Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1797s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
@#LATEST_SoftWare_2024_PASSCODE_$.rar
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
@#LATEST_SoftWare_2024_PASSCODE_$.rar
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
@#LATEST_SoftWare_2024_PASSCODE_$.rar
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
@#LATEST_SoftWare_2024_PASSCODE_$.rar
Resource
win11-20240419-en
General
-
Target
@#LATEST_SoftWare_2024_PASSCODE_$.rar
-
Size
51.5MB
-
MD5
c7c3d6aaa70594d6df0b8f3f40a7e2f6
-
SHA1
74f4da75221222f336009025a358366eaf6c1d68
-
SHA256
979e872622b1ae7ca6e9cb3599de8e400b3bfe537d3cb64261dffaa7956baa50
-
SHA512
c23ea4a4c280a529e798a89525fa14b02156d18e8029edb93920dcc1144d1346eb5ff18ebbc80caf55ab391205d7fa0b19d5dab1e029db523648e4b26f7af0b1
-
SSDEEP
786432:dMPQ7x53FKvsZTMlKxppk7c8joaJ6eWd7Gt9BZjQZfDG3q9PhUwuMr+NegCHR:dMP+/3F6StAoalWd7wOFawVRj
Malware Config
Extracted
vidar
04eb8f77b9c9e4d5a6a6e5a3b727c27e
https://graims.xyz
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
profile_id_v2
04eb8f77b9c9e4d5a6a6e5a3b727c27e
-
user_agent
Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) AppleWebKit/534.6 (KHTML, like Gecko) Chrome/8.0.500.0 Safari/534.6
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2372-409-0x0000000000980000-0x00000000010D2000-memory.dmp family_vidar_v7 behavioral1/memory/2372-418-0x0000000000980000-0x00000000010D2000-memory.dmp family_vidar_v7 -
Executes dropped EXE 1 IoCs
pid Process 1372 Setup.exe -
Loads dropped DLL 13 IoCs
pid Process 1372 Setup.exe 1372 Setup.exe 1372 Setup.exe 1372 Setup.exe 2520 ftp.exe 2372 PsExec.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1372 set thread context of 2520 1372 Setup.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2896 2372 WerFault.exe 34 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1372 Setup.exe 1372 Setup.exe 2520 ftp.exe 2520 ftp.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1372 Setup.exe 2520 ftp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2580 7zFM.exe Token: 35 2580 7zFM.exe Token: SeSecurityPrivilege 2580 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2580 7zFM.exe 2580 7zFM.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2580 2016 cmd.exe 29 PID 2016 wrote to memory of 2580 2016 cmd.exe 29 PID 2016 wrote to memory of 2580 2016 cmd.exe 29 PID 1372 wrote to memory of 2520 1372 Setup.exe 32 PID 1372 wrote to memory of 2520 1372 Setup.exe 32 PID 1372 wrote to memory of 2520 1372 Setup.exe 32 PID 1372 wrote to memory of 2520 1372 Setup.exe 32 PID 1372 wrote to memory of 2520 1372 Setup.exe 32 PID 2520 wrote to memory of 2372 2520 ftp.exe 34 PID 2520 wrote to memory of 2372 2520 ftp.exe 34 PID 2520 wrote to memory of 2372 2520 ftp.exe 34 PID 2520 wrote to memory of 2372 2520 ftp.exe 34 PID 2520 wrote to memory of 2372 2520 ftp.exe 34 PID 2520 wrote to memory of 2372 2520 ftp.exe 34 PID 2372 wrote to memory of 2896 2372 PsExec.exe 35 PID 2372 wrote to memory of 2896 2372 PsExec.exe 35 PID 2372 wrote to memory of 2896 2372 PsExec.exe 35 PID 2372 wrote to memory of 2896 2372 PsExec.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\@#LATEST_SoftWare_2024_PASSCODE_$.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\@#LATEST_SoftWare_2024_PASSCODE_$.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2580
-
-
C:\Users\Admin\Desktop\Setup.exe"C:\Users\Admin\Desktop\Setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\ftp.exeC:\Windows\SysWOW64\ftp.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\PsExec.exeC:\Users\Admin\AppData\Local\Temp\PsExec.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 1484⤵
- Loads dropped DLL
- Program crash
PID:2896
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5b2b9d2862166453d9a21caa226deb794
SHA1db3b88489976222342d7fdfcdcaa5e47a32620e4
SHA256f6755612b4e1781b2529ab3242faa72fbeaed44e4cedc9f210bd1f4d780c5b3b
SHA512f19505b790171359c56cfa1a261ff9349d575e32e5da61c68d6dd9aae8d676ebe1e57aed7a11e0aa03a07bf63c7e458e2125bf46e07457c0e9e8a077303aceef
-
Filesize
31KB
MD567dedab5bc0159f7cc61cb4b46daa6f1
SHA15d57ef4bd9b6ac672c413c5e8495263672f090e3
SHA2560e6f5eaa2cd91747213f6aec05e3de6fb46ea2b7cf4d5f3ac267128abc784d00
SHA5124c7ed5d6e0a76ac6eec79e50ae9cd4b5fe3eacda574606e47d85bba1739902d688aa6f5ec03e7863ec9d36bdadf6229f64bce8fe33bacf38e84e50332a30caf0
-
Filesize
52KB
MD55c1674067e3ef99382ab283fc7e969e3
SHA13c2fe52472aaedf690bab16fa801bbe4b36002cf
SHA25691fd630301631b88685602bf0d7353585c18e589189ed11ec620b37021683553
SHA51217f6fb9675c6f106789dba4e3df8adcaf4a297ad08bc28a223694e2080d61e7901a612b1c4dab674467241ddeb72597bc19db866247debdc0e32480bd53f9ac2
-
Filesize
6.0MB
MD5a1eaf011cca5726076ccfca62fd90a11
SHA1b92e274b4793d2f4e69111ccdf93182e7e7ddb64
SHA25611336a2aa99ff767dc4e547f8ce5924abeb2e440f6373e82dbd13c5c3ac873ff
SHA512ffa07420d4a8a3a9828d079f5ff043f1c70704bcac74d10d59bdd52d56e84aad39cd14610c53b8229710b5faccccd3d58a1e8ce36fc472df58cec5802acf1402
-
Filesize
1.0MB
MD52c86ec2ba23eb138528d70eef98e9aaf
SHA1246846a3fe46df492f0887a31f7d52aae4faa71a
SHA256030983470da06708cc55fd6aca92df199a051922b580db5db55c8cb6b203b51b
SHA512396a3883fa65d7c3a0af7d607001a6099316a85563147cb34fa9806c9a4b39cfa90c7fa9eb4456399977eb47438d10896d25ed5327ae7aa3e3ae28cd1d13701c
-
Filesize
699KB
MD524a648a48741b1ac809e47b9543c6f12
SHA13e2272b916da4be3c120d17490423230ab62c174
SHA256078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
SHA512b974ce956f2e922e92ca414d1bd6cc7bcb36bc44532b28b392f2a8052d6d47fd742841c4add6ec5c8283d28d7245b1704af34a523917e49cef007eef700a0b9a
-
Filesize
1.1MB
MD5862dfc9bf209a46d6f4874614a6631cc
SHA143216aae64df217cba009145b6f9ad5b97fe927a
SHA25684538f1aacebf9daad9fdb856611ab3d98a6d71c9ec79a8250eee694d2652a8b
SHA512b0611cd9ad441871cca62291913197257660390fa4ea8a26cb41dc343a8a27ae111762de40c6f50cae3e365d8891500fc6ad0571aa3cd3a77eb83d9d488d19a8
-
Filesize
87KB
MD5d1a21e38593fddba8e51ed6bf7acf404
SHA1759f16325f0920933ac977909b7fe261e0e129e6
SHA2566a64c9cb0904ed48ce0d5cda137fcfd6dd463d84681436ca647b195aa2038a7e
SHA5123f4390603cd68d949eb938c1599503fb1cbb1b8250638e0985fad2f40f08d5e45ea4a8c149e44a50c6aa9077054387c48f71b53bf06b713ca1e73a3d5a6a6c2e
-
Filesize
617KB
MD5f59ab22b88d1b2081810739c72bfa307
SHA1e8c4651f185225b3da91e2e24a17fcb95fc40773
SHA2560388d021f33fb0b922011854e3b49427c4ab38689f7d1ce663e9def6edc323f4
SHA512e67c93b2b6eeeeb95396e6c7cf7217cc8503d8e6824a7941d6fb2d971049abeb974e880392868b0687b16eef41cdb70ef70b70fa92ab284d863105324ab819dd