Analysis

  • max time kernel
    76s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2023 19:46

General

  • Target

    a68b922ff99975201ed3bc5391811694.exe

  • Size

    324KB

  • MD5

    a68b922ff99975201ed3bc5391811694

  • SHA1

    8945c36d4f546f44275c0e43b1fd7fa7e183a0ac

  • SHA256

    2f2c73a52b2c9975df2b1f9ccde2a8eb77493bc5d3e91a16d5d0eb3eb3ca9942

  • SHA512

    130827dc0633eb284e323685e733108517cd2e979bb9edbf5188ee90633606ee7938d6794cab949d4b34f0a53cdac9503946fbf3f918e1bf5bd263e8ed38252f

  • SSDEEP

    6144:hqbwLcNzozsNnFna8If42v8NG0AwcjxYUOvNrpZJSKYik/Pzs:hHgNzozJ420NbojxV032t/D

Score
10/10

Malware Config

Extracted

Family

vidar

Version

1.8

Botnet

14

C2

https://t.me/year2023start

https://steamcommunity.com/profiles/76561199467421923

Attributes
  • profile_id

    14

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a68b922ff99975201ed3bc5391811694.exe
    "C:\Users\Admin\AppData\Local\Temp\a68b922ff99975201ed3bc5391811694.exe"
    1⤵
    • Modifies system certificate store
    PID:4584
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 1580
      2⤵
      • Program crash
      PID:492
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4584 -ip 4584
    1⤵
      PID:1008

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4584-132-0x0000000002D88000-0x0000000002DB5000-memory.dmp
      Filesize

      180KB

    • memory/4584-133-0x0000000002D10000-0x0000000002D5C000-memory.dmp
      Filesize

      304KB

    • memory/4584-134-0x0000000000400000-0x0000000002BB8000-memory.dmp
      Filesize

      39.7MB

    • memory/4584-135-0x0000000002D88000-0x0000000002DB5000-memory.dmp
      Filesize

      180KB

    • memory/4584-136-0x0000000000400000-0x0000000002BB8000-memory.dmp
      Filesize

      39.7MB

    • memory/4584-137-0x0000000000400000-0x0000000002BB8000-memory.dmp
      Filesize

      39.7MB