Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 20:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240419-en
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
359KB
-
MD5
b898ced2e152060f5770f1c6337006f6
-
SHA1
b607705b76412adecc350bd38994d94ca3870f5a
-
SHA256
716b19201a3109a3fb15b0401cb86a9be6df726c8b3a1a1c88cefb445457966b
-
SHA512
4abd4a0c23f8d92c722246cab49797a840ebfd3cd4b900ba310ff243c529149b887620cfee3241c1605e1ae5dab501ee17a8d4de0634c8c52792677b107029a7
-
SSDEEP
6144:YSgQdkTUGJXOjv5o1SDQadvOKfj7RG77sxEPqwt4vg51O+CNkvtPUavkb3eXr:1gSkTUGRODeaMKLtGfWLwCvRk1PJoeXr
Malware Config
Signatures
-
Detect Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3028-0-0x0000000000EF0000-0x0000000000F4E000-memory.dmp family_vidar_v7 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2320 3028 WerFault.exe file.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
file.exedescription pid process target process PID 3028 wrote to memory of 2320 3028 file.exe WerFault.exe PID 3028 wrote to memory of 2320 3028 file.exe WerFault.exe PID 3028 wrote to memory of 2320 3028 file.exe WerFault.exe PID 3028 wrote to memory of 2320 3028 file.exe WerFault.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3028-0-0x0000000000EF0000-0x0000000000F4E000-memory.dmpFilesize
376KB