Analysis

  • max time kernel
    98s
  • max time network
    99s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2023 07:57

General

  • Target

    8b45ddb55c917429dad237eac7bce95e29808c4157d098956144d19f247a1c0d.exe

  • Size

    2.8MB

  • MD5

    094506dab589aa3933fe28379d607e4e

  • SHA1

    78b35e6e1c254f31079ea22a35fe5e0dde83848b

  • SHA256

    8b45ddb55c917429dad237eac7bce95e29808c4157d098956144d19f247a1c0d

  • SHA512

    5464a20e13a087fc56e441543d1182e2c7c80abd0156084d162a5b35cf0a357838b607f7956e07da6436ddc75abb22d7485c724b5770a6859f34d556ae0caa0e

  • SSDEEP

    49152:ex04mKYkbtgQ/MwW/qvf7RZoVZZOHTjqFfK5r9oQSP1vh4CTRCC2OFj2OFS3:8juTq9zzWk99o11vhbTRCH3

Malware Config

Extracted

Family

vidar

Version

2.3

Botnet

886

C2

https://t.me/mantarlars

https://steamcommunity.com/profiles/76561199474840123

Attributes
  • profile_id

    886

Signatures

  • Detect PureCrypter injector 1 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b45ddb55c917429dad237eac7bce95e29808c4157d098956144d19f247a1c0d.exe
    "C:\Users\Admin\AppData\Local\Temp\8b45ddb55c917429dad237eac7bce95e29808c4157d098956144d19f247a1c0d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:700
    • C:\Users\Admin\AppData\Local\Temp\8b45ddb55c917429dad237eac7bce95e29808c4157d098956144d19f247a1c0d.exe
      C:\Users\Admin\AppData\Local\Temp\8b45ddb55c917429dad237eac7bce95e29808c4157d098956144d19f247a1c0d.exe
      2⤵
        PID:588

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/588-70-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/588-68-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/588-64-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/588-66-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/588-63-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/588-76-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/588-75-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/588-78-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/588-72-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/700-60-0x000000006FEE0000-0x000000007048B000-memory.dmp

      Filesize

      5.7MB

    • memory/700-61-0x000000006FEE0000-0x000000007048B000-memory.dmp

      Filesize

      5.7MB

    • memory/700-59-0x000000006FEE0000-0x000000007048B000-memory.dmp

      Filesize

      5.7MB

    • memory/852-54-0x0000000000A00000-0x0000000000C8C000-memory.dmp

      Filesize

      2.5MB

    • memory/852-56-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

      Filesize

      8KB

    • memory/852-62-0x0000000004580000-0x00000000045EE000-memory.dmp

      Filesize

      440KB

    • memory/852-55-0x00000000049C0000-0x0000000004C4A000-memory.dmp

      Filesize

      2.5MB