Analysis

  • max time kernel
    155s
  • max time network
    161s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    26-09-2021 11:49

General

  • Target

    usfive_20210921-015514.exe

  • Size

    673KB

  • MD5

    39fa46c3a9c438b5914ce81cdfa475e2

  • SHA1

    2abe22346c354b38c15f6692448f95748e579a0d

  • SHA256

    d7f8f9fd56248d7d529ff39be3085ab6708f65e64b9910c7817a156979c401a7

  • SHA512

    df8595304ef1d69b09c7d9a6b32c9304509e7502cc01dbfda77e9918363de0686262d5f0d1703474b2888f8fedcea6be3cea082fbd79be25dc282797a887c988

Score
10/10

Malware Config

Extracted

Family

vidar

Version

40.8

Botnet

1015

C2

https://pavlovoler.tumblr.com/

Attributes
  • profile_id

    1015

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\usfive_20210921-015514.exe
    "C:\Users\Admin\AppData\Local\Temp\usfive_20210921-015514.exe"
    1⤵
    • Modifies system certificate store
    PID:2076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 1396
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3792

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2076-116-0x0000000000400000-0x000000000052E000-memory.dmp
    Filesize

    1.2MB

  • memory/2076-115-0x0000000002330000-0x0000000002404000-memory.dmp
    Filesize

    848KB