Analysis
-
max time kernel
105s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
hack.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
hack.exe
Resource
win10v2004-20240802-en
General
-
Target
hack.exe
-
Size
4.9MB
-
MD5
a2665470d5074af084fbdac73abfce51
-
SHA1
d418ee23ac16427dd57448fcd37d9debeccec19c
-
SHA256
6b22ce132aec60bab2b31938e7e82d404bd92b91951adbc917ac370d4c20ec64
-
SHA512
7f9affe51ed17bcd2bcd02e1af31ba187cae5709447b1db0da54b6acba60fbcf54fba9dd554ac3322919a8da3cd250ff55840ce22aad4f5b7a2af991869e4a9e
-
SSDEEP
98304:vzIIYKj7uCz+msMeZB4dj44HjhDYlcFKL2tWAbPcvNZVc1Cq+:UIYKfkMeZBcphDbFKitW6U1ZVc4q
Malware Config
Extracted
pandastealer
1.11
http://cocojambo.collector-steal.ga
Signatures
-
Panda Stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x0026000000018e9f-16.dat family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ hack.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hack.exe -
Executes dropped EXE 3 IoCs
pid Process 3068 1.exe 2788 1473005173_MT (3).exe 2728 CompPkgSup.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Wine hack.exe -
Loads dropped DLL 3 IoCs
pid Process 1848 hack.exe 1848 hack.exe 1848 hack.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000c000000016d32-8.dat vmprotect behavioral1/memory/3068-31-0x0000000000320000-0x00000000007DB000-memory.dmp vmprotect behavioral1/memory/2728-43-0x0000000000860000-0x0000000000D1B000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\PackagesSupport = "C:\\ProgramData\\ComponentUpdater\\CompPkgSup.exe" reg.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 340 cmd.exe 1304 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1848 hack.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1473005173_MT (3).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2684 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 524 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1324 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1848 hack.exe 2788 1473005173_MT (3).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2684 taskkill.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1848 wrote to memory of 3068 1848 hack.exe 30 PID 1848 wrote to memory of 3068 1848 hack.exe 30 PID 1848 wrote to memory of 3068 1848 hack.exe 30 PID 1848 wrote to memory of 3068 1848 hack.exe 30 PID 1848 wrote to memory of 2788 1848 hack.exe 31 PID 1848 wrote to memory of 2788 1848 hack.exe 31 PID 1848 wrote to memory of 2788 1848 hack.exe 31 PID 1848 wrote to memory of 2788 1848 hack.exe 31 PID 3068 wrote to memory of 2784 3068 1.exe 32 PID 3068 wrote to memory of 2784 3068 1.exe 32 PID 3068 wrote to memory of 2784 3068 1.exe 32 PID 3068 wrote to memory of 2784 3068 1.exe 32 PID 2784 wrote to memory of 2684 2784 cmd.exe 34 PID 2784 wrote to memory of 2684 2784 cmd.exe 34 PID 2784 wrote to memory of 2684 2784 cmd.exe 34 PID 2784 wrote to memory of 2684 2784 cmd.exe 34 PID 3068 wrote to memory of 1304 3068 1.exe 36 PID 3068 wrote to memory of 1304 3068 1.exe 36 PID 3068 wrote to memory of 1304 3068 1.exe 36 PID 3068 wrote to memory of 1304 3068 1.exe 36 PID 3068 wrote to memory of 340 3068 1.exe 38 PID 3068 wrote to memory of 340 3068 1.exe 38 PID 3068 wrote to memory of 340 3068 1.exe 38 PID 3068 wrote to memory of 340 3068 1.exe 38 PID 3068 wrote to memory of 1324 3068 1.exe 40 PID 3068 wrote to memory of 1324 3068 1.exe 40 PID 3068 wrote to memory of 1324 3068 1.exe 40 PID 3068 wrote to memory of 1324 3068 1.exe 40 PID 3068 wrote to memory of 2288 3068 1.exe 42 PID 3068 wrote to memory of 2288 3068 1.exe 42 PID 3068 wrote to memory of 2288 3068 1.exe 42 PID 3068 wrote to memory of 2288 3068 1.exe 42 PID 1304 wrote to memory of 1964 1304 cmd.exe 43 PID 1304 wrote to memory of 1964 1304 cmd.exe 43 PID 1304 wrote to memory of 1964 1304 cmd.exe 43 PID 1304 wrote to memory of 1964 1304 cmd.exe 43 PID 340 wrote to memory of 2532 340 cmd.exe 44 PID 340 wrote to memory of 2532 340 cmd.exe 44 PID 340 wrote to memory of 2532 340 cmd.exe 44 PID 340 wrote to memory of 2532 340 cmd.exe 44 PID 2288 wrote to memory of 524 2288 cmd.exe 46 PID 2288 wrote to memory of 524 2288 cmd.exe 46 PID 2288 wrote to memory of 524 2288 cmd.exe 46 PID 2288 wrote to memory of 524 2288 cmd.exe 46 PID 992 wrote to memory of 2728 992 taskeng.exe 48 PID 992 wrote to memory of 2728 992 taskeng.exe 48 PID 992 wrote to memory of 2728 992 taskeng.exe 48 PID 992 wrote to memory of 2728 992 taskeng.exe 48 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1964 attrib.exe 2532 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hack.exe"C:\Users\Admin\AppData\Local\Temp\hack.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM CompPkgSup.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CompPkgSup.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ATTRIB +h +s C:\ProgramData\ComponentUpdater3⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\attrib.exeATTRIB +h +s C:\ProgramData\ComponentUpdater4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ATTRIB +h +s C:\ProgramData\ComponentUpdater\CompPkgSup.exe3⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\attrib.exeATTRIB +h +s C:\ProgramData\ComponentUpdater\CompPkgSup.exe4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2532
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "PackagesSupport" /tr "C:\ProgramData\ComponentUpdater\CompPkgSup.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "PackagesSupport" /d "C:\ProgramData\ComponentUpdater\CompPkgSup.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "PackagesSupport" /d "C:\ProgramData\ComponentUpdater\CompPkgSup.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1473005173_MT (3).exe"C:\Users\Admin\AppData\Local\Temp\1473005173_MT (3).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FF1D4EC3-9648-448F-8DD2-F30CD0BCCF3F} S-1-5-21-457978338-2990298471-2379561640-1000:WOUOSVRD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\ProgramData\ComponentUpdater\CompPkgSup.exeC:\ProgramData\ComponentUpdater\CompPkgSup.exe2⤵
- Executes dropped EXE
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD500f76520eafd1597c1ca4cfb5a7b8f35
SHA1323bcd00861a5f865c2b2aa89950327a0186bf86
SHA256ca97871ad8cb0750208ba9841c379eb9a400d0268e81324a4be8675f5dd57450
SHA5123d0881292f041e409301fc676f97833f9687c472b6986557ad33504941766de735909635878bb62bcfcc575aa819b7ea00fc6dcb02e6f319481da8a62a024dce
-
Filesize
681KB
MD5c649103edd7f794a9898900bb62feb6f
SHA1b3d4806569b0ba667e9841d123c99605be33c953
SHA2569426c2d9763ec31b64650702144bb2e3fa157cc7ad473ac819fc031969ad32a9
SHA5120b3e789911313f466cc4403c74b9fc2142c02f876a2825dca9791c3f028cff6b497bfc2108ce69bf3f8508e03941b441a6987a04f5638204f5eee266bf60a8f3