Analysis

  • max time kernel
    10s
  • max time network
    14s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 08:25

Errors

Reason
Machine shutdown

General

  • Target

    2025-01-24_23759b4674c9e9ae889a976dec77b79a_icedid.exe

  • Size

    2.0MB

  • MD5

    23759b4674c9e9ae889a976dec77b79a

  • SHA1

    1cd87cb5875986e9f037c6d349e485cce2cac091

  • SHA256

    bd01d037e56a5408610de59d9e99cfea8cf10ba524d1159385e7dcdc2c2a9b29

  • SHA512

    3c8417c9a15220ac2aa3a27be1a5c234968a21f1db85c0057d1f1190093e73ee17406ecc9b08c3ee1de1f8b01a4d0b36d8e01ad9d681a2b2c526b75ed5191b92

  • SSDEEP

    49152:dnCm+d9N62qGFY57j+eZphTzd4xWPwqiqD:872dhj+e3

Malware Config

Signatures

  • Panda Stealer payload 2 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Pandastealer family
  • Drops file in Drivers directory 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-24_23759b4674c9e9ae889a976dec77b79a_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-24_23759b4674c9e9ae889a976dec77b79a_icedid.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:772
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39a5855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Rspp.dll

    Filesize

    48KB

    MD5

    af3b9c8a4b4ae14757c9e52bb597c387

    SHA1

    9fd550b193765a7f0c12243ddccd51d889abc7fc

    SHA256

    8f87cbc5f5661f75cc55e71e9e5008a8e8a211e14db66df3d26a0eb36ec86cfd

    SHA512

    695e007b0cf4a52c349c499929b9b50c917170ed094c2e7cc7d68f287a45b80431015083426cb0d29e001e2e3b0205168220c0a201c95357dcc83a4e4b8886c7

  • memory/772-0-0x0000000000400000-0x0000000000614000-memory.dmp

    Filesize

    2.1MB

  • memory/772-8-0x0000000000400000-0x0000000000614000-memory.dmp

    Filesize

    2.1MB