Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2023 02:02

General

  • Target

    HEUR-Trojan-PSW.Win32.Vidar.gen-b008e6b92de9b.exe

  • Size

    200KB

  • MD5

    b40a86d86b0b2eb794da2090b8ea1535

  • SHA1

    4d059b2cd846cad3cb1f53447bd5d14a2e648480

  • SHA256

    b008e6b92de9b7d2e18fe2712c1c0f2d86fbe86e70093e4c54c490161818992c

  • SHA512

    5e0f4dd97d2922683a7947730212813afbd7cb48f09929590dbbf5946251b15e3071fd9e3f45d78647fbc101be4f1fe7b9b1fb5a887f38df8f90b9abb2725ae8

  • SSDEEP

    3072:WfUomEuYm98dlSq7gt5q7Dx+XgS6aCEwhOfUbCalNT2pbB3fIE1Xi6FLPo3c:WfUauY68uSWCx+XA7mg2pNt1Ljo3c

Malware Config

Signatures

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-PSW.Win32.Vidar.gen-b008e6b92de9b.exe
    "C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan-PSW.Win32.Vidar.gen-b008e6b92de9b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 768
      2⤵
      • Program crash
      PID:280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\msvcp140.dll

    Filesize

    153B

    MD5

    ad6c7bb3ad65961e7db70eb6862ee7e9

    SHA1

    3a8850398558c4fe508e580e44a8502ec84e8bfb

    SHA256

    0decea22d408383564ddb8d5e4541ec377a1b50d6ddd6a5cbdec4346e27d2d7b

    SHA512

    efe589d2c8f0a9f42e2a470c39d6cef54e418001b568fc77d7177527db655240f39f777fce4be471c93c53bd7865860e5671c261aa3165d9fbee5944712578f3