Analysis

  • max time kernel
    87s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-09-2021 11:49

General

  • Target

    usfive_20210920-212056.exe

  • Size

    698KB

  • MD5

    8ac2459090b5d3d4a0f20361432fa5e4

  • SHA1

    f5c8f624ad6dbf40326b51be6d1295c037438114

  • SHA256

    7be59d6101c5fb704ebcfc4b66e6ede40c13b1829d30bf99a632ea1ad5c82621

  • SHA512

    8484bec8a08774a3695f4baa012cfcbc3c8b4c1b622235716eaf5c71348ddf9e08ccd93199bb207243437508451fbb9ac61e8828aa5b91e8b1c076cadc63156a

Score
10/10

Malware Config

Extracted

Family

vidar

Version

40.8

Botnet

1015

C2

https://pavlovoler.tumblr.com/

Attributes
  • profile_id

    1015

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\usfive_20210920-212056.exe
    "C:\Users\Admin\AppData\Local\Temp\usfive_20210920-212056.exe"
    1⤵
    • Modifies system certificate store
    PID:1912
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 1732
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3772

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1912-114-0x0000000000A80000-0x0000000000B54000-memory.dmp
    Filesize

    848KB

  • memory/1912-115-0x0000000000400000-0x00000000004D7000-memory.dmp
    Filesize

    860KB