Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
#DllHijacking #Vidar/Starter.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
#DllHijacking #Vidar/Starter.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
#Rhadamanthys/GitExecutor.exe
Resource
win7-20231215-en
General
-
Target
#DllHijacking #Vidar/Starter.exe
-
Size
7.3MB
-
MD5
49b6bce6cd0111433969c39a62635f91
-
SHA1
0e34b4e770cc7d018b955bc14dabb205321e872c
-
SHA256
29345d9c6ff0106c9032b15e2c88f17bc8972ed843d1b5c044cf17d00f1d45c5
-
SHA512
4737663a5a6b30779650dcaa461b7751bfb735d2c906d04d877604db5a270f68205e0ff1240f2509f2835d885708b849759b10d22deff3bf0f03579bd1402ff8
-
SSDEEP
49152:/Ph7SQtfhuOhfEPOBjP9P6SOgjha5VKnRt3RQ9Wpvgt4sbVpEmVT1oG3vTROBYxI:ntBbz3q9QluER
Malware Config
Extracted
vidar
7.8
b86ed69267e5641d44dafebd064d1e80
https://65.109.242.97
https://t.me/karl3on
https://steamcommunity.com/profiles/76561199637071579
-
profile_id_v2
b86ed69267e5641d44dafebd064d1e80
-
user_agent
Mozilla/5.0 (X11; Linux 3.5.4-1-ARCH i686; es) KHTML/4.9.1 (like Gecko) Konqueror/4.9
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/2844-21-0x0000000000420000-0x0000000000B68000-memory.dmp family_vidar_v7 behavioral1/memory/2844-61-0x0000000000420000-0x0000000000B68000-memory.dmp family_vidar_v7 behavioral1/memory/2844-62-0x0000000000420000-0x0000000000B68000-memory.dmp family_vidar_v7 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 2532 2232 Starter.exe 28 -
Loads dropped DLL 7 IoCs
pid Process 2532 cmd.exe 2844 gsd.exe 552 WerFault.exe 552 WerFault.exe 552 WerFault.exe 552 WerFault.exe 552 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 552 2844 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2232 Starter.exe 2232 Starter.exe 2532 cmd.exe 2532 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2232 Starter.exe 2532 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2532 2232 Starter.exe 28 PID 2232 wrote to memory of 2532 2232 Starter.exe 28 PID 2232 wrote to memory of 2532 2232 Starter.exe 28 PID 2232 wrote to memory of 2532 2232 Starter.exe 28 PID 2232 wrote to memory of 2532 2232 Starter.exe 28 PID 2532 wrote to memory of 2844 2532 cmd.exe 30 PID 2532 wrote to memory of 2844 2532 cmd.exe 30 PID 2532 wrote to memory of 2844 2532 cmd.exe 30 PID 2532 wrote to memory of 2844 2532 cmd.exe 30 PID 2532 wrote to memory of 2844 2532 cmd.exe 30 PID 2844 wrote to memory of 552 2844 gsd.exe 34 PID 2844 wrote to memory of 552 2844 gsd.exe 34 PID 2844 wrote to memory of 552 2844 gsd.exe 34 PID 2844 wrote to memory of 552 2844 gsd.exe 34 PID 2532 wrote to memory of 2844 2532 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\#DllHijacking #Vidar\Starter.exe"C:\Users\Admin\AppData\Local\Temp\#DllHijacking #Vidar\Starter.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\gsd.exeC:\Users\Admin\AppData\Local\Temp\gsd.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 14324⤵
- Loads dropped DLL
- Program crash
PID:552
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD561425e461d8bcd8e5edbcc6dc13c73d5
SHA16c8cd2d6e0af34c2e49a4efb77aec6840684896f
SHA256402620b1ebf0ebac17d6d460add502004b6b0f67f27c26d84aad91ccc9f1b565
SHA512307cd5614e51c6c74cc833a2944a0581e89004a4802a6911cc2cf1ec097037185ba7d1a3970048a6b4c34f8f2280fd146fe395187c3f7c2f087e7242574180e4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
82KB
MD59e368252cee939f6a19df11945968a54
SHA1633407597d5ef809dacfcc176b5bdebe4b3e92d8
SHA256dc1175b2170d87f53512761950ac3fbfd13afabade3ed4ae18627c4625a58dfd
SHA5127b6a03bec0f8c17c030621b5da8e39b0662ecad6e41f44d8085d6d8d0cae62452ed1dafac9f678b9355f804997b7feb9c7ebd981172b45144b76c98e3d30fe61