Analysis
-
max time kernel
130s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 13:47
Behavioral task
behavioral1
Sample
d3aae7eeb8c80b9c78f822f247971f0c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3aae7eeb8c80b9c78f822f247971f0c.exe
Resource
win10v2004-20231215-en
General
-
Target
d3aae7eeb8c80b9c78f822f247971f0c.exe
-
Size
761KB
-
MD5
d3aae7eeb8c80b9c78f822f247971f0c
-
SHA1
a8738db1821c4db3b17cfc9d85e95ecd8bcf2bf0
-
SHA256
789ed5dea5048cc4f14f02c36e137a95781b5ae4b167e0c3822cff4f3c98ac01
-
SHA512
aa51f9db5dead2adcdd0df809b9815c4c1ae3ecf36d107cde7423315ff5312b2896013d2203274841a19734660e96f748148b8d5bb6a4659d0fe012a921b50c0
-
SSDEEP
12288:vcgz2TCOy/o8LudKs/90+cr5xq9FAfiMZp7qKblsIgFm8gdosZ5TguHaO+yD41V0:vcgz2TCO+tEp0+cr5xq0fiMZp776IZdx
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 d3aae7eeb8c80b9c78f822f247971f0c.exe 2396 d3aae7eeb8c80b9c78f822f247971f0c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4536 2396 d3aae7eeb8c80b9c78f822f247971f0c.exe 84 PID 2396 wrote to memory of 4536 2396 d3aae7eeb8c80b9c78f822f247971f0c.exe 84 PID 2396 wrote to memory of 4536 2396 d3aae7eeb8c80b9c78f822f247971f0c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3aae7eeb8c80b9c78f822f247971f0c.exe"C:\Users\Admin\AppData\Local\Temp\d3aae7eeb8c80b9c78f822f247971f0c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd.exe /C Del /f /q "C:\Users\Admin\AppData\Local\Temp\d3aae7eeb8c80b9c78f822f247971f0c.exe"2⤵PID:4536
-