Overview
overview
10Static
static
3@#!!Newest...up.exe
windows7-x64
10@#!!Newest...up.exe
windows10-2004-x64
10@#!!Newest...ll.dll
windows7-x64
1@#!!Newest...ll.dll
windows10-2004-x64
1@#!!Newest...40.dll
windows7-x64
3@#!!Newest...40.dll
windows10-2004-x64
3@#!!Newest...er.exe
windows7-x64
1@#!!Newest...er.exe
windows10-2004-x64
1@#!!Newest...40.dll
windows7-x64
3@#!!Newest...40.dll
windows10-2004-x64
3@#!!Newest...ib.dll
windows7-x64
1@#!!Newest...ib.dll
windows10-2004-x64
1@#!!Newest...er.exe
windows7-x64
1@#!!Newest...er.exe
windows10-2004-x64
1@#!!Newest...or.exe
windows7-x64
1@#!!Newest...or.exe
windows10-2004-x64
1@#!!Newest...st.dll
windows7-x64
1@#!!Newest...st.dll
windows10-2004-x64
1@#!!Newest...er.dll
windows7-x64
1@#!!Newest...er.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1@#!!Newest...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/Setup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/WCLDll.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/WCLDll.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/msvcp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/msvcp140.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/updater.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/updater.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/vcruntime140.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/vcruntime140.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/AzureKeyVaultDgssLib.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/AzureKeyVaultDgssLib.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/BugReporter.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/BugReporter.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/ComExtractor.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/ComExtractor.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/Microsoft.Toolkit.Win32.UI.XamlHost.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/WinUiBootstrapper.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/WinUiBootstrapper.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-console-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral22
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-console-l1-2-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-datetime-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral24
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-debug-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-errorhandling-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral26
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-fibers-l1-1-0.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-file-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral28
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-file-l1-2-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-file-l2-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral30
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-handle-l1-1-0.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-heap-l1-1-0.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral32
Sample
@#!!Newest_SoftWare_2024_P@SSCODE_%$/x64/api-ms-win-core-interlocked-l1-1-0.dll
Resource
win10v2004-20240426-en
General
-
Target
@#!!Newest_SoftWare_2024_P@SSCODE_%$/Setup.exe
-
Size
938KB
-
MD5
b15bac961f62448c872e1dc6d3931016
-
SHA1
1dcb61babb08fe5db711e379cb67335357a5db82
-
SHA256
bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5
-
SHA512
932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370
-
SSDEEP
24576:KjNRyoUXVwSCwfHACpA9EZkHx1KJ9ZiYwadzv:AzyLXVwPwfHACpAfRAhiYwadzv
Malware Config
Extracted
vidar
f98c5b0a7dd3573ec9aac41b4a67f845
https://redddog.xyz
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
profile_id_v2
f98c5b0a7dd3573ec9aac41b4a67f845
-
user_agent
Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) AppleWebKit/534.6 (KHTML, like Gecko) Chrome/8.0.500.0 Safari/534.6
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/1504-23-0x0000000000900000-0x000000000104C000-memory.dmp family_vidar_v7 behavioral2/memory/1504-32-0x0000000000900000-0x000000000104C000-memory.dmp family_vidar_v7 -
Detect binaries embedding considerable number of MFA browser extension IDs. 1 IoCs
resource yara_rule behavioral2/memory/1504-32-0x0000000000900000-0x000000000104C000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs -
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
resource yara_rule behavioral2/memory/1504-32-0x0000000000900000-0x000000000104C000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
resource yara_rule behavioral2/memory/1504-32-0x0000000000900000-0x000000000104C000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 2 IoCs
resource yara_rule behavioral2/memory/1504-23-0x0000000000900000-0x000000000104C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/1504-32-0x0000000000900000-0x000000000104C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 916 set thread context of 5016 916 Setup.exe 86 -
Loads dropped DLL 1 IoCs
pid Process 1504 BvInputDiag.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4588 1504 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 916 Setup.exe 916 Setup.exe 5016 netsh.exe 5016 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 916 Setup.exe 5016 netsh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 916 wrote to memory of 5016 916 Setup.exe 86 PID 916 wrote to memory of 5016 916 Setup.exe 86 PID 916 wrote to memory of 5016 916 Setup.exe 86 PID 916 wrote to memory of 5016 916 Setup.exe 86 PID 5016 wrote to memory of 1504 5016 netsh.exe 97 PID 5016 wrote to memory of 1504 5016 netsh.exe 97 PID 5016 wrote to memory of 1504 5016 netsh.exe 97 PID 5016 wrote to memory of 1504 5016 netsh.exe 97 PID 5016 wrote to memory of 1504 5016 netsh.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\@#!!Newest_SoftWare_2024_P@SSCODE_%$\Setup.exe"C:\Users\Admin\AppData\Local\Temp\@#!!Newest_SoftWare_2024_P@SSCODE_%$\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\BvInputDiag.exeC:\Users\Admin\AppData\Local\Temp\BvInputDiag.exe3⤵
- Loads dropped DLL
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 18924⤵
- Program crash
PID:4588
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1504 -ip 15041⤵PID:4340
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD549811e88bfe0d39bb4f9625bbd072de7
SHA11e0510637750684f89148ced19b15d0de2fac2ec
SHA25646c19acbc2eb7dee528230071e73d892d420408128e073903a1931efbf5f6939
SHA512eb98ae7832dba7c2011e9db772c1b074e4c3df38cb7f03b878177d971453a003651e285dcb906fc787c13337e064141aa110d01a110e73ee1991b89c58216e65
-
Filesize
136KB
MD53d754cfa4a5b2a3f19720550acf6d3cf
SHA1e5c78edbd54e14a42258a6c223d2cf128530e1b6
SHA2568e5e627881c8182bfbb64601c6f4f7b30ba950dfd10f638f404479406b2c03b8
SHA51218db06443a718b8233ac9724e7f96310bf5841d2c980cd1d02e6fb6743e23acc13bd67fcd214b4c0650ac933f6f081759d699c73e14baf26ffc324c2b30f153b