Analysis

  • max time kernel
    120s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    15-02-2022 13:48

General

  • Target

    472772ed28161f82f180d925a6dd510914b18c8c1782cceb1ebe9781c73dec3a.exe

  • Size

    728KB

  • MD5

    a3208303a518632d07e6e6a240d37f25

  • SHA1

    16af523e50ebd8bbc9930488d1769241ef6bcd83

  • SHA256

    472772ed28161f82f180d925a6dd510914b18c8c1782cceb1ebe9781c73dec3a

  • SHA512

    6ecfc344cf638969230d5d0c75c7f9ed96ab31250f17889ac2e2910b81da509f161c68850cc99546b6dfe6372836affa60322aff09cb77772c517c72507000be

Score
10/10

Malware Config

Extracted

Family

vidar

Version

47.9

Botnet

937

C2

https://mas.to/@kirpich

Attributes
  • profile_id

    937

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\472772ed28161f82f180d925a6dd510914b18c8c1782cceb1ebe9781c73dec3a.exe
    "C:\Users\Admin\AppData\Local\Temp\472772ed28161f82f180d925a6dd510914b18c8c1782cceb1ebe9781c73dec3a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 1304
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1560-59-0x00000000004A0000-0x00000000004A1000-memory.dmp
    Filesize

    4KB

  • memory/1728-55-0x0000000074F11000-0x0000000074F13000-memory.dmp
    Filesize

    8KB

  • memory/1728-56-0x0000000000220000-0x000000000029C000-memory.dmp
    Filesize

    496KB

  • memory/1728-57-0x00000000004E0000-0x00000000005B6000-memory.dmp
    Filesize

    856KB

  • memory/1728-58-0x0000000000400000-0x00000000004D9000-memory.dmp
    Filesize

    868KB