Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe
Resource
win7-20240508-en
General
-
Target
cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe
-
Size
8.2MB
-
MD5
5d297e4bcb36a4a1481c32fa7c0088a6
-
SHA1
bf0947415396624d6dbd08469c490b30637ab7d7
-
SHA256
cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e
-
SHA512
2e124967d0833ac856758417ba61d2b316b6021fc50b36ad9cb5e7b9d33812bfcd9bb654ce2933132d691ca57fa276ea5556a7826317b2d3168372c401da3ca4
-
SSDEEP
196608:kB+S/N8G+oHIpNKvhLozkAx6Dh1GxzCnCj8X9ehQTLrOfweA:kcgxDHIp8ozkAxzzIC7WTO6
Malware Config
Extracted
stealc
Signatures
-
Detect Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x0000000000B4A000-memory.dmp family_vidar_v7 -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x0000000000B4A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x0000000000B4A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Detects executables containing potential Windows Defender anti-emulation checks 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x0000000000B4A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exedescription pid process target process PID 3164 set thread context of 3700 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe iexplore.exe -
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
iexplore.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString iexplore.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1904 timeout.exe -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 2888 regedit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
iexplore.exepid process 3700 iexplore.exe 3700 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exedescription pid process target process PID 3164 wrote to memory of 4676 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe calc.exe PID 3164 wrote to memory of 4676 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe calc.exe PID 3164 wrote to memory of 4676 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe calc.exe PID 3164 wrote to memory of 4676 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe calc.exe PID 3164 wrote to memory of 4676 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe calc.exe PID 3164 wrote to memory of 4676 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe calc.exe PID 3164 wrote to memory of 4676 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe calc.exe PID 3164 wrote to memory of 4200 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe ilasm.exe PID 3164 wrote to memory of 4200 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe ilasm.exe PID 3164 wrote to memory of 4200 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe ilasm.exe PID 3164 wrote to memory of 4200 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe ilasm.exe PID 3164 wrote to memory of 1692 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe aspnet_wp.exe PID 3164 wrote to memory of 1692 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe aspnet_wp.exe PID 3164 wrote to memory of 1692 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe aspnet_wp.exe PID 3164 wrote to memory of 1692 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe aspnet_wp.exe PID 3164 wrote to memory of 3212 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe svchost.exe PID 3164 wrote to memory of 3212 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe svchost.exe PID 3164 wrote to memory of 3212 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe svchost.exe PID 3164 wrote to memory of 3212 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe svchost.exe PID 3164 wrote to memory of 3212 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe svchost.exe PID 3164 wrote to memory of 3212 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe svchost.exe PID 3164 wrote to memory of 3212 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe svchost.exe PID 3164 wrote to memory of 3260 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe cmd.exe PID 3164 wrote to memory of 3260 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe cmd.exe PID 3164 wrote to memory of 3260 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe cmd.exe PID 3164 wrote to memory of 3260 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe cmd.exe PID 3164 wrote to memory of 3260 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe cmd.exe PID 3164 wrote to memory of 3260 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe cmd.exe PID 3164 wrote to memory of 3260 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe cmd.exe PID 3164 wrote to memory of 3564 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe notepad.exe PID 3164 wrote to memory of 3564 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe notepad.exe PID 3164 wrote to memory of 3564 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe notepad.exe PID 3164 wrote to memory of 3564 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe notepad.exe PID 3164 wrote to memory of 3564 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe notepad.exe PID 3164 wrote to memory of 3564 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe notepad.exe PID 3164 wrote to memory of 3564 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe notepad.exe PID 3164 wrote to memory of 332 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe csc.exe PID 3164 wrote to memory of 332 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe csc.exe PID 3164 wrote to memory of 332 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe csc.exe PID 3164 wrote to memory of 332 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe csc.exe PID 3164 wrote to memory of 2888 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe regedit.exe PID 3164 wrote to memory of 2888 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe regedit.exe PID 3164 wrote to memory of 2888 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe regedit.exe PID 3164 wrote to memory of 2888 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe regedit.exe PID 3164 wrote to memory of 2888 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe regedit.exe PID 3164 wrote to memory of 2888 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe regedit.exe PID 3164 wrote to memory of 2888 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe regedit.exe PID 3164 wrote to memory of 3820 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe ngen.exe PID 3164 wrote to memory of 3820 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe ngen.exe PID 3164 wrote to memory of 3820 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe ngen.exe PID 3164 wrote to memory of 3820 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe ngen.exe PID 3164 wrote to memory of 4500 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe wab.exe PID 3164 wrote to memory of 4500 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe wab.exe PID 3164 wrote to memory of 4500 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe wab.exe PID 3164 wrote to memory of 4500 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe wab.exe PID 3164 wrote to memory of 1032 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe vbc.exe PID 3164 wrote to memory of 1032 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe vbc.exe PID 3164 wrote to memory of 1032 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe vbc.exe PID 3164 wrote to memory of 1032 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe vbc.exe PID 3164 wrote to memory of 3700 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe iexplore.exe PID 3164 wrote to memory of 3700 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe iexplore.exe PID 3164 wrote to memory of 3700 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe iexplore.exe PID 3164 wrote to memory of 3700 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe iexplore.exe PID 3164 wrote to memory of 3700 3164 cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe"C:\Users\Admin\AppData\Local\Temp\cd0f5fc05c89bdb7bb3f1bffb179eb8f2d0fc8758811587466a927cfb45bc30e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\calc.exe"C:\Windows\System32\calc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵
-
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"2⤵
- Runs regedit.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"2⤵
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Program Files (x86)\Internet Explorer\iexplore.exe" & rd /s /q "C:\ProgramData\DGHDHIDGHIDG" & exit3⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3700-0-0x0000000000400000-0x0000000000B4A000-memory.dmpFilesize
7.3MB