Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2024 05:43

General

  • Target

    $TEMP/setup.exe

  • Size

    2.4MB

  • MD5

    b774d568aaf090164ec32291370cb341

  • SHA1

    f5a55bcd898ff2848df1bb067e5012951dfbc266

  • SHA256

    56e96195f7c806eb74503977eb61fd681b99ac14fcdb9f852d89ee46b0edc5ef

  • SHA512

    0ffe18d77b13e5a94be4575984982d4d583450821865821be9c7dcffcb2fb03a744b4ca530516ba8917eb2d130bf8767416259563ecefe511ccbf34254f52691

  • SSDEEP

    49152:QT1/JEQtPdZoRTrfDgHGRvrDZg5aa1ChFpqKiv+9:QTRtfoNDvlZ8aa1CMKx

Malware Config

Signatures

  • Panda Stealer payload 2 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 18 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\7zSB26E.tmp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSB26E.tmp\setup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Windows\SysWOW64\msiexec.exe
        "msiexec" /i "C:\Program Files (x86)\Downloaded Installers\{240D57C0-234A-4CAD-B6E7-DFDE6B0B1272}\setup.msi"
        3⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2772
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2471ADF3C4DC2086C0FC91DF6EADCF0F C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Program Files (x86)\SlimDrivers\SlimDrivers.exe
        "C:\Program Files (x86)\SlimDrivers\SlimDrivers.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2236
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1196
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003BC" "00000000000003B8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f77314f.rbs

    Filesize

    7KB

    MD5

    d33377bc6053ab2d9b1b49b4739c5299

    SHA1

    7285227fce2ff822e20fa717142cd5f79644f92a

    SHA256

    68610178b8282134a28518a876551bb2e909e673266a0b3f3380b05898f7e2a7

    SHA512

    3c5011b6a968ad246787752edc61d9a9814c2ce4475c26a5911da2b30632afe13b6e8ba77b7289319b2f249843e0112d705ee6d78078df54adf44368b529f412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\62B5AF9BE9ADC1085C3C56EC07A82BF6

    Filesize

    75KB

    MD5

    84fb59541357ebbac17a5dd906b3957e

    SHA1

    ef72d52c513b97a066a4922609862559645a6f7a

    SHA256

    44e527b61336921190fca1222af6ced398b67b36a7803c05525eb5dc9a18a93a

    SHA512

    8547ae3ebcf38b9c46b18ad0264222a93520bf55fd2fbbcbe757b61b5fd18d209817dae5dc432f12c65fae6be769da6f71c1b24afe03ef473854e1b00baeec01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B8944BA8AD0EFDF0E01A43EF62BECD0_0AEA4C6D6CCC81E7AABA17FA25994227

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    543ff9c4bb3fd6f4d35c0a80ba5533fc

    SHA1

    e318b6209faeffe8cde2dba71f226d2b161729af

    SHA256

    40c04d540c3d7d80564f34af3a512036bdd8e17b4ca74ba3b7e45d6d93466bcd

    SHA512

    6257994ac1ec8b99edcf0d666838a9874031a500adac9383d9b4242edc6c6ffec48f230740d443c1088aa911a36de26e7ce3b97313e3d36b00aede5352a8cf5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\62B5AF9BE9ADC1085C3C56EC07A82BF6

    Filesize

    212B

    MD5

    f1ef9e1765862e2732746f33c516ae55

    SHA1

    486eba33647222aee05f84b1d4a1a9339309278c

    SHA256

    f8528a90bc4f0638ebb86b21a25c50371d508840c01a9f6b3cf6b108342f3ef0

    SHA512

    dd23fc968b3200126bb626778545bab7e7bc54552b45f87ea072e6f26c9f9cd6dcf8815e264f83ff1ba3f72b1a5121b4f4b3a8f28ab2c9c98df9edf752f63398

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B8944BA8AD0EFDF0E01A43EF62BECD0_0AEA4C6D6CCC81E7AABA17FA25994227

    Filesize

    404B

    MD5

    54f7034b41718722feebf79ebfdadfa8

    SHA1

    b0c7d2cfab3ae681af2b88098f8c4b4092fd3139

    SHA256

    529f5aecfbe1fa12992aa0dfbfbf90ea52297b1dc4570ca7d68c7c22b6c028b2

    SHA512

    7df29e9fd2c7b1ad82547f7e99370956314c95d448a537f5dfe8d3a88484c9f6503950adc089b8c4c5895f89b6e2a402ee88455bc4b4a93a9230109f51fdec9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    d644ab5f6cf60163bca4b0788b167d44

    SHA1

    9d7c94f408bb7ff4301ca2ebc3923b7196c1c8bb

    SHA256

    c221ac68030972b2750fcabc556ba02a3177837e413874861337c505c7332daa

    SHA512

    b50386572b5b207bea9840401021ef8aba23876c89e0f30ba06b717c461095c1944609f00b507f3fa9665bc0bbc8057675739c65f698266718f20e5691bab861

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    c0965056f1499911958493408ce7b756

    SHA1

    7b14b9b6d3aa7259de6026ba5f07959c1f9e2f4f

    SHA256

    ae2d85fc595ac5dd37807addae929819c9150b80a0ba2710dc405ab6356b268f

    SHA512

    7489d174907b3aa9454808ff44dc20e053320e63cdede7d22028e45190daa65ca0757551f1e444c1300ea917db38b7fb72f96f645d505ae0f37f47ce4f941efb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a43a27de3d159c18a1b59747de7ac026

    SHA1

    235c103edfc7e1a4dfc2f19afaac81d2da331d05

    SHA256

    0a950d560e9b62b3e86d05f6ca43e0391da2f2d6be8d669cab759e34eb209ab4

    SHA512

    cf264f80ffdad6440e7e1971657cc553e06e268827cbda1337de588940e7e608e8304c9063e355e6974339e94882227273fbb7d7e0ff02cdb24da1e371af26a3

  • C:\Users\Admin\AppData\Local\Temp\7zSB26E.tmp\setup.msi

    Filesize

    23.6MB

    MD5

    66105820fc90d4728885dc0a497b8213

    SHA1

    4575ee17d6c1ee5ff114ca1be6b5ae547d6df965

    SHA256

    eb34cd95f9da684b1d680bc5d7d710fbd14318d341711a9e53b43578ad7d9310

    SHA512

    a865fa5fb01509ca9a18d51f4d173b4fbf6ee61c8cb1a13ccde2bb99f134085355325240a598eec5c9bb5138ba8c00ad577a17611ae9d0844baa34e74aaa72d3

  • C:\Users\Admin\AppData\Local\Temp\CabB618.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB64A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Program Files (x86)\SlimDrivers\SlimDrivers.exe

    Filesize

    22.5MB

    MD5

    1698d9ac0c1167d6cf7b8a32ebff81b3

    SHA1

    31241974219fcba442fe61937df9a891fcf829ac

    SHA256

    796ca26fc493a66153fc1129acc989bddef7fccf7ca3cbfac409088be8437378

    SHA512

    40e416467ac416c87efd8e7876a86c9f618684ddd0b107108345d7ac67c0db7ed72f395844ac1dc8f5039683593015bf61ab84bf5ba5f22797d8419aacb9e16f

  • \Users\Admin\AppData\Local\Temp\7zSB26E.tmp\setup.exe

    Filesize

    73KB

    MD5

    ca6be57a4f75e216f320f97ae1098ff6

    SHA1

    3d8824b17c5a4c4afb887182a9af68c981b4b859

    SHA256

    7061f18bc963a9452432458cbffba4607ab55c360cfda38dda2fb913adb7a3ed

    SHA512

    8ff5f86a03d70bbe5cc34c0ce3586d49edccf557ed3f6565cebd07fb9218cb6ebf80f536f93ea0401373e309127bfe9dea83f66325623a5bc66ce677be886804

  • \Users\Admin\AppData\Local\Temp\MSI4802.tmp

    Filesize

    148KB

    MD5

    14c01c848d8452005734858a64b6784b

    SHA1

    d3d81fcd1267095880218ef09b92220248905ea8

    SHA256

    fa9b83479f1b955790325dc557624185a8c72df3e31870dae075437146858185

    SHA512

    8334c467c470c13b0245425d3bc1ba9676a04e1e015bec56122504d622e7e3858d5ad7950d09c155f3666a90b7d3c7b40f324d0786553d6e81711b7f38cf1d57

  • \Windows\Installer\{240D57C0-234A-4CAD-B6E7-DFDE6B0B1272}\Icon.exe

    Filesize

    128KB

    MD5

    70d9701d954dee05eb8a89d50b496bff

    SHA1

    15f775be9e3e7eaad93bb63dd246c5fd7a098e89

    SHA256

    71f324531ed89aead63e1cf05ea06715e86f017bfd873b7efb38d4b80a8c8d8e

    SHA512

    f1cd0ac56dc24908b2ab81b9691b01ca0e74b49d9f8772b84f1fd4188e94938c30b26253b546999338b00197b22b23e0b838abf747df19e89b11fe4e260a4c50