Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 19:38

General

  • Target

    44210fb592c05faa28a27d99d3c66214.exe

  • Size

    690KB

  • MD5

    44210fb592c05faa28a27d99d3c66214

  • SHA1

    5246abac84c6e708fbc37fb3df3531955c8b1673

  • SHA256

    d5445db0317af2ab05690f7037065681f908b3ae4da8d53ff5160b6627d74aac

  • SHA512

    8c5b4ad06a16b6bb8156dfd40019c601c6aa675166fb7f87b9638b86ceb3d9f60879d3e6194aee8f9d59d3aca6b0e9254898648c7ee687724ac41954c5a714b9

Score
10/10

Malware Config

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44210fb592c05faa28a27d99d3c66214.exe
    "C:\Users\Admin\AppData\Local\Temp\44210fb592c05faa28a27d99d3c66214.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1k22q7.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1428 CREDAT:340994 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:736
    • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe
      "C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1976
    • C:\Windows\SysWOW64\regedit.exe
      "C:\Windows\System32\regedit.exe" \s C:\Windows\wotsuper.reg
      2⤵
      • Runs .reg file with regedit
      PID:1816
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1lBhp.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1108

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe
    MD5

    5c121d3f95f97d6476f75648cd152912

    SHA1

    4368d3f1fa700b0cc03de2f1d611970cb2f62b9f

    SHA256

    d60691c9233b5eba74fee59d4f0d1d3ba6caf60dfdb2bbd1ce23abf7c61df526

    SHA512

    928ecf01f381d64ad197c75dd8f492d2459f9c6c3337ee2b6bcaa17824fafcfe4a4d582957d7cd7a98586b87d1c7409e3c4589410f5103569442b5217a36bccc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1FC0448E6D3D5712272FAF5B90A70C5E
    MD5

    0494a28e994ac1be940b4ad3bd9bcaca

    SHA1

    d44de77251a241abd706dbd72d2595c82482453e

    SHA256

    d17d655603a6fe152a9552d73d6e29f3f65bb361a0b73873d82d013fb3f2535a

    SHA512

    783d49d099377c72ec1b4df47a23cd73ceb2a0f61e53d9b7d403e7e628632297a54717d1f7ea8a475188ff5a9a1e08bcc265f3c0e52525b459a909eeabdf16f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
    MD5

    087f08a72b5b48ba901305ef85830f06

    SHA1

    33e48c1b01d71748cd8c6a21016ea49aa66ba8e2

    SHA256

    ec5e2da62de3bd588b70bb5ee2fc2cac309d78c4dbfce96b95b9886577432852

    SHA512

    b942fd81c0ab1598b8cd1de0a63e54a41987ef4d21089e40c21d51b049aec9c8c0937631d74b7628f6d3cc19c6a0e33e4c88f7ff283f483cc35bdc3b797e0bbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1FC0448E6D3D5712272FAF5B90A70C5E
    MD5

    cc89a358eb72cfbc2b10f8270135d52c

    SHA1

    d68710cb0ee7f1082a1a7495c3a936a0b739e136

    SHA256

    12abd59198b09f22c3d3f72804fd5b4f1a8abf2d42b56ef3f29e61b222213982

    SHA512

    53b2b13df9e93fb42a2b895f9ebe70dc539a78e476ddaebe64ef74d24f44a5dd5395fda6c88e747e8a9b852aa5bff4b89c3ebaaab220df9c01e00ca29b9038ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    1ad5c1e9bec6b582ee26977f75af6121

    SHA1

    0fd4f0e611725401b2808d0dacb0358eb98ff845

    SHA256

    6a14e9946ac0d4425c36e4a7318bbfc9bb77c6164bf96aa865a0b87af662db0d

    SHA512

    d6f9e44329a1ed2dfa7cca61290cf53e587d596692fe8f7ee7deecb2424c36d292120b2240ca5ae80986445f69debb6d4768fdd49877d9df735fe247c99a2c01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
    MD5

    45dec1d08c2725fbba5cd7b4ce5cfd74

    SHA1

    c7d642aefdc01f09f32b2e706baecf55d4025e97

    SHA256

    dc0d5b0f4f45f3230ae37ab6ed5d0e95c6f1fb05fabd3fd5c69db528c241624e

    SHA512

    0e08a4bf5225f0e7ac92eda3d2a4bd6f172b792c1a369badfc94066096af1686933ee5e796fab9e3f095b0f861ac7e0fcd3b939bde9384f92399f8a7d343c284

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FBD5E1E1-22DB-11EB-94C0-CE0E229A55E0}.dat
    MD5

    3f4e8eff8590fdfd33a396d99ccf33d0

    SHA1

    44df08154549df9f3ddee754988d1a6d9ed3c606

    SHA256

    b98920738243a1d41b1021ab939ba3d29db460a0c2b624dc4b1a54c41bb13501

    SHA512

    07b1b3e07f15e0bdbe3c4789de87d2cfed65f50eebc319522cb99b189e4885907a679fc2f087eaf3cd7d9d2037bc898e62231545d9dd78b2a185501a86730536

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FC1A0731-22DB-11EB-94C0-CE0E229A55E0}.dat
    MD5

    5c15e19ef17952223fc6cc40281f004a

    SHA1

    b3213a1f3a7c83fc00ae423822fb215d192a2f54

    SHA256

    a3c4794a2eb211bfd92082867073aa6c27ac25a28b5db10de3ae926242b5876c

    SHA512

    5642fffb984b09b0aa99975d4a507c87cd24aaccd3b524f86945da4afba8439fbd2b8dcc404246ac7e7dd0b5ff6e6dc911757f6ab71e88915a0edee020c68ea0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
    MD5

    1885d4c0c0ba69f4dc2b8fab6502feb3

    SHA1

    01c779365948ca0142258d0c9994d8aeb702161d

    SHA256

    b92459139eb121a5fbee4918f61ab4d3dbfac9f5c88eb5182205603393767285

    SHA512

    84b5ceba699f5272413c096f96797be207354f5a7b2025d6849287e0e994c577c6d3f86681c42c0690614e1731e5b99c2552450f9a6eeb954efe2a59e6cb0cd7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\favicon[1].ico
    MD5

    a6bbddfa577a51a9e1c9f9d678265cea

    SHA1

    be6bd8beb8a6b0140841bb909d84b5a7a9740daa

    SHA256

    049ab8112b1bcb70e2bc132cda740e3b776953e3b3205050c41a48683d223786

    SHA512

    adb3c9cf2c69ce86dec9618e229460fa4edb0ba4ba889c9bd0a961c1f47b19aa0da98b400395e4ca56d7ce2581adcf8fa8ed3c080af6313c0b54dd69b7e0ab50

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CKQI9IP2.txt
    MD5

    675c4800704a4024ba152c51e80ca028

    SHA1

    267f2267300b5a22f7ce2b5673b5a3d778059091

    SHA256

    28cad75da4c6cddca3fc1d3a1a14bc7bdd72d349703c4e7ff5874372fdac82a9

    SHA512

    be04422d98f8f2cbcc1a3f617c64d77dd9a9b87da7c1395e42db6fb2617336faa5386095f88bd8896919726bd03722219826fa0a5e779b1f72c5b2f1d3ef1c39

  • \Program Files (x86)\wotsuper\wotsuper\wotsuper.exe
    MD5

    5c121d3f95f97d6476f75648cd152912

    SHA1

    4368d3f1fa700b0cc03de2f1d611970cb2f62b9f

    SHA256

    d60691c9233b5eba74fee59d4f0d1d3ba6caf60dfdb2bbd1ce23abf7c61df526

    SHA512

    928ecf01f381d64ad197c75dd8f492d2459f9c6c3337ee2b6bcaa17824fafcfe4a4d582957d7cd7a98586b87d1c7409e3c4589410f5103569442b5217a36bccc

  • \Program Files (x86)\wotsuper\wotsuper\wotsuper.exe
    MD5

    5c121d3f95f97d6476f75648cd152912

    SHA1

    4368d3f1fa700b0cc03de2f1d611970cb2f62b9f

    SHA256

    d60691c9233b5eba74fee59d4f0d1d3ba6caf60dfdb2bbd1ce23abf7c61df526

    SHA512

    928ecf01f381d64ad197c75dd8f492d2459f9c6c3337ee2b6bcaa17824fafcfe4a4d582957d7cd7a98586b87d1c7409e3c4589410f5103569442b5217a36bccc

  • memory/736-11-0x0000000000000000-mapping.dmp
  • memory/1108-10-0x0000000000000000-mapping.dmp
  • memory/1428-0-0x0000000000000000-mapping.dmp
  • memory/1716-6-0x0000000000000000-mapping.dmp
  • memory/1776-7-0x000007FEF76B0000-0x000007FEF792A000-memory.dmp
    Filesize

    2.5MB

  • memory/1816-5-0x0000000000000000-mapping.dmp
  • memory/1976-9-0x0000000001E60000-0x0000000001E71000-memory.dmp
    Filesize

    68KB

  • memory/1976-8-0x000000000065B000-0x000000000065C000-memory.dmp
    Filesize

    4KB

  • memory/1976-3-0x0000000000000000-mapping.dmp