Analysis

  • max time kernel
    49s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2022 20:03

General

  • Target

    5e82e7a943dfc26750939494d039dcf23b7e12e69f4695bf6894d2016ae09175.exe

  • Size

    690KB

  • MD5

    bafc6634b7596221216229ab202824cc

  • SHA1

    ff39248b82a33afb2ec67460e77a9aa1ffa01253

  • SHA256

    5e82e7a943dfc26750939494d039dcf23b7e12e69f4695bf6894d2016ae09175

  • SHA512

    dcbd44fbd78d720f906450ee45555af32ed7e698e7f0bb699d547719468d174c13ea12dfbcb0c00f29e4028793113149b4bdec9e8030a62aa9feb5a8d1c4238f

Score
10/10

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

706

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    706

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e82e7a943dfc26750939494d039dcf23b7e12e69f4695bf6894d2016ae09175.exe
    "C:\Users\Admin\AppData\Local\Temp\5e82e7a943dfc26750939494d039dcf23b7e12e69f4695bf6894d2016ae09175.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 1300
      2⤵
      • Program crash
      PID:1684

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-58-0x0000000000000000-mapping.dmp
  • memory/2004-54-0x00000000762A1000-0x00000000762A3000-memory.dmp
    Filesize

    8KB

  • memory/2004-55-0x00000000031E0000-0x000000000325C000-memory.dmp
    Filesize

    496KB

  • memory/2004-56-0x0000000003280000-0x0000000003356000-memory.dmp
    Filesize

    856KB

  • memory/2004-57-0x0000000000400000-0x0000000002F73000-memory.dmp
    Filesize

    43.4MB

  • memory/2004-59-0x0000000000400000-0x0000000002F73000-memory.dmp
    Filesize

    43.4MB