Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 10:15
Behavioral task
behavioral1
Sample
942df1706c052d73741ec002d96b4fdf.exe
Resource
win7-20231215-en
General
-
Target
942df1706c052d73741ec002d96b4fdf.exe
-
Size
4.9MB
-
MD5
942df1706c052d73741ec002d96b4fdf
-
SHA1
21857f677c914c4599e548fb031578fa6c710f6f
-
SHA256
5abd6f4f7252ac98279db7727c79c5600870725fac5f8b883241a0265952fd69
-
SHA512
42b29fd69dd7893aa3c3e61d16905b3c683410cd9588e7c2bd936af3b4b77f5f363b72dddbfdeb20e7270308b3026c5020723fd4927f3b6b0317743499bdbfcb
-
SSDEEP
49152:TBm8JfTvWWDd6dgBvUNhIx2q7UU0ROfLV8UpY9gBhHaEE50acppKM:w8JmOUogq7GODaUpygBRXrpcM
Malware Config
Signatures
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/228-22-0x0000000000400000-0x000000000065E000-memory.dmp family_vidar_v6 behavioral2/memory/228-27-0x0000000000400000-0x000000000065E000-memory.dmp family_vidar_v6 behavioral2/memory/228-25-0x0000000000400000-0x000000000065E000-memory.dmp family_vidar_v6 behavioral2/memory/228-30-0x0000000000400000-0x000000000065E000-memory.dmp family_vidar_v6 -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4848-1-0x0000000000920000-0x0000000000E0C000-memory.dmp family_zgrat_v1 -
Loads dropped DLL 1 IoCs
pid Process 4848 942df1706c052d73741ec002d96b4fdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4848 set thread context of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 -
Program crash 1 IoCs
pid pid_target Process procid_target 3308 228 WerFault.exe 102 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4848 wrote to memory of 3488 4848 942df1706c052d73741ec002d96b4fdf.exe 103 PID 4848 wrote to memory of 3488 4848 942df1706c052d73741ec002d96b4fdf.exe 103 PID 4848 wrote to memory of 3488 4848 942df1706c052d73741ec002d96b4fdf.exe 103 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102 PID 4848 wrote to memory of 228 4848 942df1706c052d73741ec002d96b4fdf.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\942df1706c052d73741ec002d96b4fdf.exe"C:\Users\Admin\AppData\Local\Temp\942df1706c052d73741ec002d96b4fdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 20163⤵
- Program crash
PID:3308
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe2⤵PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 228 -ip 2281⤵PID:3284
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5aaf46aec220493cb71501c68000b1785
SHA109fcd3edcc33ca1469e4753f38160e757bc93e60
SHA256814c9b54f097333482904f33ca7dfbc5db71ebee3877b6b7dac10de7e4af73f3
SHA512158899ada4bdaed9a7069682b6805330648bee6c2211e74d9f44d4256decfaf4b1e3a0da5d034ddea9429aac3c6a8e9e06708bde6c5249c86059d41e1e384e21