Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 15:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4bcce262de6259786caf7150f1e70c89.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
4bcce262de6259786caf7150f1e70c89.exe
-
Size
691KB
-
MD5
4bcce262de6259786caf7150f1e70c89
-
SHA1
9c538ce7336de61584ca7c45161c6dc0a8a38fa0
-
SHA256
07ebc49fa05e1fa025e301afeffa0c80ba290b7470658481d231548830b66be4
-
SHA512
99b013ef9084543e64109702ddb63ae797252ffb2d915069889f47b60b04210a257f7db982e5f17ceddf43bd0c4346d8a6877f3cae3c40ee1fd12f2b7adf3a3f
-
SSDEEP
12288:qDAwleS5R7FjdjHxM5wAMTjrv7IkihOvvw0GCRaHXqQUC8mv:2lECX1RMYjTcovY0GCR6UC8mv
Malware Config
Extracted
Family
vidar
Version
40.4
Botnet
903
C2
https://romkaxarit.tumblr.com/
Attributes
-
profile_id
903
Signatures
-
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4388-2-0x0000000004900000-0x00000000049D3000-memory.dmp family_vidar behavioral2/memory/4388-3-0x0000000000400000-0x0000000002BB8000-memory.dmp family_vidar behavioral2/memory/4388-14-0x0000000004900000-0x00000000049D3000-memory.dmp family_vidar behavioral2/memory/4388-13-0x0000000000400000-0x0000000002BB8000-memory.dmp family_vidar -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2532 4388 WerFault.exe 4bcce262de6259786caf7150f1e70c89.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bcce262de6259786caf7150f1e70c89.exe"C:\Users\Admin\AppData\Local\Temp\4bcce262de6259786caf7150f1e70c89.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 18322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4388 -ip 43881⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4388-2-0x0000000004900000-0x00000000049D3000-memory.dmpFilesize
844KB
-
memory/4388-1-0x0000000002BC0000-0x0000000002CC0000-memory.dmpFilesize
1024KB
-
memory/4388-3-0x0000000000400000-0x0000000002BB8000-memory.dmpFilesize
39.7MB
-
memory/4388-14-0x0000000004900000-0x00000000049D3000-memory.dmpFilesize
844KB
-
memory/4388-13-0x0000000000400000-0x0000000002BB8000-memory.dmpFilesize
39.7MB