Analysis
-
max time kernel
51s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 14:27
Static task
static1
Behavioral task
behavioral1
Sample
1b6a482264775b5ab5b792c89f4cb272.exe
Resource
win7-20231215-en
General
-
Target
1b6a482264775b5ab5b792c89f4cb272.exe
-
Size
6.9MB
-
MD5
1b6a482264775b5ab5b792c89f4cb272
-
SHA1
c265d55a702cb0323f7347bea2915e8c63d89983
-
SHA256
19415b0f141eba1d036f14bc99b970db90e5f29b2656f69a56980b19214994b2
-
SHA512
5afaf1a5671962f752a28972d8b8fc348c1c1cc126d3ced48a0647eb37fb83d0910d7f4cacd31e17e9fb6a9dede8554be28fb48de275251440e30fe3b8a67113
-
SSDEEP
196608:kPGZKb8Ehfrm4JYKtjADXsuIwDO+tkw06y2:VoJrzaKtjADVIUdR
Malware Config
Extracted
vidar
39.8
953
https://xeronxikxxx.tumblr.com/
-
profile_id
953
Signatures
-
Babadeda Crypter 2 IoCs
resource yara_rule behavioral2/memory/2028-386-0x0000000002DD0000-0x0000000005DD0000-memory.dmp family_babadeda behavioral2/memory/2028-398-0x0000000002DD0000-0x0000000005DD0000-memory.dmp family_babadeda -
Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/2028-384-0x0000000000400000-0x0000000000B07000-memory.dmp family_vidar behavioral2/memory/2028-396-0x0000000000400000-0x0000000000B07000-memory.dmp family_vidar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 1b6a482264775b5ab5b792c89f4cb272.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation irsetup.exe -
Executes dropped EXE 2 IoCs
pid Process 4688 irsetup.exe 2028 smartmap.exe -
Loads dropped DLL 2 IoCs
pid Process 4688 irsetup.exe 2028 smartmap.exe -
resource yara_rule behavioral2/files/0x000f000000023138-4.dat upx behavioral2/files/0x000f000000023138-10.dat upx behavioral2/memory/4688-13-0x00000000005D0000-0x00000000009B8000-memory.dmp upx behavioral2/files/0x000f000000023138-14.dat upx behavioral2/memory/4688-382-0x00000000005D0000-0x00000000009B8000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2780 2028 WerFault.exe 93 1872 2028 WerFault.exe 93 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4688 irsetup.exe 4688 irsetup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4688 4968 1b6a482264775b5ab5b792c89f4cb272.exe 89 PID 4968 wrote to memory of 4688 4968 1b6a482264775b5ab5b792c89f4cb272.exe 89 PID 4968 wrote to memory of 4688 4968 1b6a482264775b5ab5b792c89f4cb272.exe 89 PID 4688 wrote to memory of 2028 4688 irsetup.exe 93 PID 4688 wrote to memory of 2028 4688 irsetup.exe 93 PID 4688 wrote to memory of 2028 4688 irsetup.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b6a482264775b5ab5b792c89f4cb272.exe"C:\Users\Admin\AppData\Local\Temp\1b6a482264775b5ab5b792c89f4cb272.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1798690 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\1b6a482264775b5ab5b792c89f4cb272.exe" "__IRCT:3" "__IRTSS:0" "__IRSID:S-1-5-21-1497073144-2389943819-3385106915-1000"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Roaming\Sentry Framework\smartmap.exe"C:\Users\Admin\AppData\Roaming\Sentry Framework\smartmap.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 9924⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 15884⤵
- Program crash
PID:1872
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2028 -ip 20281⤵PID:1716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2028 -ip 20281⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5629837597bfa4fcb7a124907c1e404d8
SHA1426777b49fa754dc17522f645f05351b2fb09d58
SHA256dedf77699b799afb2eb9c30f33a7a026cad3459c294af54008f38269c6e874e3
SHA5123b8ea64df085e222eb758e76de45f4863c78edcdb5440ce28792e7f021f12f14d1636178431e14d54e9e33b7af5fa1f7e132b01b268f83f35c6f5265407dbfa0
-
Filesize
381KB
MD5d2f4bc357b954f71c563f6073387bbe1
SHA11fc41b50de9baa6d8ecb05636a21fbb2fcd3abf0
SHA256898a40625625818e0c7134a5c2d20213681038c336e45b1454bb7b0920d1496b
SHA512e62abeb786aec2facb5a1adf0a25b48a670469f71184a8fdb5b7fd1cb7d04df9cec15287992f29c71198f78000fa1d863de3aea7bc821750bd826fc32974b46c
-
Filesize
1.3MB
MD5ac23d03c4b8d531016a3c1ebfa2bc91c
SHA111383627d5515ed2257f594db7fbce3a4b9106f8
SHA2560ddd10f3c8a3268237117f08a94c52ead801a76286bb76d0f521b56689801d06
SHA512bb649ab787a05dba410ce43a592b7f122c71f1fdc69bbb8789c57a3e64018189eebb9b46669a2d6a1b156818bb59beed130aeae6e1928108dee16168445659c1
-
Filesize
326KB
MD5e7a789232ef503dcb4929791673009a3
SHA18bc28bce4c9d8b4a6e360100441ba54a878de4c1
SHA25689daa79b558055f6f893abf38a0f17d3e1e0193d59dafbdf98d72d4e5961c2a1
SHA5126439a2ec5e9d486c15a37a736bc8d36d8e5f6ecb6a354d0fdd7efc9dccd3fb6bdb208a051b0d81f101669169826e07f9b4ddd79259c79c1e03856af5a9442b87
-
Filesize
5KB
MD59325aee138a4d9a15d651920fb403ffc
SHA119eb57cd989571fa8cd426cbd680430c0e006408
SHA2569c8346c7f288e63933ebda42cbb874f76067c48198b01adfb63bccfa11970c35
SHA512d3c0ccf217346e44436ac4f9db3e71b6d2eb152930005f019db5b58dcce923d94007e77fa5b938e182073c2e55163e886853b00e3fc22f135d70854120a218a8