Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
General
-
Target
file.exe
-
Size
350KB
-
MD5
c144f16a3e3aff33fc958fdea42df7e0
-
SHA1
470f6863ce73dbfd88441dc2c06e55d6ab3a96f6
-
SHA256
998c38a88197ab545ed66959130ba09db2359000da1fe5b6af913a33d5902cac
-
SHA512
6193661166530b6e923c1de242112c3e90d7562fce979d7d4933f49b61954a407badba5ddc0833ff00907b64b78e2a84630a3be8ba7ff18147d875f3f2b54e2a
-
SSDEEP
3072:y8RfADp0Sf7qbe+sXJZXAksI2opQJy1Im2VlzlVHu2rC86PlFEVSmkfQIkp7Kgtv:MDqy/PLIoqJyrY3c2G8yXmpIyKE1c
Malware Config
Extracted
vidar
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral1/memory/2872-2-0x0000000000230000-0x0000000000266000-memory.dmp family_vidar_v7 behavioral1/memory/3024-5-0x0000000000400000-0x000000000064A000-memory.dmp family_vidar_v7 behavioral1/memory/3024-7-0x0000000000400000-0x000000000064A000-memory.dmp family_vidar_v7 behavioral1/memory/3024-8-0x0000000000400000-0x000000000064A000-memory.dmp family_vidar_v7 behavioral1/memory/3024-36-0x0000000000400000-0x000000000064A000-memory.dmp family_vidar_v7 behavioral1/memory/3024-38-0x0000000000400000-0x000000000064A000-memory.dmp family_vidar_v7 behavioral1/memory/3024-39-0x0000000000400000-0x000000000064A000-memory.dmp family_vidar_v7 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2872 set thread context of 3024 2872 file.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 1864 3024 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 2872 wrote to memory of 3024 2872 file.exe 28 PID 3024 wrote to memory of 1864 3024 file.exe 33 PID 3024 wrote to memory of 1864 3024 file.exe 33 PID 3024 wrote to memory of 1864 3024 file.exe 33 PID 3024 wrote to memory of 1864 3024 file.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 14043⤵
- Program crash
PID:1864
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa