Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-03-2024 13:47
Behavioral task
behavioral1
Sample
d3aae7eeb8c80b9c78f822f247971f0c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3aae7eeb8c80b9c78f822f247971f0c.exe
Resource
win10v2004-20231215-en
General
-
Target
d3aae7eeb8c80b9c78f822f247971f0c.exe
-
Size
761KB
-
MD5
d3aae7eeb8c80b9c78f822f247971f0c
-
SHA1
a8738db1821c4db3b17cfc9d85e95ecd8bcf2bf0
-
SHA256
789ed5dea5048cc4f14f02c36e137a95781b5ae4b167e0c3822cff4f3c98ac01
-
SHA512
aa51f9db5dead2adcdd0df809b9815c4c1ae3ecf36d107cde7423315ff5312b2896013d2203274841a19734660e96f748148b8d5bb6a4659d0fe012a921b50c0
-
SSDEEP
12288:vcgz2TCOy/o8LudKs/90+cr5xq9FAfiMZp7qKblsIgFm8gdosZ5TguHaO+yD41V0:vcgz2TCO+tEp0+cr5xq0fiMZp776IZdx
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Deletes itself 1 IoCs
pid Process 2580 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1736 d3aae7eeb8c80b9c78f822f247971f0c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2580 1736 d3aae7eeb8c80b9c78f822f247971f0c.exe 29 PID 1736 wrote to memory of 2580 1736 d3aae7eeb8c80b9c78f822f247971f0c.exe 29 PID 1736 wrote to memory of 2580 1736 d3aae7eeb8c80b9c78f822f247971f0c.exe 29 PID 1736 wrote to memory of 2580 1736 d3aae7eeb8c80b9c78f822f247971f0c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3aae7eeb8c80b9c78f822f247971f0c.exe"C:\Users\Admin\AppData\Local\Temp\d3aae7eeb8c80b9c78f822f247971f0c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd.exe /C Del /f /q "C:\Users\Admin\AppData\Local\Temp\d3aae7eeb8c80b9c78f822f247971f0c.exe"2⤵
- Deletes itself
PID:2580
-