Overview
overview
10Static
static
7C2Panel-main.zip
windows7-x64
10C2Panel-main.zip
windows10-2004-x64
1C2Panel-ma...el.exe
windows7-x64
10C2Panel-ma...el.exe
windows10-2004-x64
10C2Panel-ma...rk.dll
windows7-x64
1C2Panel-ma...rk.dll
windows10-2004-x64
1C2Panel-ma...ys.dll
windows7-x64
1C2Panel-ma...ys.dll
windows10-2004-x64
1C2Panel-ma...64.dll
windows7-x64
1C2Panel-ma...64.dll
windows10-2004-x64
1C2Panel-ma...tm.dll
windows7-x64
3C2Panel-ma...tm.dll
windows10-2004-x64
3C2Panel-ma...PS.dll
windows7-x64
1C2Panel-ma...PS.dll
windows10-2004-x64
1C2Panel-ma...ts.dll
windows7-x64
1C2Panel-ma...ts.dll
windows10-2004-x64
1C2Panel-ma...ts.pdb
windows7-x64
3C2Panel-ma...ts.pdb
windows10-2004-x64
3C2Panel-ma...DME.md
windows7-x64
3C2Panel-ma...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 20:36
Behavioral task
behavioral1
Sample
C2Panel-main.zip
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
C2Panel-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
C2Panel-main/C2Panel.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
C2Panel-main/C2Panel.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
C2Panel-main/DrakeUI.Framework.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
C2Panel-main/DrakeUI.Framework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
C2Panel-main/GeoIPCitys.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
C2Panel-main/GeoIPCitys.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
C2Panel-main/HVMRun64.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
C2Panel-main/HVMRun64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
C2Panel-main/HVMRuntm.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
C2Panel-main/HVMRuntm.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
C2Panel-main/LiveCharts.MAPS.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
C2Panel-main/LiveCharts.MAPS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
C2Panel-main/LiveCharts.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
C2Panel-main/LiveCharts.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
C2Panel-main/LiveCharts.pdb
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
C2Panel-main/LiveCharts.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
C2Panel-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
C2Panel-main/README.md
Resource
win10v2004-20241007-en
General
-
Target
C2Panel-main/README.md
-
Size
398B
-
MD5
b7a95cc84521da3b5022190f3f0c2d9d
-
SHA1
4690110ef7cadd5c9bd042db3418e9cccb2fbfa1
-
SHA256
3d791cb437e616225a4e3adc900769018be3532757fcc445204440f16320fe75
-
SHA512
fe419899731b1d6662e1a7fb69d968758ecd7515f02c40f70fdf7b1eff054ad3b7f297e5390c1ac35df43b58da9a622fa51ed6999b9041c3a195257f6d1aa94c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1216 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1216 AcroRd32.exe 1216 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2568 2904 cmd.exe 29 PID 2904 wrote to memory of 2568 2904 cmd.exe 29 PID 2904 wrote to memory of 2568 2904 cmd.exe 29 PID 2568 wrote to memory of 1216 2568 rundll32.exe 30 PID 2568 wrote to memory of 1216 2568 rundll32.exe 30 PID 2568 wrote to memory of 1216 2568 rundll32.exe 30 PID 2568 wrote to memory of 1216 2568 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\C2Panel-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\C2Panel-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\C2Panel-main\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b7921f9a3c94254ce69c25584d26410e
SHA11a44aff230cafaee955943ce80cfb273a844c31b
SHA2560d744227eaa112cc7751022346b99614ca94b8de958c56ef8b551f14492995b4
SHA512787a8566562c00286bfd215b7c0c7dbe0e6e00f10f8c6b78483495220f1268dc93a875a12869d24ae1d9e37f587f2ff69d57ead2e3fdb6ad8e24f55943bf987f