Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-06-2024 00:54
Static task
static1
Behavioral task
behavioral1
Sample
7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe
Resource
win10v2004-20240611-en
General
-
Target
7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe
-
Size
1.6MB
-
MD5
242cf4251e0dec3a13473c30f1ab9051
-
SHA1
175966b4d5c3b63130ef87e1b9b3071e70a4d4c9
-
SHA256
7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1
-
SHA512
e55c624c348cbea3e45c3ba3ed8644988e8a5c6c13cf5d96f71e087342823e36d5adca10f871b43267fa242e768e3bf43e8e019441eae32baefb87610e5a98e0
-
SSDEEP
24576:spM5863IGfTAVpalBYUfMxVVtes12FxwojKr98YGeGG9i:spQLYkTYp6BYUkxVVChjHZQs
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Signatures
-
Detect Vidar Stealer 8 IoCs
Processes:
resource yara_rule behavioral2/memory/2240-10-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2240-8-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2240-4-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2240-11-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2240-12-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2240-14-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2240-13-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2240-15-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 -
Executes dropped EXE 1 IoCs
Processes:
kat499C.tmppid process 2240 kat499C.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exedescription pid process target process PID 1620 set thread context of 2240 1620 7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe kat499C.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
kat499C.tmpdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString kat499C.tmp -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1944 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
kat499C.tmppid process 2240 kat499C.tmp 2240 kat499C.tmp -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exekat499C.tmpcmd.exedescription pid process target process PID 1620 wrote to memory of 2240 1620 7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe kat499C.tmp PID 1620 wrote to memory of 2240 1620 7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe kat499C.tmp PID 1620 wrote to memory of 2240 1620 7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe kat499C.tmp PID 1620 wrote to memory of 2240 1620 7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe kat499C.tmp PID 1620 wrote to memory of 2240 1620 7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe kat499C.tmp PID 1620 wrote to memory of 2240 1620 7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe kat499C.tmp PID 1620 wrote to memory of 2240 1620 7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe kat499C.tmp PID 1620 wrote to memory of 2240 1620 7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe kat499C.tmp PID 2240 wrote to memory of 3016 2240 kat499C.tmp cmd.exe PID 2240 wrote to memory of 3016 2240 kat499C.tmp cmd.exe PID 2240 wrote to memory of 3016 2240 kat499C.tmp cmd.exe PID 3016 wrote to memory of 1944 3016 cmd.exe timeout.exe PID 3016 wrote to memory of 1944 3016 cmd.exe timeout.exe PID 3016 wrote to memory of 1944 3016 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe"C:\Users\Admin\AppData\Local\Temp\7219c5b418d16878855ed871c4367a909f9c5837d4e19e3397e4961a0abea3b1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kat499C.tmpC:\Users\Admin\AppData\Local\Temp\kat499C.tmp2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\kat499C.tmp" & rd /s /q "C:\ProgramData\DAAFBAKECAEG" & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\kat499C.tmpFilesize
448KB
MD5d7d3e9e68f500a5362ef855382d5934b
SHA1740495877cbcda9c61c8eb1ce3cb0c0f20738a81
SHA2568cdc50bc308edd6d0f70d7c8203f0ef469daaa62ae801a00c93e6b9160fef772
SHA512512f5d5764050274d5beb6c966c787eb50a9850ec4c4886cda14f3a912dc627d29d2cac5db7f825500041a47ce65ecc4e8f728dc934c748f6575ae17d4c2cf89
-
memory/1620-0-0x00000000022F0000-0x00000000022F1000-memory.dmpFilesize
4KB
-
memory/1620-9-0x0000000000400000-0x0000000000594000-memory.dmpFilesize
1.6MB
-
memory/1620-2-0x0000000004020000-0x0000000004130000-memory.dmpFilesize
1.1MB
-
memory/2240-10-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/2240-8-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/2240-4-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/2240-11-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/2240-12-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/2240-14-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/2240-13-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/2240-15-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB