Analysis
-
max time kernel
140s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 13:28
Static task
static1
Behavioral task
behavioral1
Sample
67bb394e3f08886c8efcbb095326e668.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67bb394e3f08886c8efcbb095326e668.exe
Resource
win10v2004-20231215-en
General
-
Target
67bb394e3f08886c8efcbb095326e668.exe
-
Size
1016KB
-
MD5
67bb394e3f08886c8efcbb095326e668
-
SHA1
985f91f46a51a1aba14fe54eff745c1297c95059
-
SHA256
f98599fb97f7bf78335f2be4b6e1d702dc2f2a5d3ae6ed3e5241d76f7d7a916d
-
SHA512
02810c59a1b13fb42dc08ab4f742866e53ef0f67af3e4c5dffb7726aa348552eb324dee0bf317b24b9725af12d69b1d6e5509f293f0e8150bc2eddf934c21d18
-
SSDEEP
24576:KqzOi5P5H/PPt06BU2YjaRYHIV+s/mjlZ:KqzOKR3y6u2BWk+ZjlZ
Malware Config
Signatures
-
Panda Stealer payload 5 IoCs
resource yara_rule behavioral2/memory/1420-8-0x0000000000400000-0x0000000000481000-memory.dmp family_pandastealer behavioral2/memory/1420-9-0x0000000000400000-0x0000000000481000-memory.dmp family_pandastealer behavioral2/memory/1420-11-0x0000000000400000-0x0000000000481000-memory.dmp family_pandastealer behavioral2/memory/1420-14-0x0000000000400000-0x0000000000481000-memory.dmp family_pandastealer behavioral2/memory/1420-38-0x0000000000400000-0x0000000000481000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 5 IoCs
resource yara_rule behavioral2/memory/1420-8-0x0000000000400000-0x0000000000481000-memory.dmp shurk_stealer behavioral2/memory/1420-9-0x0000000000400000-0x0000000000481000-memory.dmp shurk_stealer behavioral2/memory/1420-11-0x0000000000400000-0x0000000000481000-memory.dmp shurk_stealer behavioral2/memory/1420-14-0x0000000000400000-0x0000000000481000-memory.dmp shurk_stealer behavioral2/memory/1420-38-0x0000000000400000-0x0000000000481000-memory.dmp shurk_stealer -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/2376-7-0x0000000005160000-0x0000000005170000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1420 AddInProcess32.exe 1420 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2376 67bb394e3f08886c8efcbb095326e668.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96 PID 2376 wrote to memory of 1420 2376 67bb394e3f08886c8efcbb095326e668.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\67bb394e3f08886c8efcbb095326e668.exe"C:\Users\Admin\AppData\Local\Temp\67bb394e3f08886c8efcbb095326e668.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-