Overview
overview
10Static
static
3ddos-reaper (2).7z
windows7-x64
10ddos-reaper (2).7z
windows10-2004-x64
10ddos-reape...-0.dll
windows10-2004-x64
1ddos-reape...-0.dll
windows10-2004-x64
1ddos-reape...er.exe
windows7-x64
10ddos-reape...er.exe
windows10-2004-x64
10ddos-reape...rs.txt
windows7-x64
1ddos-reape...rs.txt
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 04:41
Static task
static1
Behavioral task
behavioral1
Sample
ddos-reaper (2).7z
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ddos-reaper (2).7z
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ddos-reaper/api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
ddos-reaper/api-ms-win-crt-utility-l1-1-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
ddos-reaper/ddos-reaper.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ddos-reaper/ddos-reaper.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
ddos-reaper/headers.txt
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
ddos-reaper/headers.txt
Resource
win10v2004-20240226-en
General
-
Target
ddos-reaper (2).7z
-
Size
1.2MB
-
MD5
359d6a3b91cafd2e9409d32b50e69feb
-
SHA1
401c0df087cd72461751b80f9800d22e5b2c5fe0
-
SHA256
933a3b090613a423aa7f9486e5a779f57a967776d8b154a40c078e2bff33f526
-
SHA512
ad6d54221e1b857b564be496cac3320bd30d197b87d5e3f6f9c24138f154bf051d178631417cd1726f9340d9b91ced19c159bf8f665defb9d77e2f155fd012bc
-
SSDEEP
24576:kS7p30yyt8cDQsemqxQkqOsnfY5uIXVzZxJwqlJWcoaQm:kS7p30y87DQCHi55VzZAqlJWhg
Malware Config
Signatures
-
Panda Stealer payload 5 IoCs
resource yara_rule behavioral1/memory/2184-81-0x0000000003500000-0x0000000003589000-memory.dmp family_pandastealer behavioral1/memory/1616-95-0x0000000000400000-0x000000000048D000-memory.dmp family_pandastealer behavioral1/memory/1616-105-0x0000000000400000-0x000000000048D000-memory.dmp family_pandastealer behavioral1/memory/2624-108-0x0000000003500000-0x0000000003589000-memory.dmp family_pandastealer behavioral1/memory/944-158-0x0000000003500000-0x0000000003589000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
PhoenixStealer
PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.
-
Executes dropped EXE 3 IoCs
pid Process 2184 ddos-reaper.exe 2624 ddos-reaper.exe 944 ddos-reaper.exe -
Loads dropped DLL 2 IoCs
pid Process 944 ddos-reaper.exe 944 ddos-reaper.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2184 set thread context of 1616 2184 ddos-reaper.exe 32 PID 2624 set thread context of 624 2624 ddos-reaper.exe 35 PID 944 set thread context of 1748 944 ddos-reaper.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2576 7zFM.exe 2576 7zFM.exe 1616 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 2576 7zFM.exe Token: 35 2576 7zFM.exe Token: SeSecurityPrivilege 2576 7zFM.exe Token: SeSecurityPrivilege 2576 7zFM.exe Token: SeSecurityPrivilege 2576 7zFM.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2576 7zFM.exe 2576 7zFM.exe 2576 7zFM.exe 2576 7zFM.exe 2576 7zFM.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2576 2344 cmd.exe 29 PID 2344 wrote to memory of 2576 2344 cmd.exe 29 PID 2344 wrote to memory of 2576 2344 cmd.exe 29 PID 2576 wrote to memory of 2184 2576 7zFM.exe 30 PID 2576 wrote to memory of 2184 2576 7zFM.exe 30 PID 2576 wrote to memory of 2184 2576 7zFM.exe 30 PID 2576 wrote to memory of 2184 2576 7zFM.exe 30 PID 2576 wrote to memory of 2624 2576 7zFM.exe 31 PID 2576 wrote to memory of 2624 2576 7zFM.exe 31 PID 2576 wrote to memory of 2624 2576 7zFM.exe 31 PID 2576 wrote to memory of 2624 2576 7zFM.exe 31 PID 2184 wrote to memory of 1616 2184 ddos-reaper.exe 32 PID 2184 wrote to memory of 1616 2184 ddos-reaper.exe 32 PID 2184 wrote to memory of 1616 2184 ddos-reaper.exe 32 PID 2184 wrote to memory of 1616 2184 ddos-reaper.exe 32 PID 2184 wrote to memory of 1616 2184 ddos-reaper.exe 32 PID 2184 wrote to memory of 1616 2184 ddos-reaper.exe 32 PID 2184 wrote to memory of 1616 2184 ddos-reaper.exe 32 PID 2184 wrote to memory of 1616 2184 ddos-reaper.exe 32 PID 2184 wrote to memory of 1616 2184 ddos-reaper.exe 32 PID 2624 wrote to memory of 624 2624 ddos-reaper.exe 35 PID 2624 wrote to memory of 624 2624 ddos-reaper.exe 35 PID 2624 wrote to memory of 624 2624 ddos-reaper.exe 35 PID 2624 wrote to memory of 624 2624 ddos-reaper.exe 35 PID 2624 wrote to memory of 624 2624 ddos-reaper.exe 35 PID 2624 wrote to memory of 624 2624 ddos-reaper.exe 35 PID 2624 wrote to memory of 624 2624 ddos-reaper.exe 35 PID 2624 wrote to memory of 624 2624 ddos-reaper.exe 35 PID 2624 wrote to memory of 624 2624 ddos-reaper.exe 35 PID 944 wrote to memory of 1748 944 ddos-reaper.exe 38 PID 944 wrote to memory of 1748 944 ddos-reaper.exe 38 PID 944 wrote to memory of 1748 944 ddos-reaper.exe 38 PID 944 wrote to memory of 1748 944 ddos-reaper.exe 38 PID 944 wrote to memory of 1748 944 ddos-reaper.exe 38 PID 944 wrote to memory of 1748 944 ddos-reaper.exe 38 PID 944 wrote to memory of 1748 944 ddos-reaper.exe 38 PID 944 wrote to memory of 1748 944 ddos-reaper.exe 38 PID 944 wrote to memory of 1748 944 ddos-reaper.exe 38
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ddos-reaper (2).7z"1⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ddos-reaper (2).7z"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\7zO01AB8E16\ddos-reaper.exe"C:\Users\Admin\AppData\Local\Temp\7zO01AB8E16\ddos-reaper.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO01A87FA6\ddos-reaper.exe"C:\Users\Admin\AppData\Local\Temp\7zO01A87FA6\ddos-reaper.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:624
-
-
-
-
C:\Users\Admin\Desktop\ddos-reaper\ddos-reaper.exe"C:\Users\Admin\Desktop\ddos-reaper\ddos-reaper.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5dd20876bf25544aa55e0c3725103c666
SHA1d00d689de9f35159188935d3bd93677c807ed655
SHA25633e5d605c1c13a995d4a2d7cb9dca9facda4c97c1c7b41dc349cc756bfc0bd67
SHA5128e88e8777717d203065144ce594e18f86048c83c83d06ef06f0255f42c0de1bfdb1da2faad2bb39da52a652eb4267af79a84d2822afb6e5e31e27899b70ab9fc
-
Filesize
938KB
MD5efc58bf59658217c66218094b45dba17
SHA1945d40c771cb2c9d780f4adece5f33ce47d798a4
SHA25635a0e33e4fa16282c5a59be9ccc306a615439ad77e5fbdb3bd9fe8e317372806
SHA512d59dd85372207f589167195d99eb75b938188b080a88db452d27bcf4142bca692bc3e6db5f2f88302886b4d87f20d666cda4ec7d01e67a15e70e6760da652ad1
-
Filesize
17KB
MD5f816666e3fc087cd24828943cb15f260
SHA1eae814c9c41e3d333f43890ed7dafa3575e4c50e
SHA25645e0835b1d3b446fe2c347bd87922c53cfb6dd826499e19a1d977bf4c11b0e4a
SHA5126860abe8ab5220efb88f68b80e6c6e95fe35b4029f46b59bc467e3850fe671bda1c7c1c7b035b287bdfed5daeac879ee481d35330b153ea7ef2532970f62c581
-
Filesize
11KB
MD56f1a1dfb2761228ccc7d07b8b190054c
SHA1117d66360c84a0088626e22d8b3b4b685cb70d56
SHA256c81c4bba4e5f205359ad145963f6fbd074879047c66569f52b6d66711108e1ed
SHA512480b4f9179d5da56010fa90e1937fe3a232f2f8682596c16eeaed08f57cf8cffeaa506060429501764f695cb6c5b3e56b0037de948c4d0e3933f022a0b4103d2