Analysis
-
max time kernel
42s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Installer.exe
Resource
win10v2004-20231215-en
General
-
Target
Installer.exe
-
Size
4.1MB
-
MD5
592979cd96d6fd6e8eb5c1052e17da40
-
SHA1
f8595fe8c43f53fcef96c7d0c7052acd6911c8c6
-
SHA256
4d78e8f9f29a96570957acee0c5504ec9c67b97a04892b72ebb31830155b8a81
-
SHA512
8afcdb9b9ccb6ab7472fc8c900234c575e79a00dfdc22ac499badc7e6b415021ba5e95999ad2c3171fa301cfd27d861ad0a2663d9287d0f1be7ed1db6fb2127f
-
SSDEEP
49152:XShgK5pr1wSKK2wAtpkspdExgeXxqusHK/Bu/j8IUI3F4AyZl0+Y5hVfuM+Bde3D:ChgKE4iwkusL9UsyZnY5hBMe3D
Malware Config
Extracted
vidar
7.6
8fc1cae2d848b9f26e1bb4d2655aff86
https://t.me/tvrugrats
https://steamcommunity.com/profiles/76561199627279110
-
profile_id_v2
8fc1cae2d848b9f26e1bb4d2655aff86
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral1/memory/2580-25-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2580-27-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2580-29-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2580-32-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2580-35-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2580-36-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2580-181-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2032-0-0x00000000002B0000-0x00000000006C0000-memory.dmp net_reactor -
Loads dropped DLL 1 IoCs
pid Process 2032 Installer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 2580 2032 Installer.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 1488 2580 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2032 wrote to memory of 2580 2032 Installer.exe 28 PID 2580 wrote to memory of 1488 2580 MsBuild.exe 32 PID 2580 wrote to memory of 1488 2580 MsBuild.exe 32 PID 2580 wrote to memory of 1488 2580 MsBuild.exe 32 PID 2580 wrote to memory of 1488 2580 MsBuild.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 13963⤵
- Program crash
PID:1488
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3c63d67fc975940fdf21c6c3af86643
SHA1bee4fe9947d19d910d08639f56e08695854c0ee4
SHA2560daf4293a0bb3d10d0bd69e81deb21ab5f857f68593ee78870a3267263353487
SHA512ae77bcc1e4d7a4e12b7fc930e88605fcdb3a02ca6128fe8fc92302033e85af4e107a7b7c84063e79ed36809b84747b04ea565b828ace86f62eaf3573036c1294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5753a471f06aeaf23c70ed9e2035c5e77
SHA19b18eee6371bdaadf159446420a350ec86d1815d
SHA256d35e4e9e3bb2a2b3d2a14611dc4b9f562124d4472bc00d2d690a916400a68019
SHA512ead850a5acd931d2b85e854f2fdba9393ea52f6344fa5fb8ef005b71fc74c6147d82c222adc14bad53f01e614a43e9d7ee69e6c6ec40cead7d1d1a26fd522617
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719