Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 14:54

General

  • Target

    cec96441b7aec3a25e12fb162f97dc95.exe

  • Size

    694KB

  • MD5

    cec96441b7aec3a25e12fb162f97dc95

  • SHA1

    180e9f1be05cc240f518d8434cfba0b996529967

  • SHA256

    a31c163b94090364e2943cfb908a19964d35f429618c5b2a5bc2acfc4b6485cf

  • SHA512

    0336e4de1dc8ccba6e07e5ca89b9ff265cb94f0541103d3ed34b3867f57911ea4dcbae954dd679e39c04e08dcf31b33c1899a85f6b2e09e32cb91f0fbfa84aa5

  • SSDEEP

    12288:4UsXWCVB5WibBe6d4gnVM4QOEu4z9WhQZs7cIYpckrz85lx7ldXARUI9nk:4UYvwb6d434QTu4Js530wtTIUgn

Malware Config

Extracted

Family

vidar

Version

40.5

Botnet

706

C2

https://gheorghip.tumblr.com/

Attributes
  • profile_id

    706

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cec96441b7aec3a25e12fb162f97dc95.exe
    "C:\Users\Admin\AppData\Local\Temp\cec96441b7aec3a25e12fb162f97dc95.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:376
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 1808
      2⤵
      • Program crash
      PID:2540
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 1804
      2⤵
      • Program crash
      PID:3168
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 376 -ip 376
    1⤵
      PID:5112
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 376 -ip 376
      1⤵
        PID:4396

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Credential Access

      Unsecured Credentials

      2
      T1552

      Credentials In Files

      2
      T1552.001

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\softokn3.dll
        Filesize

        119KB

        MD5

        e84b1afdf3f7caddc53f6dd779386a0d

        SHA1

        f8153c9fe6748100e7061872f3d6b67e9542142f

        SHA256

        8590144c985a09c70e14e510a11336e05fd87bef3f7e6f8f448eeb02b1b03485

        SHA512

        0340c606d3e862268e17fe9fa122d393eac564fad022026d25df1aa5a34b534ea7e5c96f2ec860fc811a037b4a96469a5507ad227666c430eb70e57ec5415b77

      • memory/376-1-0x0000000002EF0000-0x0000000002FF0000-memory.dmp
        Filesize

        1024KB

      • memory/376-2-0x0000000004990000-0x0000000004A61000-memory.dmp
        Filesize

        836KB

      • memory/376-3-0x0000000000400000-0x0000000002BB8000-memory.dmp
        Filesize

        39.7MB

      • memory/376-22-0x0000000000400000-0x0000000002BB8000-memory.dmp
        Filesize

        39.7MB

      • memory/376-70-0x0000000000400000-0x0000000002BB8000-memory.dmp
        Filesize

        39.7MB

      • memory/376-72-0x0000000004990000-0x0000000004A61000-memory.dmp
        Filesize

        836KB

      • memory/376-71-0x0000000002EF0000-0x0000000002FF0000-memory.dmp
        Filesize

        1024KB