Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
23-09-2021 12:20
Static task
static1
General
-
Target
ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe
-
Size
577KB
-
MD5
9fcf0f5b99f398b9e6b6afaa25c60917
-
SHA1
720faa2bf8de76f8e92161b792f0a99eeeb63883
-
SHA256
ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86
-
SHA512
e9995cd9c5c3f694a9eb895de2840cdaecfd29681f2ca1616f9860fa2aabbbfdc1e678a3e54b69215c4ab6fdea8235a70773aa63d9e17d1c11647ae872bbb534
Malware Config
Extracted
vidar
41
1008
https://mas.to/@killern0
-
profile_id
1008
Signatures
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2212-115-0x00000000021F0000-0x00000000022C4000-memory.dmp family_vidar behavioral1/memory/2212-116-0x0000000000400000-0x0000000000517000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2580 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 3088 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3088 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3044 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 70 PID 2212 wrote to memory of 3044 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 70 PID 2212 wrote to memory of 3044 2212 ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe 70 PID 3044 wrote to memory of 3088 3044 cmd.exe 72 PID 3044 wrote to memory of 3088 3044 cmd.exe 72 PID 3044 wrote to memory of 3088 3044 cmd.exe 72 PID 3044 wrote to memory of 2580 3044 cmd.exe 74 PID 3044 wrote to memory of 2580 3044 cmd.exe 74 PID 3044 wrote to memory of 2580 3044 cmd.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe"C:\Users\Admin\AppData\Local\Temp\ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe" & del C:\ProgramData\*.dll & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im ed2ca82131cad5380e978d4c2d489e09f247463021b80cda9241bff82c10fb86.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:2580
-
-