Analysis

  • max time kernel
    129s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    13-10-2021 10:01

General

  • Target

    09ab0907323d5de77ebe2891813dc5d0.exe

  • Size

    635KB

  • MD5

    09ab0907323d5de77ebe2891813dc5d0

  • SHA1

    edbee14a3f89d075e152013d48d8dd794d08c254

  • SHA256

    152c854e0e028eaa43bef46d7375d5704cf43f2c22a0354d7757e7cf5cdc3a89

  • SHA512

    1ab37e6af947694a2140c67d23b80121a23f742374c794bb47e5bae20ed46bbefb1ecf24a90d28f058140f1ccda693fdf90690c7090250c0dfa7c5bfc90269c9

Score
10/10

Malware Config

Extracted

Family

vidar

Version

41.3

Botnet

1008

C2

https://mas.to/@oleg98

Attributes
  • profile_id

    1008

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09ab0907323d5de77ebe2891813dc5d0.exe
    "C:\Users\Admin\AppData\Local\Temp\09ab0907323d5de77ebe2891813dc5d0.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 868
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:992

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/992-64-0x0000000000000000-mapping.dmp
  • memory/992-65-0x0000000000290000-0x0000000000291000-memory.dmp
    Filesize

    4KB

  • memory/1120-60-0x0000000000958000-0x00000000009D5000-memory.dmp
    Filesize

    500KB

  • memory/1120-61-0x0000000074D91000-0x0000000074D93000-memory.dmp
    Filesize

    8KB

  • memory/1120-62-0x00000000002A0000-0x0000000000376000-memory.dmp
    Filesize

    856KB

  • memory/1120-63-0x0000000000400000-0x00000000004D9000-memory.dmp
    Filesize

    868KB