Analysis

  • max time kernel
    82s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2022 08:21

General

  • Target

    Setup.exe

  • Size

    380.9MB

  • MD5

    b122b2a71b7bce0d2bc4eac5a1118c6d

  • SHA1

    c6644608c8d65b8d9564ec0ad73e5d0e59d2c8cf

  • SHA256

    7a578f31b88420cab5f78920951381c15bb123db4da3bec47a4050ec6a0284f1

  • SHA512

    3cfbd0208bd0f67d46b3ba341d8376f7a7c01f04d6f73570205e72627f8122ecd9e1b23ce8621b2f48d9e7baef0c6596f52b8775f07a3c449b97cb8127d71ca2

  • SSDEEP

    98304:3i4WHFi4bv8whyl1+gSVK8IBkhVysqXKGn:y1AZkhCx

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

1281

C2

https://t.me/dsjdsnxshjx

Attributes
  • profile_id

    1281

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2612

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2612-132-0x0000000000C60000-0x0000000001305000-memory.dmp
    Filesize

    6.6MB

  • memory/2612-133-0x0000000000C60000-0x0000000001305000-memory.dmp
    Filesize

    6.6MB

  • memory/2612-134-0x0000000000C60000-0x0000000001305000-memory.dmp
    Filesize

    6.6MB

  • memory/2612-135-0x0000000077A70000-0x0000000077C13000-memory.dmp
    Filesize

    1.6MB

  • memory/2612-136-0x0000000000C60000-0x0000000001305000-memory.dmp
    Filesize

    6.6MB

  • memory/2612-137-0x0000000000C60000-0x0000000001305000-memory.dmp
    Filesize

    6.6MB

  • memory/2612-138-0x0000000000C60000-0x0000000001305000-memory.dmp
    Filesize

    6.6MB

  • memory/2612-139-0x0000000000C60000-0x0000000001305000-memory.dmp
    Filesize

    6.6MB

  • memory/2612-140-0x0000000000C60000-0x0000000001305000-memory.dmp
    Filesize

    6.6MB

  • memory/2612-141-0x0000000000C60000-0x0000000001305000-memory.dmp
    Filesize

    6.6MB

  • memory/2612-142-0x0000000077A70000-0x0000000077C13000-memory.dmp
    Filesize

    1.6MB