Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
17-11-2021 12:19
Static task
static1
General
-
Target
5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe
-
Size
2.2MB
-
MD5
c6c28e719c1ab67000be15581f6dafff
-
SHA1
52b01bdb3b1c0c36ec6d191852e967c02fd48a2d
-
SHA256
5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980
-
SHA512
b9143e859ba72e8cd50f329248a43e8d3ba74c540906a128223e6aec4d3830aed98fb139bc2b98ae5da7fd5100e543af7ab7d8d5fd55954ef9502cf305ec9ada
Malware Config
Extracted
vidar
48.6
869
https://mastodon.online/@valhalla
https://koyu.space/@valhalla
-
profile_id
869
Signatures
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2720-116-0x0000000002A60000-0x0000000002B37000-memory.dmp family_vidar behavioral1/memory/2720-117-0x0000000000400000-0x0000000000638000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3312 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 3812 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3812 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2720 wrote to memory of 864 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 68 PID 2720 wrote to memory of 864 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 68 PID 2720 wrote to memory of 864 2720 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe 68 PID 864 wrote to memory of 3812 864 cmd.exe 70 PID 864 wrote to memory of 3812 864 cmd.exe 70 PID 864 wrote to memory of 3812 864 cmd.exe 70 PID 864 wrote to memory of 3312 864 cmd.exe 72 PID 864 wrote to memory of 3312 864 cmd.exe 72 PID 864 wrote to memory of 3312 864 cmd.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe"C:\Users\Admin\AppData\Local\Temp\5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe" & del C:\ProgramData\*.dll & exit2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5c7fc960d3e00ab148e991b9be2137a0b0565c1d32f30fe91c3d894647f33980.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:3312
-
-