Analysis

  • max time kernel
    136s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    13-09-2021 11:02

General

  • Target

    eufive_20210913-120522.exe

  • Size

    752KB

  • MD5

    ba7db9acdc44166d02b2da06cac656fc

  • SHA1

    0e1c30a40b73e38553e0b9cda546eb60cbab53cf

  • SHA256

    ee7d47b978a00def7f9e9263ab96b5e92ff1eefb1e9bef8021338a70b7708f7a

  • SHA512

    75f713cf1a1edc9f9b499d21e390c6d475c374cccf9a046068d5abdc94d4d0805ce8b087acad748eb78fecb274dc171a299083a807ee6024bf42b4289708dd32

Score
10/10

Malware Config

Extracted

Family

vidar

Version

40.5

Botnet

865

C2

https://gheorghip.tumblr.com/

Attributes
  • profile_id

    865

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eufive_20210913-120522.exe
    "C:\Users\Admin\AppData\Local\Temp\eufive_20210913-120522.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 856
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1484

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1484-56-0x0000000000000000-mapping.dmp
  • memory/1484-57-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/1636-53-0x0000000076161000-0x0000000076163000-memory.dmp
    Filesize

    8KB

  • memory/1636-55-0x0000000000400000-0x00000000017F4000-memory.dmp
    Filesize

    20.0MB

  • memory/1636-54-0x0000000000310000-0x00000000003E1000-memory.dmp
    Filesize

    836KB