Analysis

  • max time kernel
    118s
  • max time network
    201s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 04:57

General

  • Target

    b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe

  • Size

    439KB

  • MD5

    7ac3d045fabcf67626b3515daebf4e98

  • SHA1

    7595d275aa0c8c17641065601b7d52468c214471

  • SHA256

    b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216

  • SHA512

    dc74055191869eb74a2ce6a23b98f87c0b13f153eec09e7332570cd09b27d233ee57a3b50f0a7ad8d67e3f5eff04d5971822fb611c9853822dca425cf9f7d9e5

  • SSDEEP

    6144:3FrVg9gU+57nzigO8CyekZVO9lsCtFCmsDNnEzGZK2dRt31Wh6ehSD:34q57nziZ+ekZV9UfsuzgL2Yeu

Malware Config

Extracted

Family

vidar

Version

8.2

Botnet

4bdee70ef97ecade3f5bde57c699bd29

C2

https://steamcommunity.com/profiles/76561199651834633

https://t.me/raf6ik

Attributes
  • profile_id_v2

    4bdee70ef97ecade3f5bde57c699bd29

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0

Signatures

  • Detect Vidar Stealer 6 IoCs
  • Detect ZGRat V1 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe
    "C:\Users\Admin\AppData\Local\Temp\b07e0b48bc71cad112c096cba915fdb28853e2c2882c2fdb9c856c6752493216.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2460
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1452
          3⤵
          • Program crash
          PID:1904

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            67KB

            MD5

            753df6889fd7410a2e9fe333da83a429

            SHA1

            3c425f16e8267186061dd48ac1c77c122962456e

            SHA256

            b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

            SHA512

            9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

          • C:\Users\Admin\AppData\Local\Temp\Tar7EC8.tmp

            Filesize

            159KB

            MD5

            50f0de4810df679c94cb39ab3b100cee

            SHA1

            0e013a2db51dcfa6bb1c8e6d520aed94717d738e

            SHA256

            773bdf611ac837f69b1d096c3017469cf6306ad4ff7a4b9ae665eb87f5c3d54b

            SHA512

            ca5a88abab884d7dac1484d3adef6bc3bb9ea7c3c4fa6f877642ea6b3fd09d359c14e3f00ca2c648bf72547210761aff4372f4adf3cb6f394085bc24623622ae

          • memory/1224-0-0x00000000009E0000-0x0000000000A50000-memory.dmp

            Filesize

            448KB

          • memory/1224-1-0x00000000747A0000-0x0000000074E8E000-memory.dmp

            Filesize

            6.9MB

          • memory/1224-2-0x0000000004BC0000-0x0000000004C00000-memory.dmp

            Filesize

            256KB

          • memory/1224-9-0x0000000001F80000-0x0000000003F80000-memory.dmp

            Filesize

            32.0MB

          • memory/1224-19-0x00000000747A0000-0x0000000074E8E000-memory.dmp

            Filesize

            6.9MB

          • memory/2480-16-0x0000000000400000-0x0000000000644000-memory.dmp

            Filesize

            2.3MB

          • memory/2480-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2480-11-0x0000000000400000-0x0000000000644000-memory.dmp

            Filesize

            2.3MB

          • memory/2480-20-0x0000000000400000-0x0000000000644000-memory.dmp

            Filesize

            2.3MB

          • memory/2480-13-0x0000000000400000-0x0000000000644000-memory.dmp

            Filesize

            2.3MB

          • memory/2480-12-0x0000000000400000-0x0000000000644000-memory.dmp

            Filesize

            2.3MB

          • memory/2480-8-0x0000000000400000-0x0000000000644000-memory.dmp

            Filesize

            2.3MB

          • memory/2480-22-0x0000000000400000-0x0000000000644000-memory.dmp

            Filesize

            2.3MB

          • memory/2480-7-0x0000000000400000-0x0000000000644000-memory.dmp

            Filesize

            2.3MB

          • memory/2480-5-0x0000000000400000-0x0000000000644000-memory.dmp

            Filesize

            2.3MB