Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-09-2021 12:20
Static task
static1
General
-
Target
5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe
-
Size
1.5MB
-
MD5
43ecb980e6e1db8f394af5b6d065eba6
-
SHA1
36e05d72b5a9efd3e5283d46fb42f0d6204f2ed3
-
SHA256
5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801
-
SHA512
34062ccbb04992ee177cade1e218b608573fa9c2f0a073960aec3ea34b7140707127829f123fb3af7d7fd1448fc4d2a5958f9bf31833bf7047ff3d3271ecd04b
Malware Config
Extracted
vidar
41
1013
https://mas.to/@killern0
-
profile_id
1013
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 580 created 808 580 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe -
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/808-116-0x0000000000400000-0x000000000057E000-memory.dmp family_vidar behavioral1/memory/808-115-0x0000000002A70000-0x0000000002B8B000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
Processes:
5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exepid process 808 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 808 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1180 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 1336 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 1460 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 1716 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 1948 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 2168 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 2384 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 2616 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 2720 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 2740 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 3552 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 3980 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 3184 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 500 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe 580 808 WerFault.exe 5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1460 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1716 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe 1948 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 1180 WerFault.exe Token: SeBackupPrivilege 1180 WerFault.exe Token: SeDebugPrivilege 1180 WerFault.exe Token: SeDebugPrivilege 1336 WerFault.exe Token: SeDebugPrivilege 1460 WerFault.exe Token: SeDebugPrivilege 1716 WerFault.exe Token: SeDebugPrivilege 1948 WerFault.exe Token: SeDebugPrivilege 2168 WerFault.exe Token: SeDebugPrivilege 2384 WerFault.exe Token: SeDebugPrivilege 2616 WerFault.exe Token: SeDebugPrivilege 2720 WerFault.exe Token: SeDebugPrivilege 2740 WerFault.exe Token: SeDebugPrivilege 3552 WerFault.exe Token: SeDebugPrivilege 3980 WerFault.exe Token: SeDebugPrivilege 3184 WerFault.exe Token: SeDebugPrivilege 500 WerFault.exe Token: SeDebugPrivilege 580 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe"C:\Users\Admin\AppData\Local\Temp\5b2fce91cda0fa71818a683c57c88eb1533b70bcfb5e82b312757b3015d69801.exe"1⤵
- Loads dropped DLL
PID:808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 7802⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 9202⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 10442⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 12122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 15122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 17082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 16802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 17282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 14762⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 14842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 17602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 17602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 17282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 17842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 16922⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
MD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66