Analysis

  • max time kernel
    137s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    15-02-2022 14:06

General

  • Target

    3d9b1ddce39d90bb1efa52a5f866f74ea8b9acb922ec27fb15b753e45c864c90.exe

  • Size

    56KB

  • MD5

    52d5dab06aa1b976bb7c584b36f95c2d

  • SHA1

    b5b3cdd6e1ac21f8382991240cac3d50af63f967

  • SHA256

    3d9b1ddce39d90bb1efa52a5f866f74ea8b9acb922ec27fb15b753e45c864c90

  • SHA512

    7aeaae80477fafc739a1fd3e98d2646af080a54bf8aa78d7c8ab38bef75577d59bd2b868c5d5d8e1108a0d3c4cc10dbe2fada31cf7073b89030526d619c29e9e

Score
10/10

Malware Config

Extracted

Family

vidar

Version

48.1

Botnet

754

C2

https://koyu.space/@rspich

Attributes
  • profile_id

    754

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d9b1ddce39d90bb1efa52a5f866f74ea8b9acb922ec27fb15b753e45c864c90.exe
    "C:\Users\Admin\AppData\Local\Temp\3d9b1ddce39d90bb1efa52a5f866f74ea8b9acb922ec27fb15b753e45c864c90.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\3d9b1ddce39d90bb1efa52a5f866f74ea8b9acb922ec27fb15b753e45c864c90.exe
      C:\Users\Admin\AppData\Local\Temp\3d9b1ddce39d90bb1efa52a5f866f74ea8b9acb922ec27fb15b753e45c864c90.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 1300
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1800

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    2868731bbe2be1ccd68128c176ec428e

    SHA1

    952c1c8f797d3706aedb7558869be4268e1e30da

    SHA256

    ccf32533c1a6afa46f19f5fc433a0b42da2c79f7694dcda36593e2be33baa3e9

    SHA512

    18beef1455644032b5325ea457bb1dcf9be7d367bb1b4be3ff26b672af846f2dd0b5f04ee3ffe7e2da373db39ef1ba6e1c0046327df2523a524c381defd6cbe7

  • memory/1180-55-0x000000007445E000-0x000000007445F000-memory.dmp
    Filesize

    4KB

  • memory/1180-56-0x0000000000230000-0x0000000000244000-memory.dmp
    Filesize

    80KB

  • memory/1180-57-0x00000000048B0000-0x00000000048B1000-memory.dmp
    Filesize

    4KB

  • memory/1180-58-0x0000000005860000-0x0000000005920000-memory.dmp
    Filesize

    768KB

  • memory/1180-59-0x0000000005EF0000-0x0000000005F74000-memory.dmp
    Filesize

    528KB

  • memory/1232-61-0x0000000000400000-0x00000000004D8000-memory.dmp
    Filesize

    864KB

  • memory/1232-62-0x0000000000400000-0x00000000004D8000-memory.dmp
    Filesize

    864KB

  • memory/1232-63-0x0000000000400000-0x00000000004D8000-memory.dmp
    Filesize

    864KB

  • memory/1232-64-0x0000000000400000-0x00000000004D8000-memory.dmp
    Filesize

    864KB

  • memory/1232-65-0x0000000075831000-0x0000000075833000-memory.dmp
    Filesize

    8KB

  • memory/1232-66-0x0000000000400000-0x00000000004D8000-memory.dmp
    Filesize

    864KB

  • memory/1232-60-0x0000000000400000-0x00000000004D8000-memory.dmp
    Filesize

    864KB

  • memory/1800-68-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB