Analysis

  • max time kernel
    48s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-06-2022 06:10

General

  • Target

    1371b2deb7ec3cddad0e5de911439e797065edc220f54516de0dcdacb7116243.exe

  • Size

    770KB

  • MD5

    897fc91b849fad54893e02cb85c69970

  • SHA1

    921a9a6fee66701b7c5eb3a7ebba151b300d9a2a

  • SHA256

    1371b2deb7ec3cddad0e5de911439e797065edc220f54516de0dcdacb7116243

  • SHA512

    a64916ef3c036e09c7c43f52211c3d97f77fefd47d4f45d1a037743cd969f985001d2bd33b8401568ec4cc0b875ff9fc580c9a9400188bb9a6707d09117100d5

Score
10/10

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

937

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    937

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1371b2deb7ec3cddad0e5de911439e797065edc220f54516de0dcdacb7116243.exe
    "C:\Users\Admin\AppData\Local\Temp\1371b2deb7ec3cddad0e5de911439e797065edc220f54516de0dcdacb7116243.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1356
      2⤵
      • Program crash
      PID:1928

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1840-54-0x0000000001228000-0x00000000012A5000-memory.dmp
    Filesize

    500KB

  • memory/1840-55-0x00000000751C1000-0x00000000751C3000-memory.dmp
    Filesize

    8KB

  • memory/1840-56-0x0000000001228000-0x00000000012A5000-memory.dmp
    Filesize

    500KB

  • memory/1840-57-0x00000000010A0000-0x0000000001176000-memory.dmp
    Filesize

    856KB

  • memory/1840-58-0x0000000000400000-0x0000000001091000-memory.dmp
    Filesize

    12.6MB

  • memory/1840-60-0x0000000001228000-0x00000000012A5000-memory.dmp
    Filesize

    500KB

  • memory/1840-61-0x0000000000400000-0x0000000001091000-memory.dmp
    Filesize

    12.6MB

  • memory/1928-59-0x0000000000000000-mapping.dmp