Analysis
-
max time kernel
23s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
19-07-2021 08:51
Static task
static1
Behavioral task
behavioral1
Sample
6382174601bf02a6f9b09303d4c7febf.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
6382174601bf02a6f9b09303d4c7febf.exe
-
Size
551KB
-
MD5
6382174601bf02a6f9b09303d4c7febf
-
SHA1
6af4c812ba7acc3e5a7237f4dfd7e013915aeda7
-
SHA256
9706247fdb847874ca3fad6229787e37299be25d938af865a8e5b132bf313b89
-
SHA512
62a24678c137367416613c34a4c7568a2323f264da5f59555a63d54b1b33ffbc94fd1d8c910c799383a91769809b72ebd0e0e61f617e1a784bcd4115d1098132
Malware Config
Extracted
Family
vidar
Version
39.6
Botnet
903
C2
https://sslamlssa1.tumblr.com/
Attributes
-
profile_id
903
Signatures
-
Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/324-64-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1496-63-0x0000000000500000-0x0000000000508000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6382174601bf02a6f9b09303d4c7febf.exedescription pid process target process PID 1496 set thread context of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6382174601bf02a6f9b09303d4c7febf.exedescription pid process Token: SeDebugPrivilege 1496 6382174601bf02a6f9b09303d4c7febf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
6382174601bf02a6f9b09303d4c7febf.exedescription pid process target process PID 1496 wrote to memory of 1004 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 1004 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 1004 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 1004 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe PID 1496 wrote to memory of 324 1496 6382174601bf02a6f9b09303d4c7febf.exe 6382174601bf02a6f9b09303d4c7febf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6382174601bf02a6f9b09303d4c7febf.exe"C:\Users\Admin\AppData\Local\Temp\6382174601bf02a6f9b09303d4c7febf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6382174601bf02a6f9b09303d4c7febf.exeC:\Users\Admin\AppData\Local\Temp\6382174601bf02a6f9b09303d4c7febf.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\6382174601bf02a6f9b09303d4c7febf.exeC:\Users\Admin\AppData\Local\Temp\6382174601bf02a6f9b09303d4c7febf.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/324-64-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/324-65-0x000000000046B76D-mapping.dmp
-
memory/1496-60-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/1496-62-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/1496-63-0x0000000000500000-0x0000000000508000-memory.dmpFilesize
32KB