis
-
max time kernel
140s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 06:00
Static task
static1
Behavioral task
behavioral1
Sample
73bdcc9555fc1bad7922968d96da189a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73bdcc9555fc1bad7922968d96da189a.exe
Resource
win10v2004-20231215-en
General
-
Target
73bdcc9555fc1bad7922968d96da189a.exe
-
Size
5.8MB
-
MD5
73bdcc9555fc1bad7922968d96da189a
-
SHA1
b442030efe8dae7c3930078d36e894f64ac1dce8
-
SHA256
0e43398f20329effd2c9166408830520f7a65bb97fe731e7adf9cbc23321550b
-
SHA512
2afe42feafc4b8c5b9280f8928201704f9532b8a3730da449a8d9522100a308a8608fd87da741e48f748a4c802de7793f8e0567e94276bd9eeb088dfdc6fd5d4
-
SSDEEP
98304:JsRH1pBhhBQSmT60Gn2lxmhVXpbB8NWjEecyE4+thl/cgJprckjjlfcXVK:uNhaSmT60GnTh15B8G5cW+fZcwjn
Malware Config
Extracted
pandastealer
1.11
http://f0577083.xsph.ru
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/1588-9-0x0000000000C30000-0x00000000015D3000-memory.dmp family_pandastealer behavioral2/memory/1588-12-0x0000000000C30000-0x00000000015D3000-memory.dmp family_pandastealer behavioral2/memory/1588-49-0x0000000000C30000-0x00000000015D3000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 73bdcc9555fc1bad7922968d96da189a.exe -
Executes dropped EXE 1 IoCs
pid Process 1588 build.vmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000700000002321b-4.dat vmprotect behavioral2/files/0x000700000002321b-7.dat vmprotect behavioral2/files/0x000700000002321b-8.dat vmprotect behavioral2/memory/1588-9-0x0000000000C30000-0x00000000015D3000-memory.dmp vmprotect behavioral2/memory/1588-12-0x0000000000C30000-0x00000000015D3000-memory.dmp vmprotect behavioral2/memory/1588-49-0x0000000000C30000-0x00000000015D3000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1588 build.vmp.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\%teamp% 73bdcc9555fc1bad7922968d96da189a.exe File created C:\Program Files (x86)\%teamp%\__tmp_rar_sfx_access_check_240611578 73bdcc9555fc1bad7922968d96da189a.exe File created C:\Program Files (x86)\%teamp%\build.vmp.exe 73bdcc9555fc1bad7922968d96da189a.exe File opened for modification C:\Program Files (x86)\%teamp%\build.vmp.exe 73bdcc9555fc1bad7922968d96da189a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1588 build.vmp.exe 1588 build.vmp.exe 1588 build.vmp.exe 1588 build.vmp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4080 wrote to memory of 1588 4080 73bdcc9555fc1bad7922968d96da189a.exe 92 PID 4080 wrote to memory of 1588 4080 73bdcc9555fc1bad7922968d96da189a.exe 92 PID 4080 wrote to memory of 1588 4080 73bdcc9555fc1bad7922968d96da189a.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\73bdcc9555fc1bad7922968d96da189a.exe"C:\Users\Admin\AppData\Local\Temp\73bdcc9555fc1bad7922968d96da189a.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files (x86)\%teamp%\build.vmp.exe"C:\Program Files (x86)\%teamp%\build.vmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD578095fe614c83b9f9787c4e125619439
SHA1f596b1cb5e9eca3137ddda30413d42b8cbaf6f25
SHA2562584d6e7871f418a8c023c2172af4afa0ebb73a909e7fe5ca87bbc0d1306c73c
SHA5124d1a610fae48d19fb24313828f542736326d0b97c62cc1b9674b5b2780d14360adc846ba8225c5e7d4f546f505d12dcaff9a07e85615abeb82ca8e7d6f79804d
-
Filesize
1023KB
MD50171dfe768394979c4e6ce18c1d24060
SHA1cb97833e0fbb602de63aa7d9403ff88afa3cdd3e
SHA2564548552e7c84901dd9bfac10444b76500cafc691920af3dbd1cbf4fae9da7326
SHA5125bd8500b9de87f3433d9a2831806e6a9b1c7a189bd8bbd8816340a8b233d78bc90a1ba10d2cb3df5c76e17ae2cbbb263bac2eb6e64cf9548708da8278f5cc5cc
-
Filesize
742KB
MD5d2806e00584674149aced7dbde778e30
SHA1de498a4af9f365530daef631514aeac4b79b29d6
SHA256e441ce2a58c8ea845e588bec4c43ae125bee865b290e8a0d59a92de49e315ffa
SHA51215a186b60736d066cc80dc520618a61b21d137b5ed2334270572d3e795807908807ec72949a1b8cdd8490d2f7d1c20d53a597a1603efc4012b4eff0ce3a5cc60