Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3@#!!Newest...up.exe
windows7-x64
10@#!!Newest...up.exe
windows10-2004-x64
10@#!!Newest...ll.dll
windows7-x64
1@#!!Newest...ll.dll
windows10-2004-x64
1@#!!Newest...40.dll
windows7-x64
3@#!!Newest...40.dll
windows10-2004-x64
3@#!!Newest...er.exe
windows7-x64
1@#!!Newest...er.exe
windows10-2004-x64
1@#!!Newest...40.dll
windows7-x64
3@#!!Newest...40.dll
windows10-2004-x64
3@#!!Newest...ib.dll
windows7-x64
1@#!!Newest...ib.dll
windows10-2004-x64
1@#!!Newest...er.exe
windows7-x64
1@#!!Newest...er.exe
windows10-2004-x64
1@#!!Newest...or.exe
windows7-x64
1@#!!Newest...or.exe
windows10-2004-x64
1@#!!Newest...st.dll
windows7-x64
1@#!!Newest...st.dll
windows10-2004-x64
1@#!!Newest...er.dll
windows7-x64
1@#!!Newest...er.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/Setup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/WCLDll.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/WCLDll.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/msvcp140.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/updater.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/updater.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/vcruntime140.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/vcruntime140.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/AzureKeyVaultDgssLib.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/AzureKeyVaultDgssLib.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/BugReporter.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/BugReporter.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/ComExtractor.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/ComExtractor.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/WinUiBootstrapper.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/WinUiBootstrapper.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-console-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral22
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-console-l1-2-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-datetime-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral24
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-debug-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-errorhandling-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral26
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-fibers-l1-1-0.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-file-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral28
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-file-l1-2-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-file-l2-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral30
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-handle-l1-1-0.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-heap-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral32
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-interlocked-l1-1-0.dll
Resource
win10v2004-20240426-en
General
-
Target
@#!!Newest_SoftWare_2024_P@SSCODE_%$/Setup.exe
-
Size
938KB
-
MD5
b15bac961f62448c872e1dc6d3931016
-
SHA1
1dcb61babb08fe5db711e379cb67335357a5db82
-
SHA256
bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5
-
SHA512
932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370
-
SSDEEP
24576:KjNRyoUXVwSCwfHACpA9EZkHx1KJ9ZiYwadzv:AzyLXVwPwfHACpAfRAhiYwadzv
Malware Config
Extracted
vidar
f98c5b0a7dd3573ec9aac41b4a67f845
https://redddog.xyz
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
profile_id_v2
f98c5b0a7dd3573ec9aac41b4a67f845
-
user_agent
Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) AppleWebKit/534.6 (KHTML, like Gecko) Chrome/8.0.500.0 Safari/534.6
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2512-24-0x0000000000440000-0x0000000000B8C000-memory.dmp family_vidar_v7 behavioral1/memory/2512-29-0x0000000000440000-0x0000000000B8C000-memory.dmp family_vidar_v7 -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 2 IoCs
resource yara_rule behavioral1/memory/2512-24-0x0000000000440000-0x0000000000B8C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral1/memory/2512-29-0x0000000000440000-0x0000000000B8C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2276 set thread context of 2588 2276 Setup.exe 28 -
Loads dropped DLL 5 IoCs
pid Process 2588 netsh.exe 2512 BvInputDiag.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2516 2512 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2276 Setup.exe 2276 Setup.exe 2588 netsh.exe 2588 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2276 Setup.exe 2588 netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2588 2276 Setup.exe 28 PID 2276 wrote to memory of 2588 2276 Setup.exe 28 PID 2276 wrote to memory of 2588 2276 Setup.exe 28 PID 2276 wrote to memory of 2588 2276 Setup.exe 28 PID 2276 wrote to memory of 2588 2276 Setup.exe 28 PID 2588 wrote to memory of 2512 2588 netsh.exe 30 PID 2588 wrote to memory of 2512 2588 netsh.exe 30 PID 2588 wrote to memory of 2512 2588 netsh.exe 30 PID 2588 wrote to memory of 2512 2588 netsh.exe 30 PID 2588 wrote to memory of 2512 2588 netsh.exe 30 PID 2588 wrote to memory of 2512 2588 netsh.exe 30 PID 2512 wrote to memory of 2516 2512 BvInputDiag.exe 31 PID 2512 wrote to memory of 2516 2512 BvInputDiag.exe 31 PID 2512 wrote to memory of 2516 2512 BvInputDiag.exe 31 PID 2512 wrote to memory of 2516 2512 BvInputDiag.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\@#!!Newest_SoftWare_2024_P@SSCODE_%$\Setup.exe"C:\Users\Admin\AppData\Local\Temp\@#!!Newest_SoftWare_2024_P@SSCODE_%$\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\BvInputDiag.exeC:\Users\Admin\AppData\Local\Temp\BvInputDiag.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 1484⤵
- Loads dropped DLL
- Program crash
PID:2516
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5a8f13174490b1e9fcaa1195a2fbe5c2d
SHA1a4cc822d292e43f9191e590f6867b28ba22c0420
SHA2562f62bbbaf7fd282d2b252422e6bee084c955ada5756cbb11d20766f08593b74e
SHA512d2902a602f13e8f89aa10ded0e611cfbf6d273dd564c98aab12d0b3df8fcfbac5c57d33106c72800f540a282a124e91803f0aabb82723a178da9e92380f15b2b
-
Filesize
136KB
MD53d754cfa4a5b2a3f19720550acf6d3cf
SHA1e5c78edbd54e14a42258a6c223d2cf128530e1b6
SHA2568e5e627881c8182bfbb64601c6f4f7b30ba950dfd10f638f404479406b2c03b8
SHA51218db06443a718b8233ac9724e7f96310bf5841d2c980cd1d02e6fb6743e23acc13bd67fcd214b4c0650ac933f6f081759d699c73e14baf26ffc324c2b30f153b