Analysis

  • max time kernel
    122s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    15-02-2022 06:06

General

  • Target

    cba4bf2713f913043fd6aa5990aa937a470f48c11c3d0361fe1cb951d6a74c76.exe

  • Size

    764KB

  • MD5

    6803564f8d27498decae376b90142e4f

  • SHA1

    41faef623fe7f6eaf120ac22d66e7c6fc1779db4

  • SHA256

    cba4bf2713f913043fd6aa5990aa937a470f48c11c3d0361fe1cb951d6a74c76

  • SHA512

    79b3e8eaa9539995738b281c842861f118e85449094ef8d8a7e5c4774bba1a3cfadc27fc88353b3411acbbef8780c7a0348545844d461e94751aed4ade8f3f29

Score
10/10

Malware Config

Extracted

Family

vidar

Version

48.2

Botnet

937

C2

https://koyu.space/@qmashton

Attributes
  • profile_id

    937

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cba4bf2713f913043fd6aa5990aa937a470f48c11c3d0361fe1cb951d6a74c76.exe
    "C:\Users\Admin\AppData\Local\Temp\cba4bf2713f913043fd6aa5990aa937a470f48c11c3d0361fe1cb951d6a74c76.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 1308
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/744-54-0x00000000002EB000-0x0000000000367000-memory.dmp
    Filesize

    496KB

  • memory/744-55-0x0000000076041000-0x0000000076043000-memory.dmp
    Filesize

    8KB

  • memory/744-56-0x00000000002EB000-0x0000000000367000-memory.dmp
    Filesize

    496KB

  • memory/744-57-0x0000000004350000-0x0000000004425000-memory.dmp
    Filesize

    852KB

  • memory/744-58-0x0000000000400000-0x00000000004D8000-memory.dmp
    Filesize

    864KB

  • memory/992-59-0x0000000000380000-0x0000000000381000-memory.dmp
    Filesize

    4KB