Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27-02-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
a7e7c55d763359f4b590ea4eec10b800.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a7e7c55d763359f4b590ea4eec10b800.exe
Resource
win10v2004-20240226-en
General
-
Target
a7e7c55d763359f4b590ea4eec10b800.exe
-
Size
430KB
-
MD5
a7e7c55d763359f4b590ea4eec10b800
-
SHA1
c9c9c25f0f90048face442c607428cfbfdc3798b
-
SHA256
7ea4937a54c4f1373be662d2a8c3bb4aa34faf25dff90318921bdc5a5853524c
-
SHA512
71fedc8d1d8961c9e253876f66f434694fe7df200d391af577602a83046bc4698bb174cb93ecc78ef9bb4b75fa19cf15d35d21f4b349c29fd22008c4089bd08a
-
SSDEEP
6144:e/U771TbuciCpDrVoOdwruNfqpKkP2sv/3gh6CMqEfRYM43Tj6QdSkUvd:jIhCpDrVjD9qKU2NhynGj6QdSHvd
Malware Config
Signatures
-
Panda Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/2076-4-0x0000000000400000-0x000000000047A000-memory.dmp family_pandastealer behavioral1/memory/2076-7-0x0000000000400000-0x000000000047A000-memory.dmp family_pandastealer behavioral1/memory/2076-8-0x0000000000400000-0x000000000047A000-memory.dmp family_pandastealer behavioral1/memory/2076-15-0x0000000000400000-0x000000000047A000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/2076-4-0x0000000000400000-0x000000000047A000-memory.dmp shurk_stealer behavioral1/memory/2076-7-0x0000000000400000-0x000000000047A000-memory.dmp shurk_stealer behavioral1/memory/2076-8-0x0000000000400000-0x000000000047A000-memory.dmp shurk_stealer behavioral1/memory/2076-15-0x0000000000400000-0x000000000047A000-memory.dmp shurk_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2340 set thread context of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2076 a7e7c55d763359f4b590ea4eec10b800.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2340 a7e7c55d763359f4b590ea4eec10b800.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29 PID 2340 wrote to memory of 2076 2340 a7e7c55d763359f4b590ea4eec10b800.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7e7c55d763359f4b590ea4eec10b800.exe"C:\Users\Admin\AppData\Local\Temp\a7e7c55d763359f4b590ea4eec10b800.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\a7e7c55d763359f4b590ea4eec10b800.exeC:\Users\Admin\AppData\Local\Temp\a7e7c55d763359f4b590ea4eec10b800.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-