Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-12-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
9bdffeeb52015df1699b7b0f0aa03cf4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9bdffeeb52015df1699b7b0f0aa03cf4.exe
Resource
win10v2004-20231215-en
General
-
Target
9bdffeeb52015df1699b7b0f0aa03cf4.exe
-
Size
10.9MB
-
MD5
9bdffeeb52015df1699b7b0f0aa03cf4
-
SHA1
b9d1f121926acd5a8b146e4675a30d7f8583d2bf
-
SHA256
57ad383c47b6423e48e44f750afc38f4e837db3c62eb59e10743d241625259e2
-
SHA512
4e45c2f7ebc96768453340dab5bc29d6a9e998c2c76e424e1af445e13cd89d3b9aafc5233957242fc2dede2e96d35e5cb038b7d3ce6fc47251cc7ca3094875d9
-
SSDEEP
196608:h5XOsmXgCe4WdIHlJMBJxxviqVVXBgl7ZSr/UyXL23QM2NCfV3d1R9fv7M:jOsmXMeHU9viqeFu8KigMFd1Rm
Malware Config
Extracted
pandastealer
1.11
http://f0565988.xsph.ru
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/2408-19-0x0000000001230000-0x0000000001BF4000-memory.dmp family_pandastealer behavioral1/memory/2408-30-0x0000000001230000-0x0000000001BF4000-memory.dmp family_pandastealer behavioral1/memory/2408-55-0x0000000001230000-0x0000000001BF4000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Executes dropped EXE 1 IoCs
pid Process 2408 Furios.exe -
Loads dropped DLL 4 IoCs
pid Process 1428 9bdffeeb52015df1699b7b0f0aa03cf4.exe 1428 9bdffeeb52015df1699b7b0f0aa03cf4.exe 1428 9bdffeeb52015df1699b7b0f0aa03cf4.exe 1428 9bdffeeb52015df1699b7b0f0aa03cf4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000c000000012251-5.dat vmprotect behavioral1/files/0x000c000000012251-7.dat vmprotect behavioral1/files/0x000c000000012251-8.dat vmprotect behavioral1/files/0x000c000000012251-18.dat vmprotect behavioral1/files/0x000c000000012251-17.dat vmprotect behavioral1/files/0x000c000000012251-12.dat vmprotect behavioral1/memory/2408-19-0x0000000001230000-0x0000000001BF4000-memory.dmp vmprotect behavioral1/memory/2408-30-0x0000000001230000-0x0000000001BF4000-memory.dmp vmprotect behavioral1/memory/2408-55-0x0000000001230000-0x0000000001BF4000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2408 Furios.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2408 Furios.exe 2408 Furios.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2408 1428 9bdffeeb52015df1699b7b0f0aa03cf4.exe 28 PID 1428 wrote to memory of 2408 1428 9bdffeeb52015df1699b7b0f0aa03cf4.exe 28 PID 1428 wrote to memory of 2408 1428 9bdffeeb52015df1699b7b0f0aa03cf4.exe 28 PID 1428 wrote to memory of 2408 1428 9bdffeeb52015df1699b7b0f0aa03cf4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bdffeeb52015df1699b7b0f0aa03cf4.exe"C:\Users\Admin\AppData\Local\Temp\9bdffeeb52015df1699b7b0f0aa03cf4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\Furios.exe"C:\Users\Admin\AppData\Local\Temp\Furios.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5872e9aea7b62b7235c3554468d7cf777
SHA1d3eb44184a1b04d04b0f3f6404360419b73405a3
SHA256f1b5f9ec19a904d22cd796f0e47547e9c408cf7faeb15ccb76d24ad587c77e56
SHA512216cf9b65822023828ecc0a16107fe9d3e5a32022ceeacfbaea9d51410b98ef160d5602af9cf712c7ac80c48d2bb48cee492512f37313c6554994fe8de2e8a3b
-
Filesize
365KB
MD5273caeb949b96b957221d3deec990c38
SHA18b510a227480f3f1d149817e82bc35ae5d064672
SHA2569c4b9ae3df3c72bd3e3a4ad5b0b800e116ab4b0b1d0dd0bd33eb1b80daf1fe12
SHA51287773afc9a503ffcccdeb80240c98f5e31c36aaa99e6c9ce5bb3d6ede14ab596d09557fe9e7edb549ece519b6eba1bedb0a1fbebb247fad23a89663d709105b1
-
Filesize
1.9MB
MD5ddd875cb5f990add95e0fdf4c6746020
SHA1942ee8a43f51e0595e0943e0b101ce0b2010b915
SHA256fb0aaad601b07844f94652f3af4e935be5c2ca515667c962ac623c0ee6076e0f
SHA512829bb6ba8bd9016dea92907a688bd401e9aa6322adcd73e7c13796fbc9372ac7da3ae305b82f9edf03401649eb413767333500159766b39d1b328c3203013bfe
-
Filesize
385KB
MD57d808ed46e13d92dfb0aa54d910b931c
SHA14181e6d26fcc96df3c899c07615c9856a947ce36
SHA25660762ebb147a22034f88378b1bae255c2bb7dc9f00d65a5f22ca9e6f98955a8e
SHA51218fccafd683ac8012bccbbfc457fdaa109db2c38740e21c21f9dd3fbf70396191b455c1cf359599e47857518625b7adadc2c4440c12ff67277ff9b23f17ea532
-
Filesize
1.7MB
MD5cc774377c065cf2e1dd47d5bf5e3beb9
SHA1f0850522ae46f3f8eb89ddabb3fa91b967c32aa0
SHA256dc8008b18dd663ced8773efa2fc2ed98973e209e794ca0eb726a796a2077a749
SHA5124321a9bdddc7a8813d6cdaab68e8b57fb5d403493b209a2ab243e84bdf2f4095368cd62f497208609ae5abe59e8387eca9d4e9186048baf11696052acf9fd324
-
Filesize
1.2MB
MD54d19ab1484e98cb170e50f9bdc590cd6
SHA1928768f326be44cd2ff9df19c05e947e622c3ec7
SHA256bc7a11430594ef79f1e1ffef9d53ee903cfeffc5af57c40f716757611987c3af
SHA5122e068a0faed45af936b7eca338d426d0ffa98046ac56459bd183c85dc2a6913dc245809701f1f7002e4ea944021f9e979141c401485962ee71cc2d59b1b2f3ac