Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
c513c1da60b31eaa8b46870f9f0e29ff.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
c513c1da60b31eaa8b46870f9f0e29ff.exe
-
Size
1.4MB
-
MD5
c513c1da60b31eaa8b46870f9f0e29ff
-
SHA1
b564919aeb814216d09f6a79221efcf7a22de7b6
-
SHA256
a2ac6fd6156acf555c5eabc6a1bd33d03f6d569ae5a9485c6c6619d6292fde01
-
SHA512
13f1d7ecab6c705445eac1c7a84695f7672fcf37e756776b172dabde739d5db1f25980203d2789b372ef5a18773699060d4174c2b65964794e67ae42f5d87503
-
SSDEEP
12288:8WHN1E9Z+v+yxI0W/0rT823E8ugpwrTzE8hEi4noP0+l7+kRQwWlKHaLhYnc4KJk:/1Eb+vbxtTlUfP4q1n
Malware Config
Extracted
Family
vidar
Version
40
Botnet
921
C2
https://lenak513.tumblr.com/
Attributes
-
profile_id
921
Signatures
-
Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4544-7-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/4544-9-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/4544-10-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/4544-12-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/4544-22-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c513c1da60b31eaa8b46870f9f0e29ff.exedescription pid process target process PID 4044 set thread context of 4544 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe c513c1da60b31eaa8b46870f9f0e29ff.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4136 4544 WerFault.exe c513c1da60b31eaa8b46870f9f0e29ff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c513c1da60b31eaa8b46870f9f0e29ff.exedescription pid process Token: SeDebugPrivilege 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c513c1da60b31eaa8b46870f9f0e29ff.exedescription pid process target process PID 4044 wrote to memory of 4544 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe c513c1da60b31eaa8b46870f9f0e29ff.exe PID 4044 wrote to memory of 4544 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe c513c1da60b31eaa8b46870f9f0e29ff.exe PID 4044 wrote to memory of 4544 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe c513c1da60b31eaa8b46870f9f0e29ff.exe PID 4044 wrote to memory of 4544 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe c513c1da60b31eaa8b46870f9f0e29ff.exe PID 4044 wrote to memory of 4544 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe c513c1da60b31eaa8b46870f9f0e29ff.exe PID 4044 wrote to memory of 4544 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe c513c1da60b31eaa8b46870f9f0e29ff.exe PID 4044 wrote to memory of 4544 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe c513c1da60b31eaa8b46870f9f0e29ff.exe PID 4044 wrote to memory of 4544 4044 c513c1da60b31eaa8b46870f9f0e29ff.exe c513c1da60b31eaa8b46870f9f0e29ff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c513c1da60b31eaa8b46870f9f0e29ff.exe"C:\Users\Admin\AppData\Local\Temp\c513c1da60b31eaa8b46870f9f0e29ff.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c513c1da60b31eaa8b46870f9f0e29ff.exeC:\Users\Admin\AppData\Local\Temp\c513c1da60b31eaa8b46870f9f0e29ff.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 12083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4544 -ip 45441⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4044-6-0x0000000005290000-0x00000000052B8000-memory.dmpFilesize
160KB
-
memory/4044-1-0x00000000746E0000-0x0000000074E90000-memory.dmpFilesize
7.7MB
-
memory/4044-2-0x0000000005560000-0x0000000005B04000-memory.dmpFilesize
5.6MB
-
memory/4044-3-0x0000000005050000-0x00000000050E2000-memory.dmpFilesize
584KB
-
memory/4044-4-0x0000000005020000-0x0000000005030000-memory.dmpFilesize
64KB
-
memory/4044-5-0x0000000005000000-0x000000000500A000-memory.dmpFilesize
40KB
-
memory/4044-0-0x00000000005D0000-0x000000000073C000-memory.dmpFilesize
1.4MB
-
memory/4044-11-0x00000000746E0000-0x0000000074E90000-memory.dmpFilesize
7.7MB
-
memory/4544-7-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/4544-9-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/4544-10-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/4544-12-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB
-
memory/4544-22-0x0000000000400000-0x00000000004A1000-memory.dmpFilesize
644KB