Analysis
-
max time kernel
118s -
max time network
201s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 04:57
Behavioral task
behavioral1
Sample
b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe
Resource
win10-20240221-en
General
-
Target
b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe
-
Size
439KB
-
MD5
7ac3d045fabcf67626b3515daebf4e98
-
SHA1
7595d275aa0c8c17641065601b7d52468c214471
-
SHA256
b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216
-
SHA512
dc74055191869eb74a2ce6a23b98f87c0b13f153eec09e7332570cd09b27d233ee57a3b50f0a7ad8d67e3f5eff04d5971822fb611c9853822dca425cf9f7d9e5
-
SSDEEP
6144:3FrVg9gU+57nzigO8CyekZVO9lsCtFCmsDNnEzGZK2dRt31Wh6ehSD:34q57nziZ+ekZV9UfsuzgL2Yeu
Malware Config
Extracted
vidar
8.2
4bdee70ef97ecade3f5bde57c699bd29
https://steamcommunity.com/profiles/76561199651834633
https://t.me/raf6ik
-
profile_id_v2
4bdee70ef97ecade3f5bde57c699bd29
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral1/memory/2480-11-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/2480-16-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/2480-20-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/2480-13-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/2480-12-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/2480-22-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral1/memory/1224-0-0x00000000009E0000-0x0000000000A50000-memory.dmp family_zgrat_v1 behavioral1/memory/1224-2-0x0000000004BC0000-0x0000000004C00000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1224 set thread context of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 1904 2480 WerFault.exe 30 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2460 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 29 PID 1224 wrote to memory of 2460 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 29 PID 1224 wrote to memory of 2460 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 29 PID 1224 wrote to memory of 2460 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 29 PID 1224 wrote to memory of 2460 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 29 PID 1224 wrote to memory of 2460 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 29 PID 1224 wrote to memory of 2460 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 29 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 1224 wrote to memory of 2480 1224 b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe 30 PID 2480 wrote to memory of 1904 2480 RegAsm.exe 33 PID 2480 wrote to memory of 1904 2480 RegAsm.exe 33 PID 2480 wrote to memory of 1904 2480 RegAsm.exe 33 PID 2480 wrote to memory of 1904 2480 RegAsm.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe"C:\Users\Admin\AppData\Local\Temp\b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 14523⤵
- Program crash
PID:1904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
159KB
MD550f0de4810df679c94cb39ab3b100cee
SHA10e013a2db51dcfa6bb1c8e6d520aed94717d738e
SHA256773bdf611ac837f69b1d096c3017469cf6306ad4ff7a4b9ae665eb87f5c3d54b
SHA512ca5a88abab884d7dac1484d3adef6bc3bb9ea7c3c4fa6f877642ea6b3fd09d359c14e3f00ca2c648bf72547210761aff4372f4adf3cb6f394085bc24623622ae