Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
55de04a0c8bb1e49015b62988c835b9a.exe
Resource
win7-20231129-en
windows7-x64
0 signatures
150 seconds
General
-
Target
55de04a0c8bb1e49015b62988c835b9a.exe
-
Size
693KB
-
MD5
55de04a0c8bb1e49015b62988c835b9a
-
SHA1
6a91271deff3f90359e95cafb722f1d9db7f80f3
-
SHA256
3114d9a19def58cc62a9b5dbe78360e64772b46e1815c974f318cafb99eedc98
-
SHA512
f723a33d5e2ba14c45aa30b83887d2f9690266a736f3201cebcdc986b7d4f7a97458f05bbe4eb74e363f964bcb66dad230bc195328493cc387f4733d22f7b11a
-
SSDEEP
12288:ity5w2s0BhP2PFro43nQMmo4RRNc0g+W2rQeQlAMPGII1RMXF93SVRvVNQxXU:i0TscQPFc8HTWK0g+W2rSGmfCVVVNQxk
Malware Config
Extracted
Family
vidar
Version
39.9
Botnet
921
C2
https://prophefliloc.tumblr.com/
Attributes
-
profile_id
921
Signatures
-
Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4548-9-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/4548-10-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/4548-11-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/4548-13-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/4548-24-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
Suspicious use of SetThreadContext 1 IoCs
Processes:
55de04a0c8bb1e49015b62988c835b9a.exedescription pid process target process PID 516 set thread context of 4548 516 55de04a0c8bb1e49015b62988c835b9a.exe 55de04a0c8bb1e49015b62988c835b9a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
55de04a0c8bb1e49015b62988c835b9a.exedescription pid process Token: SeDebugPrivilege 516 55de04a0c8bb1e49015b62988c835b9a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
55de04a0c8bb1e49015b62988c835b9a.exedescription pid process target process PID 516 wrote to memory of 4548 516 55de04a0c8bb1e49015b62988c835b9a.exe 55de04a0c8bb1e49015b62988c835b9a.exe PID 516 wrote to memory of 4548 516 55de04a0c8bb1e49015b62988c835b9a.exe 55de04a0c8bb1e49015b62988c835b9a.exe PID 516 wrote to memory of 4548 516 55de04a0c8bb1e49015b62988c835b9a.exe 55de04a0c8bb1e49015b62988c835b9a.exe PID 516 wrote to memory of 4548 516 55de04a0c8bb1e49015b62988c835b9a.exe 55de04a0c8bb1e49015b62988c835b9a.exe PID 516 wrote to memory of 4548 516 55de04a0c8bb1e49015b62988c835b9a.exe 55de04a0c8bb1e49015b62988c835b9a.exe PID 516 wrote to memory of 4548 516 55de04a0c8bb1e49015b62988c835b9a.exe 55de04a0c8bb1e49015b62988c835b9a.exe PID 516 wrote to memory of 4548 516 55de04a0c8bb1e49015b62988c835b9a.exe 55de04a0c8bb1e49015b62988c835b9a.exe PID 516 wrote to memory of 4548 516 55de04a0c8bb1e49015b62988c835b9a.exe 55de04a0c8bb1e49015b62988c835b9a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55de04a0c8bb1e49015b62988c835b9a.exe"C:\Users\Admin\AppData\Local\Temp\55de04a0c8bb1e49015b62988c835b9a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\55de04a0c8bb1e49015b62988c835b9a.exeC:\Users\Admin\AppData\Local\Temp\55de04a0c8bb1e49015b62988c835b9a.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/516-6-0x0000000074BA0000-0x0000000075350000-memory.dmpFilesize
7.7MB
-
memory/516-8-0x0000000005960000-0x0000000005986000-memory.dmpFilesize
152KB
-
memory/516-2-0x0000000005A80000-0x0000000006024000-memory.dmpFilesize
5.6MB
-
memory/516-3-0x00000000054D0000-0x0000000005562000-memory.dmpFilesize
584KB
-
memory/516-4-0x00000000056E0000-0x00000000056F0000-memory.dmpFilesize
64KB
-
memory/516-5-0x0000000005460000-0x000000000546A000-memory.dmpFilesize
40KB
-
memory/516-1-0x00000000009C0000-0x0000000000A70000-memory.dmpFilesize
704KB
-
memory/516-7-0x00000000056E0000-0x00000000056F0000-memory.dmpFilesize
64KB
-
memory/516-0-0x0000000074BA0000-0x0000000075350000-memory.dmpFilesize
7.7MB
-
memory/516-14-0x0000000074BA0000-0x0000000075350000-memory.dmpFilesize
7.7MB
-
memory/4548-10-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/4548-11-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/4548-13-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/4548-9-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/4548-24-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB