Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 05:58

General

  • Target

    98a6e37d9af5ee4cda7a587fc4a95b72.exe

  • Size

    880KB

  • MD5

    98a6e37d9af5ee4cda7a587fc4a95b72

  • SHA1

    c350d75394e220be0f34a65caa06809d792e5ca9

  • SHA256

    c0516d4260b9bdca3060ba8f0c72dbde751ffa23aaa530438c8615ceab11f17d

  • SHA512

    5e3612c3710ceffa83c504080ce98d437257fefecc4493191d322d32c64983158dcdc53ef0ef18fbbd58b1b001962619f8c6c0b2166c43f0eed954efbab5aea2

  • SSDEEP

    12288:D7A0dKCz3SOVjIsnYAvaVOjCTntDqtLLCnV7BdQxJQ66X2+rVQr2cCLFYzjjsmau:eqtujBICnVOQ6h+re2cGFmjoma6w

Score
10/10

Malware Config

Extracted

Family

vidar

Version

40.1

Botnet

313

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    313

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 5 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98a6e37d9af5ee4cda7a587fc4a95b72.exe
    "C:\Users\Admin\AppData\Local\Temp\98a6e37d9af5ee4cda7a587fc4a95b72.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
        PID:1048
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1808
          3⤵
          • Program crash
          PID:5000
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1048 -ip 1048
      1⤵
        PID:2092

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1048-9-0x0000000000400000-0x00000000004A1000-memory.dmp

        Filesize

        644KB

      • memory/1048-22-0x0000000000400000-0x00000000004A1000-memory.dmp

        Filesize

        644KB

      • memory/1048-12-0x0000000000400000-0x00000000004A1000-memory.dmp

        Filesize

        644KB

      • memory/1048-11-0x0000000000400000-0x00000000004A1000-memory.dmp

        Filesize

        644KB

      • memory/1048-10-0x0000000000400000-0x00000000004A1000-memory.dmp

        Filesize

        644KB

      • memory/4248-3-0x00000000059D0000-0x0000000005F74000-memory.dmp

        Filesize

        5.6MB

      • memory/4248-6-0x0000000005480000-0x000000000548A000-memory.dmp

        Filesize

        40KB

      • memory/4248-7-0x0000000074A50000-0x0000000075200000-memory.dmp

        Filesize

        7.7MB

      • memory/4248-8-0x0000000005290000-0x00000000052A0000-memory.dmp

        Filesize

        64KB

      • memory/4248-5-0x0000000005290000-0x00000000052A0000-memory.dmp

        Filesize

        64KB

      • memory/4248-4-0x00000000054C0000-0x0000000005552000-memory.dmp

        Filesize

        584KB

      • memory/4248-0-0x0000000000690000-0x0000000000772000-memory.dmp

        Filesize

        904KB

      • memory/4248-2-0x00000000053B0000-0x0000000005416000-memory.dmp

        Filesize

        408KB

      • memory/4248-1-0x0000000074A50000-0x0000000075200000-memory.dmp

        Filesize

        7.7MB