Analysis

  • max time kernel
    111s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2023 04:38

General

  • Target

    a53466fc1c01a7fa4ac637e46c8ca0cd.exe

  • Size

    596KB

  • MD5

    a53466fc1c01a7fa4ac637e46c8ca0cd

  • SHA1

    1fd22e354e8ca425a1de630bffb54e2d10435b62

  • SHA256

    adb4d5bc0e359b762c9af262bcbaecd7effc14742631afdc650eb8b8feb54003

  • SHA512

    756e67a0241671a1dd7b42f5c481be79fc5f07f7a24e22abc0629d575a6f34362d4ccd35a5f6d6d831830a60495b2f25e11b205d0adcb115c8b8131895af277d

  • SSDEEP

    12288:PToPWBv/cpGrU3ywDwK7KvDJCbAvyDcdSCYZLYL6h:PTbBv5rUTwK78dChctYZLYL6h

Malware Config

Extracted

Family

vidar

Version

2.2

Botnet

818

C2

https://t.me/litlebey

https://steamcommunity.com/profiles/76561199472399815

Attributes
  • profile_id

    818

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Async RAT payload 5 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a53466fc1c01a7fa4ac637e46c8ca0cd.exe
    "C:\Users\Admin\AppData\Local\Temp\a53466fc1c01a7fa4ac637e46c8ca0cd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\scoresystem.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\scoresystem.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WATCHT~2.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WATCHT~2.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:604
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1384
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          4⤵
            PID:744
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1717.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\1717.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1156
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 36
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:908

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WATCHT~2.EXE
      Filesize

      362.4MB

      MD5

      10155f7d28c09033e8064c23d8d753db

      SHA1

      42362a2d24e1e7bf7f97a2f5fb72a81306536bb6

      SHA256

      2f78ba61101b4ae38e44d1e0edad8b195bc801b4cd91c4c8881d547c7073c655

      SHA512

      a626aa9a6f605bdfcb5d0455e1db27022b16a368aaefc2b7842c7aa188221ad9efa78ea1a7d915c0513e6ac3db564d2777601f1c7921864cacd793be6b81bd41

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WATCHT~2.EXE
      Filesize

      362.4MB

      MD5

      10155f7d28c09033e8064c23d8d753db

      SHA1

      42362a2d24e1e7bf7f97a2f5fb72a81306536bb6

      SHA256

      2f78ba61101b4ae38e44d1e0edad8b195bc801b4cd91c4c8881d547c7073c655

      SHA512

      a626aa9a6f605bdfcb5d0455e1db27022b16a368aaefc2b7842c7aa188221ad9efa78ea1a7d915c0513e6ac3db564d2777601f1c7921864cacd793be6b81bd41

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1717.exe
      Filesize

      457KB

      MD5

      66e815946cfe9ffe0027ebf4db30fda9

      SHA1

      a0edd0ab8909ac842ec77573497fe7f40401beb8

      SHA256

      21314404c10b04494713bd805fff8d42fc63513b5a4c434b4826a41c9b556c22

      SHA512

      94335b7fb0c2952df4fbae0fa630f3ec5612783866d86d468f5b4429ba1c2617939ebeed7c54c8ebe2db9fa1f837e929974e646211ff8ce7e35c505c33679660

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\scoresystem.exe
      Filesize

      630KB

      MD5

      de39a7b5729cecc97244042f6eb858f7

      SHA1

      be4b03f12f9a81a2cbf6c782c66d230e609e0424

      SHA256

      f2e08945074adcc47885bd4f848112b9605238d0cc00db1e686bc567b408e687

      SHA512

      e01266297515b23e6f25cfd379c6c611f3ea94a58d239b0f3cd5254c4de503a2ee7ca0b150b14da6b7c81954c15025e57ce88bd796d1d150832f51a69b57c0f8

    • \Users\Admin\AppData\Local\Temp\RarSFX0\1717.exe
      Filesize

      457KB

      MD5

      66e815946cfe9ffe0027ebf4db30fda9

      SHA1

      a0edd0ab8909ac842ec77573497fe7f40401beb8

      SHA256

      21314404c10b04494713bd805fff8d42fc63513b5a4c434b4826a41c9b556c22

      SHA512

      94335b7fb0c2952df4fbae0fa630f3ec5612783866d86d468f5b4429ba1c2617939ebeed7c54c8ebe2db9fa1f837e929974e646211ff8ce7e35c505c33679660

    • \Users\Admin\AppData\Local\Temp\RarSFX0\1717.exe
      Filesize

      457KB

      MD5

      66e815946cfe9ffe0027ebf4db30fda9

      SHA1

      a0edd0ab8909ac842ec77573497fe7f40401beb8

      SHA256

      21314404c10b04494713bd805fff8d42fc63513b5a4c434b4826a41c9b556c22

      SHA512

      94335b7fb0c2952df4fbae0fa630f3ec5612783866d86d468f5b4429ba1c2617939ebeed7c54c8ebe2db9fa1f837e929974e646211ff8ce7e35c505c33679660

    • \Users\Admin\AppData\Local\Temp\RarSFX0\1717.exe
      Filesize

      457KB

      MD5

      66e815946cfe9ffe0027ebf4db30fda9

      SHA1

      a0edd0ab8909ac842ec77573497fe7f40401beb8

      SHA256

      21314404c10b04494713bd805fff8d42fc63513b5a4c434b4826a41c9b556c22

      SHA512

      94335b7fb0c2952df4fbae0fa630f3ec5612783866d86d468f5b4429ba1c2617939ebeed7c54c8ebe2db9fa1f837e929974e646211ff8ce7e35c505c33679660

    • \Users\Admin\AppData\Local\Temp\RarSFX0\1717.exe
      Filesize

      457KB

      MD5

      66e815946cfe9ffe0027ebf4db30fda9

      SHA1

      a0edd0ab8909ac842ec77573497fe7f40401beb8

      SHA256

      21314404c10b04494713bd805fff8d42fc63513b5a4c434b4826a41c9b556c22

      SHA512

      94335b7fb0c2952df4fbae0fa630f3ec5612783866d86d468f5b4429ba1c2617939ebeed7c54c8ebe2db9fa1f837e929974e646211ff8ce7e35c505c33679660

    • \Users\Admin\AppData\Local\Temp\RarSFX0\1717.exe
      Filesize

      457KB

      MD5

      66e815946cfe9ffe0027ebf4db30fda9

      SHA1

      a0edd0ab8909ac842ec77573497fe7f40401beb8

      SHA256

      21314404c10b04494713bd805fff8d42fc63513b5a4c434b4826a41c9b556c22

      SHA512

      94335b7fb0c2952df4fbae0fa630f3ec5612783866d86d468f5b4429ba1c2617939ebeed7c54c8ebe2db9fa1f837e929974e646211ff8ce7e35c505c33679660

    • \Users\Admin\AppData\Local\Temp\RarSFX0\1717.exe
      Filesize

      457KB

      MD5

      66e815946cfe9ffe0027ebf4db30fda9

      SHA1

      a0edd0ab8909ac842ec77573497fe7f40401beb8

      SHA256

      21314404c10b04494713bd805fff8d42fc63513b5a4c434b4826a41c9b556c22

      SHA512

      94335b7fb0c2952df4fbae0fa630f3ec5612783866d86d468f5b4429ba1c2617939ebeed7c54c8ebe2db9fa1f837e929974e646211ff8ce7e35c505c33679660

    • \Users\Admin\AppData\Local\Temp\RarSFX0\scoresystem.exe
      Filesize

      630KB

      MD5

      de39a7b5729cecc97244042f6eb858f7

      SHA1

      be4b03f12f9a81a2cbf6c782c66d230e609e0424

      SHA256

      f2e08945074adcc47885bd4f848112b9605238d0cc00db1e686bc567b408e687

      SHA512

      e01266297515b23e6f25cfd379c6c611f3ea94a58d239b0f3cd5254c4de503a2ee7ca0b150b14da6b7c81954c15025e57ce88bd796d1d150832f51a69b57c0f8

    • memory/604-64-0x0000000005390000-0x0000000005422000-memory.dmp
      Filesize

      584KB

    • memory/604-63-0x0000000005C60000-0x0000000005DE2000-memory.dmp
      Filesize

      1.5MB

    • memory/604-61-0x0000000001210000-0x000000000121A000-memory.dmp
      Filesize

      40KB

    • memory/604-70-0x0000000004F90000-0x0000000004FFA000-memory.dmp
      Filesize

      424KB

    • memory/604-58-0x0000000000000000-mapping.dmp
    • memory/744-76-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/744-74-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/744-72-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/744-78-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/744-81-0x000000000042D63C-mapping.dmp
    • memory/744-80-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/744-83-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/744-71-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/744-106-0x0000000000400000-0x000000000046C000-memory.dmp
      Filesize

      432KB

    • memory/908-101-0x0000000000000000-mapping.dmp
    • memory/948-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp
      Filesize

      8KB

    • memory/976-98-0x000000000041CE7E-mapping.dmp
    • memory/976-93-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/976-91-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/976-99-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/976-100-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/1156-89-0x0000000000000000-mapping.dmp
    • memory/1156-107-0x0000000000130000-0x00000000001A6000-memory.dmp
      Filesize

      472KB

    • memory/1384-68-0x000000006F1C0000-0x000000006F76B000-memory.dmp
      Filesize

      5.7MB

    • memory/1384-65-0x0000000000000000-mapping.dmp
    • memory/1384-67-0x000000006F1C0000-0x000000006F76B000-memory.dmp
      Filesize

      5.7MB

    • memory/1384-69-0x000000006F1C0000-0x000000006F76B000-memory.dmp
      Filesize

      5.7MB

    • memory/1420-56-0x0000000000000000-mapping.dmp