Analysis

  • max time kernel
    137s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    26-09-2021 11:47

General

  • Target

    eufive_20210919-061425.exe

  • Size

    667KB

  • MD5

    46302b8558c8536644e001148ef055c5

  • SHA1

    ceb335a297300d9df123ece8287956ac2e4dc6f0

  • SHA256

    6c5cc4dd03315eb744f8ab77cec40bdf6fc24351471b7bb88700b31fb1cd4288

  • SHA512

    018c68bfa640eab464eb296b3a355c8ebc4e8b2bafd42e617b6c4d09bf80e0a28ce969e4dfa1cc8c931c7f66d91e215efb6a03ef85c93018404bb88cad4679c4

Score
10/10

Malware Config

Extracted

Family

vidar

Version

40.7

Botnet

865

C2

https://petrenko96.tumblr.com/

Attributes
  • profile_id

    865

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eufive_20210919-061425.exe
    "C:\Users\Admin\AppData\Local\Temp\eufive_20210919-061425.exe"
    1⤵
    • Modifies system certificate store
    PID:3612
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 920
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4280

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3612-115-0x0000000000790000-0x0000000000864000-memory.dmp
    Filesize

    848KB

  • memory/3612-116-0x0000000000400000-0x00000000004D7000-memory.dmp
    Filesize

    860KB