Analysis
-
max time kernel
132s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240419-en
General
-
Target
file.exe
-
Size
432KB
-
MD5
7fff271b63f7af3a9a59f068a6f8955f
-
SHA1
67c0082192328a5c003efe6fd87e38802b95570d
-
SHA256
48a6d2eb28127d8bc1623400f0b33ea5f51a7473ce3369a14e8b4a5f0d02bca4
-
SHA512
55c0a315476321ea11f9696fd3642cc3bd560ce5321d3c0c0f2b6913fce11ee3d4472fef0c8ff9bdd0972ea549d5d5932a92124351cd4f3fce5524d7eb8a2346
-
SSDEEP
6144:K5/FIlRSG9VJogxAJmVku6fpAgb+K0iudeI9Iaf3PMFViAnHo:w/FIbxAkV1gb7ZuwIaafP0Ho
Malware Config
Extracted
stealc
Extracted
vidar
9.3
03cea2609023d13f145ac6c5dc897112
https://steamcommunity.com/profiles/76561199680449169
https://t.me/r1g1o
-
profile_id_v2
03cea2609023d13f145ac6c5dc897112
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/101.0.0.0
Signatures
-
Detect Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral2/memory/944-2-0x0000000000970000-0x00000000009D2FAE-memory.dmp family_vidar_v7 behavioral2/memory/4684-1-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4684-4-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4684-6-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 944 set thread context of 4684 944 file.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2428 4684 WerFault.exe RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
file.exedescription pid process target process PID 944 wrote to memory of 1312 944 file.exe RegAsm.exe PID 944 wrote to memory of 1312 944 file.exe RegAsm.exe PID 944 wrote to memory of 1312 944 file.exe RegAsm.exe PID 944 wrote to memory of 4684 944 file.exe RegAsm.exe PID 944 wrote to memory of 4684 944 file.exe RegAsm.exe PID 944 wrote to memory of 4684 944 file.exe RegAsm.exe PID 944 wrote to memory of 4684 944 file.exe RegAsm.exe PID 944 wrote to memory of 4684 944 file.exe RegAsm.exe PID 944 wrote to memory of 4684 944 file.exe RegAsm.exe PID 944 wrote to memory of 4684 944 file.exe RegAsm.exe PID 944 wrote to memory of 4684 944 file.exe RegAsm.exe PID 944 wrote to memory of 4684 944 file.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 21083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4684 -ip 46841⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/944-0-0x00000000009CE000-0x00000000009D0000-memory.dmpFilesize
8KB
-
memory/944-2-0x0000000000970000-0x00000000009D2FAE-memory.dmpFilesize
395KB
-
memory/4684-1-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/4684-4-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/4684-6-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB