Analysis
-
max time kernel
140s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
#@!Fiile_SETUAP_9990_ṔAṨṨCṏḌḙ$/Setup.exe
Resource
win10v2004-20240419-en
General
-
Target
#@!Fiile_SETUAP_9990_ṔAṨṨCṏḌḙ$/Setup.exe
-
Size
8.5MB
-
MD5
98169506fec94c2b12ba9930ad704515
-
SHA1
bce662a9fb94551f648ba2d7e29659957fd6a428
-
SHA256
9b8a5b0a45adf843e24214b46c285e44e73bc6eaf9e2a3b2c14a6d93ae541363
-
SHA512
7f4f7ac2326a1a8b7afc72822dae328753578eb0a4ffcec5adb4e4fb0c49703070f71e7411df221ee9f44d6b43a0a94921fe530877c5d5e71640b807e96def30
-
SSDEEP
196608:vdoUox8PFOegKz+qE1cnuyHgv3eZaOxqeXY4K:vC0O9m7EWEvbOxqetK
Malware Config
Extracted
vidar
ae507327d61cf9c7d6e25cfa35a39433
https://hypaton.xyz
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
profile_id_v2
ae507327d61cf9c7d6e25cfa35a39433
-
user_agent
Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) AppleWebKit/534.6 (KHTML, like Gecko) Chrome/8.0.500.0 Safari/534.6
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Detect Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1580-45-0x0000000001230000-0x0000000001983000-memory.dmp family_vidar_v7 behavioral1/memory/1580-54-0x0000000001230000-0x0000000001983000-memory.dmp family_vidar_v7 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid Process procid_target PID 4816 set thread context of 1928 4816 Setup.exe 88 -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
Setup.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32 Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ = "%systemroot%\\system32\\eapsimextdesktop.dll" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ThreadingModel = "Apartment" Setup.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4352 1580 WerFault.exe 98 -
Modifies registry class 5 IoCs
Processes:
Setup.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ = "%systemroot%\\system32\\eapsimextdesktop.dll" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32\ThreadingModel = "Apartment" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3} Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\ = "EAPSIM Identity Task class" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6EEAF7AB-9B86-0A4B-E9E8-6422E70DF8B3}\InprocServer32 Setup.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exenetsh.exepid Process 4816 Setup.exe 4816 Setup.exe 1928 netsh.exe 1928 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exenetsh.exepid Process 4816 Setup.exe 1928 netsh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Setup.exenetsh.exedescription pid Process procid_target PID 4816 wrote to memory of 1928 4816 Setup.exe 88 PID 4816 wrote to memory of 1928 4816 Setup.exe 88 PID 4816 wrote to memory of 1928 4816 Setup.exe 88 PID 4816 wrote to memory of 1928 4816 Setup.exe 88 PID 1928 wrote to memory of 1580 1928 netsh.exe 98 PID 1928 wrote to memory of 1580 1928 netsh.exe 98 PID 1928 wrote to memory of 1580 1928 netsh.exe 98 PID 1928 wrote to memory of 1580 1928 netsh.exe 98 PID 1928 wrote to memory of 1580 1928 netsh.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\#@!Fiile_SETUAP_9990_ṔAṨṨCṏḌḙ$\Setup.exe"C:\Users\Admin\AppData\Local\Temp\#@!Fiile_SETUAP_9990_ṔAṨṨCṏḌḙ$\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 18644⤵
- Program crash
PID:4352
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1580 -ip 15801⤵PID:4204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD59f307e5e6009f90168c88e21c6e34aa2
SHA1b3f97a7daefcc2aafb78f5d31a25957b9eaf65b2
SHA2560d1317a63e19e33af3d4cbb644343fbb15d658937867883e148f2fe62a3359e7
SHA5129a071a5fe42d754e8cf439a4ebf9d497831923db7fe9e8c9d31d4f0156dc779b085a5710bea1f5ca53f17adc61df284e7da9f0431120bac0c5c08609eae5ce5b