Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-03-2024 06:52

General

  • Target

    b17ca9b32513aec9742a7e38c9fc0716.exe

  • Size

    702KB

  • MD5

    b17ca9b32513aec9742a7e38c9fc0716

  • SHA1

    368897b3e55e2fc0f484f90bcf839aed27f49417

  • SHA256

    6b441ae34112ccf492bc9b7cd467ef3dcf4dcb0ce0a25fb87836807da4991612

  • SHA512

    e5c8d5935ee36276c63204284facc31b77c70bf97b24d2090b4b4fe4f53d9cd10db59859b80d6b677490f1fb506c40bec20349397ed75fe67472ffbfde1ae012

  • SSDEEP

    12288:9BOoxOZuX86JY1oowOZ6XxAiVrjJgostVddbJ+slh5N3pdxNLUf5kEmVwqfbfT:90os8XfeXv6T7YHXbJ+w57dxuf5kEmVt

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.8

Botnet

921

C2

https://xeronxikxxx.tumblr.com/

Attributes
  • profile_id

    921

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b17ca9b32513aec9742a7e38c9fc0716.exe
    "C:\Users\Admin\AppData\Local\Temp\b17ca9b32513aec9742a7e38c9fc0716.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\b17ca9b32513aec9742a7e38c9fc0716.exe
      C:\Users\Admin\AppData\Local\Temp\b17ca9b32513aec9742a7e38c9fc0716.exe
      2⤵
        PID:3000
      • C:\Users\Admin\AppData\Local\Temp\b17ca9b32513aec9742a7e38c9fc0716.exe
        C:\Users\Admin\AppData\Local\Temp\b17ca9b32513aec9742a7e38c9fc0716.exe
        2⤵
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 856
          3⤵
          • Program crash
          PID:1880

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\Local\Temp\Tar5E6C.tmp
      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • memory/1216-4-0x0000000000400000-0x00000000004A1000-memory.dmp
      Filesize

      644KB

    • memory/1216-6-0x0000000000400000-0x00000000004A1000-memory.dmp
      Filesize

      644KB

    • memory/1216-8-0x0000000000400000-0x00000000004A1000-memory.dmp
      Filesize

      644KB

    • memory/1216-66-0x0000000000400000-0x00000000004A1000-memory.dmp
      Filesize

      644KB

    • memory/1720-0-0x0000000000270000-0x0000000000322000-memory.dmp
      Filesize

      712KB

    • memory/1720-1-0x00000000745B0000-0x0000000074C9E000-memory.dmp
      Filesize

      6.9MB

    • memory/1720-2-0x0000000004050000-0x0000000004090000-memory.dmp
      Filesize

      256KB

    • memory/1720-3-0x0000000000560000-0x0000000000586000-memory.dmp
      Filesize

      152KB

    • memory/1720-7-0x00000000745B0000-0x0000000074C9E000-memory.dmp
      Filesize

      6.9MB