Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 05:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
98a6e37d9af5ee4cda7a587fc4a95b72.exe
Resource
win7-20231129-en
7 signatures
150 seconds
General
-
Target
98a6e37d9af5ee4cda7a587fc4a95b72.exe
-
Size
880KB
-
MD5
98a6e37d9af5ee4cda7a587fc4a95b72
-
SHA1
c350d75394e220be0f34a65caa06809d792e5ca9
-
SHA256
c0516d4260b9bdca3060ba8f0c72dbde751ffa23aaa530438c8615ceab11f17d
-
SHA512
5e3612c3710ceffa83c504080ce98d437257fefecc4493191d322d32c64983158dcdc53ef0ef18fbbd58b1b001962619f8c6c0b2166c43f0eed954efbab5aea2
-
SSDEEP
12288:D7A0dKCz3SOVjIsnYAvaVOjCTntDqtLLCnV7BdQxJQ66X2+rVQr2cCLFYzjjsmau:eqtujBICnVOQ6h+re2cGFmjoma6w
Malware Config
Extracted
Family
vidar
Version
40.1
Botnet
313
C2
https://eduarroma.tumblr.com/
Attributes
-
profile_id
313
Signatures
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/1048-9-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/1048-10-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/1048-11-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/1048-12-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/1048-22-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4248 set thread context of 1048 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 5000 1048 WerFault.exe 92 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4248 wrote to memory of 1048 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe 92 PID 4248 wrote to memory of 1048 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe 92 PID 4248 wrote to memory of 1048 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe 92 PID 4248 wrote to memory of 1048 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe 92 PID 4248 wrote to memory of 1048 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe 92 PID 4248 wrote to memory of 1048 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe 92 PID 4248 wrote to memory of 1048 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe 92 PID 4248 wrote to memory of 1048 4248 98a6e37d9af5ee4cda7a587fc4a95b72.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\98a6e37d9af5ee4cda7a587fc4a95b72.exe"C:\Users\Admin\AppData\Local\Temp\98a6e37d9af5ee4cda7a587fc4a95b72.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 18083⤵
- Program crash
PID:5000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1048 -ip 10481⤵PID:2092