Resubmissions

07-01-2024 18:26

240107-w3ameabffn 10

Analysis

  • max time kernel
    9s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2024 18:26

General

  • Target

    Samples 7/dde59b015e0acd1910513cf1da07f3b17d6530816d663c102ed9ad6ab6d575a5.exe

  • Size

    2.5MB

  • MD5

    e338fba38c82e46b25dcec3dce9ed5d1

  • SHA1

    7d76df722d5820c4a6320d26d9240264dab19b0b

  • SHA256

    dde59b015e0acd1910513cf1da07f3b17d6530816d663c102ed9ad6ab6d575a5

  • SHA512

    99100aacc05d50f02d3a53fb2bd677deecf51c60e60f7559e0ff0d0d40ee6a86b81606638d619ea457454045efb240855097f8095f0396b6d24978b38ad8ab9a

  • SSDEEP

    49152:xcB/W2pZACrSaZjfBgNUIk5ZOwE1rmIvARVrxe8+ocT9L0pP5hYSnPdm9:xsWOCdcriNUIvdIRtE9oc9L0pPdnFO

Malware Config

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Samples 7\dde59b015e0acd1910513cf1da07f3b17d6530816d663c102ed9ad6ab6d575a5.exe
    "C:\Users\Admin\AppData\Local\Temp\Samples 7\dde59b015e0acd1910513cf1da07f3b17d6530816d663c102ed9ad6ab6d575a5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3880
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 564
        3⤵
        • Program crash
        PID:3020
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Fri05090e6b571e139.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1436
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Fri058f479171732c959.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Fri051bef0a158b9.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2056
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Fri05cb95f8bb00f6e1c.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1520
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Fri050dad867a09bc1.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:388
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Fri059bb475f9c.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2468
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Fri05b4b202015e2b3c.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4968
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Fri05acd872029bc7.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1576
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Fri052297d9e8ac1.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3768
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2016
  • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri050dad867a09bc1.exe
    Fri050dad867a09bc1.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Users\Admin\AppData\Local\Temp\is-T7CID.tmp\Fri050dad867a09bc1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-T7CID.tmp\Fri050dad867a09bc1.tmp" /SL5="$50230,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri050dad867a09bc1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:5000
  • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri058f479171732c959.exe
    Fri058f479171732c959.exe
    1⤵
    • Executes dropped EXE
    PID:2444
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3228
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3880 -ip 3880
    1⤵
      PID:3108
    • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri059bb475f9c.exe
      Fri059bb475f9c.exe
      1⤵
      • Executes dropped EXE
      PID:2008
    • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri051bef0a158b9.exe
      Fri051bef0a158b9.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4732
    • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri052297d9e8ac1.exe
      Fri052297d9e8ac1.exe
      1⤵
      • Executes dropped EXE
      PID:4412
    • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri05cb95f8bb00f6e1c.exe
      Fri05cb95f8bb00f6e1c.exe
      1⤵
      • Executes dropped EXE
      PID:2544
    • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri05b4b202015e2b3c.exe
      Fri05b4b202015e2b3c.exe
      1⤵
      • Executes dropped EXE
      PID:2992
    • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri05090e6b571e139.exe
      Fri05090e6b571e139.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1928
    • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\Fri05acd872029bc7.exe
      Fri05acd872029bc7.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1712
    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
      1⤵
        PID:1308

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\libcurl.dll

        Filesize

        218KB

        MD5

        d09be1f47fd6b827c81a4812b4f7296f

        SHA1

        028ae3596c0790e6d7f9f2f3c8e9591527d267f7

        SHA256

        0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

        SHA512

        857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

      • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\libcurlpp.dll

        Filesize

        54KB

        MD5

        e6e578373c2e416289a8da55f1dc5e8e

        SHA1

        b601a229b66ec3d19c2369b36216c6f6eb1c063e

        SHA256

        43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

        SHA512

        9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

      • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\libgcc_s_dw2-1.dll

        Filesize

        113KB

        MD5

        9aec524b616618b0d3d00b27b6f51da1

        SHA1

        64264300801a353db324d11738ffed876550e1d3

        SHA256

        59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

        SHA512

        0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

      • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\libstdc++-6.dll

        Filesize

        647KB

        MD5

        5e279950775baae5fea04d2cc4526bcc

        SHA1

        8aef1e10031c3629512c43dd8b0b5d9060878453

        SHA256

        97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

        SHA512

        666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

      • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\libwinpthread-1.dll

        Filesize

        69KB

        MD5

        1e0d62c34ff2e649ebc5c372065732ee

        SHA1

        fcfaa36ba456159b26140a43e80fbd7e9d9af2de

        SHA256

        509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

        SHA512

        3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

      • C:\Users\Admin\AppData\Local\Temp\7zS0F85D767\setup_install.exe

        Filesize

        2.1MB

        MD5

        3a25f7ff1d975646f466e257c4e5a86c

        SHA1

        d7976279b7c63f3510c3e01ed1f88d3faa06fc44

        SHA256

        d52060e481348e9ed76f8866f5ba51fbfa145c45941a738f6742624222c8db35

        SHA512

        aff9b3c0eb42e4e65b3f61a62600fca93f478ed5ef130b3a11e1913465309c7c5f3c852d63c4ea6123e54bac6f6079584f5395c63df62b073f11f479b007b2ca

      • memory/1712-126-0x0000000000400000-0x00000000023AC000-memory.dmp

        Filesize

        31.7MB

      • memory/1712-109-0x0000000002550000-0x0000000002650000-memory.dmp

        Filesize

        1024KB

      • memory/1712-110-0x00000000001C0000-0x00000000001C9000-memory.dmp

        Filesize

        36KB

      • memory/1928-92-0x00007FFDB2890000-0x00007FFDB3351000-memory.dmp

        Filesize

        10.8MB

      • memory/1928-83-0x0000000000260000-0x0000000000268000-memory.dmp

        Filesize

        32KB

      • memory/1928-107-0x0000000002400000-0x0000000002410000-memory.dmp

        Filesize

        64KB

      • memory/2008-128-0x00000000024D0000-0x000000000256D000-memory.dmp

        Filesize

        628KB

      • memory/2008-133-0x00000000025C0000-0x00000000026C0000-memory.dmp

        Filesize

        1024KB

      • memory/2008-132-0x0000000000400000-0x0000000002400000-memory.dmp

        Filesize

        32.0MB

      • memory/3228-154-0x0000000006D20000-0x0000000006D3E000-memory.dmp

        Filesize

        120KB

      • memory/3228-143-0x0000000006D40000-0x0000000006D72000-memory.dmp

        Filesize

        200KB

      • memory/3228-124-0x00000000063E0000-0x0000000006734000-memory.dmp

        Filesize

        3.3MB

      • memory/3228-104-0x00000000053B0000-0x00000000053C0000-memory.dmp

        Filesize

        64KB

      • memory/3228-91-0x00000000031B0000-0x00000000031E6000-memory.dmp

        Filesize

        216KB

      • memory/3228-103-0x00000000727A0000-0x0000000072F50000-memory.dmp

        Filesize

        7.7MB

      • memory/3228-162-0x0000000007CF0000-0x0000000007CFE000-memory.dmp

        Filesize

        56KB

      • memory/3228-106-0x00000000053B0000-0x00000000053C0000-memory.dmp

        Filesize

        64KB

      • memory/3228-168-0x00000000727A0000-0x0000000072F50000-memory.dmp

        Filesize

        7.7MB

      • memory/3228-165-0x0000000007DE0000-0x0000000007DE8000-memory.dmp

        Filesize

        32KB

      • memory/3228-134-0x0000000006790000-0x00000000067AE000-memory.dmp

        Filesize

        120KB

      • memory/3228-135-0x00000000067E0000-0x000000000682C000-memory.dmp

        Filesize

        304KB

      • memory/3228-164-0x0000000007DF0000-0x0000000007E0A000-memory.dmp

        Filesize

        104KB

      • memory/3228-121-0x0000000006300000-0x0000000006366000-memory.dmp

        Filesize

        408KB

      • memory/3228-163-0x0000000007D00000-0x0000000007D14000-memory.dmp

        Filesize

        80KB

      • memory/3228-122-0x0000000006370000-0x00000000063D6000-memory.dmp

        Filesize

        408KB

      • memory/3228-101-0x00000000059F0000-0x0000000006018000-memory.dmp

        Filesize

        6.2MB

      • memory/3228-142-0x000000007F8F0000-0x000000007F900000-memory.dmp

        Filesize

        64KB

      • memory/3228-111-0x00000000058E0000-0x0000000005902000-memory.dmp

        Filesize

        136KB

      • memory/3228-161-0x0000000007CC0000-0x0000000007CD1000-memory.dmp

        Filesize

        68KB

      • memory/3228-160-0x0000000007D30000-0x0000000007DC6000-memory.dmp

        Filesize

        600KB

      • memory/3228-156-0x0000000007760000-0x0000000007803000-memory.dmp

        Filesize

        652KB

      • memory/3228-155-0x00000000053B0000-0x00000000053C0000-memory.dmp

        Filesize

        64KB

      • memory/3228-157-0x0000000008100000-0x000000000877A000-memory.dmp

        Filesize

        6.5MB

      • memory/3228-158-0x0000000007AC0000-0x0000000007ADA000-memory.dmp

        Filesize

        104KB

      • memory/3228-159-0x0000000007B40000-0x0000000007B4A000-memory.dmp

        Filesize

        40KB

      • memory/3228-144-0x00000000747F0000-0x000000007483C000-memory.dmp

        Filesize

        304KB

      • memory/3880-125-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/3880-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/3880-54-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/3880-61-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/3880-127-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/3880-123-0x0000000000400000-0x000000000051B000-memory.dmp

        Filesize

        1.1MB

      • memory/3880-130-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/3880-129-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/3880-131-0x000000006EB40000-0x000000006EB63000-memory.dmp

        Filesize

        140KB

      • memory/3880-49-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/3880-50-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/3880-60-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/3880-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/3880-51-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/3880-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/3880-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/3880-55-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/3880-53-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/3880-52-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/3996-74-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/3996-141-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/4732-108-0x000000001B540000-0x000000001B550000-memory.dmp

        Filesize

        64KB

      • memory/4732-102-0x0000000000F20000-0x0000000000F3E000-memory.dmp

        Filesize

        120KB

      • memory/4732-86-0x0000000000840000-0x000000000086C000-memory.dmp

        Filesize

        176KB

      • memory/4732-89-0x00007FFDB2890000-0x00007FFDB3351000-memory.dmp

        Filesize

        10.8MB

      • memory/5000-105-0x0000000002020000-0x0000000002021000-memory.dmp

        Filesize

        4KB

      • memory/5000-139-0x0000000000400000-0x0000000000516000-memory.dmp

        Filesize

        1.1MB