Malware Analysis Report

2024-09-11 16:55

Sample ID 240614-j3vw5avhqk
Target a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118
SHA256 a59d62e59533961aa25c3c8b035ef568efe89f000e4e6c303e571deea3084371
Tags
vidar 231 discovery spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a59d62e59533961aa25c3c8b035ef568efe89f000e4e6c303e571deea3084371

Threat Level: Known bad

The file a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

vidar 231 discovery spyware stealer

Vidar

Vidar Stealer

Loads dropped DLL

Reads user/profile data of web browsers

Checks computer location settings

Executes dropped EXE

Reads local data of messenger clients

Reads user/profile data of local email clients

Looks up external IP address via web service

Accesses 2FA software files, possible credential harvesting

Checks installed software on the system

Drops file in Program Files directory

Unsigned PE

Program crash

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Checks processor information in registry

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 08:12

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 08:12

Reported

2024-06-14 08:14

Platform

win10v2004-20240611-en

Max time kernel

149s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe"

Signatures

Vidar

stealer vidar

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Reads local data of messenger clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses 2FA software files, possible credential harvesting

spyware stealer

Checks installed software on the system

discovery

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe N/A
File created C:\Program Files (x86)\LetsSee!\Uninstall.ini C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\busshost.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\busshost.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe"

C:\Program Files (x86)\LetsSee!\busshost.exe

"C:\Program Files (x86)\LetsSee!\busshost.exe"

C:\Program Files (x86)\LetsSee!\YTLoader.exe

"C:\Program Files (x86)\LetsSee!\YTLoader.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1300 -ip 1300

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 1616

Network

Country Destination Domain Proto
US 8.8.8.8:53 istats.club udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 bestbtcchange.com udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 241.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 bestbtcchange.com udp
US 8.8.8.8:53 13.173.189.20.in-addr.arpa udp

Files

C:\Program Files (x86)\LetsSee!\busshost.exe

MD5 65787b7381c5404fc99b996e56d1be99
SHA1 03e6d7842e14e62cf8c47d365ebf5cb29dd2d1f3
SHA256 5a308922638cffd906bf3f43452cdb10578f516589ead120d0f8152480f41755
SHA512 5d971e574a2de2953fd7e85ed643c3693937973bf3bb0628817aece5d3a14ca543fce287a479d56562dc3bd1c29b10fdc7a29c0cd6d4ed1d19670b161efb113b

C:\Program Files (x86)\LetsSee!\YTLoader.exe

MD5 adc9db2753fa3daa6a8156254ba2a5f1
SHA1 50ff27e2e1c4acc35768b93b73c03f7630027f04
SHA256 f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde
SHA512 5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

memory/1640-39-0x0000000000400000-0x0000000000435000-memory.dmp

memory/1300-41-0x0000000074D9E000-0x0000000074D9F000-memory.dmp

memory/1300-42-0x0000000000F00000-0x0000000001208000-memory.dmp

memory/1300-43-0x00000000035E0000-0x00000000035EA000-memory.dmp

memory/1300-44-0x0000000074D90000-0x0000000075540000-memory.dmp

memory/1300-45-0x0000000005DE0000-0x000000000623A000-memory.dmp

memory/1300-46-0x0000000005C20000-0x0000000005C30000-memory.dmp

memory/1300-47-0x0000000005C30000-0x0000000005C3A000-memory.dmp

memory/1300-50-0x0000000005C80000-0x0000000005C88000-memory.dmp

memory/1300-48-0x0000000005C40000-0x0000000005C4A000-memory.dmp

memory/1300-49-0x0000000005C70000-0x0000000005C7A000-memory.dmp

memory/1300-54-0x0000000005CC0000-0x0000000005CC8000-memory.dmp

memory/1300-55-0x00000000064F0000-0x00000000064F8000-memory.dmp

memory/1300-53-0x0000000005CB0000-0x0000000005CB8000-memory.dmp

memory/1300-56-0x0000000006500000-0x0000000006508000-memory.dmp

memory/1300-51-0x0000000005C60000-0x0000000005C6E000-memory.dmp

memory/1300-57-0x0000000006510000-0x0000000006518000-memory.dmp

memory/1300-52-0x0000000005CA0000-0x0000000005CA8000-memory.dmp

memory/1300-58-0x0000000074D90000-0x0000000075540000-memory.dmp

memory/4828-60-0x00000000026F0000-0x00000000027F0000-memory.dmp

memory/4828-61-0x0000000000400000-0x000000000048F000-memory.dmp

memory/4828-74-0x0000000000400000-0x00000000008B6000-memory.dmp

memory/4828-76-0x00000000026F0000-0x00000000027F0000-memory.dmp

memory/4828-78-0x0000000000400000-0x000000000048F000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 08:12

Reported

2024-06-14 08:14

Platform

win7-20240221-en

Max time kernel

141s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe"

Signatures

Vidar

stealer vidar

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Reads local data of messenger clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses 2FA software files, possible credential harvesting

spyware stealer

Checks installed software on the system

discovery

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\LetsSee!\Uninstall.ini C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\busshost.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\busshost.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1692 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 1692 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 1692 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 1692 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 1692 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 1692 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 1692 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 1692 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2532 wrote to memory of 1736 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2532 wrote to memory of 1736 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2532 wrote to memory of 1736 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2532 wrote to memory of 1736 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8ad0e6c4cadc3ca2b95ccd00f4c7144_JaffaCakes118.exe"

C:\Program Files (x86)\LetsSee!\busshost.exe

"C:\Program Files (x86)\LetsSee!\busshost.exe"

C:\Program Files (x86)\LetsSee!\YTLoader.exe

"C:\Program Files (x86)\LetsSee!\YTLoader.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 1180

Network

Country Destination Domain Proto
US 8.8.8.8:53 bestbtcchange.com udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 istats.club udp

Files

\Program Files (x86)\LetsSee!\busshost.exe

MD5 65787b7381c5404fc99b996e56d1be99
SHA1 03e6d7842e14e62cf8c47d365ebf5cb29dd2d1f3
SHA256 5a308922638cffd906bf3f43452cdb10578f516589ead120d0f8152480f41755
SHA512 5d971e574a2de2953fd7e85ed643c3693937973bf3bb0628817aece5d3a14ca543fce287a479d56562dc3bd1c29b10fdc7a29c0cd6d4ed1d19670b161efb113b

C:\Program Files (x86)\LetsSee!\YTLoader.exe

MD5 adc9db2753fa3daa6a8156254ba2a5f1
SHA1 50ff27e2e1c4acc35768b93b73c03f7630027f04
SHA256 f8cc40321301d39f03eaa48d42cbbb2e953b694dc13ccf9d986032c621223fde
SHA512 5f7fca8da622035f3a83e562d727ccdd842d623ec376f93c75c3218bddd970c34a9efc66a33cfd6e52a398fa2ed090b890d05aecef53f65a22917d50d31a1195

memory/1692-33-0x0000000000400000-0x0000000000435000-memory.dmp

memory/2532-35-0x00000000741BE000-0x00000000741BF000-memory.dmp

memory/2532-36-0x0000000000270000-0x0000000000578000-memory.dmp

memory/2532-37-0x00000000006B0000-0x00000000006BA000-memory.dmp

memory/2532-38-0x00000000741B0000-0x000000007489E000-memory.dmp

memory/2532-39-0x00000000051E0000-0x000000000563A000-memory.dmp

memory/2532-40-0x0000000000810000-0x0000000000820000-memory.dmp

memory/2532-42-0x0000000000830000-0x000000000083A000-memory.dmp

memory/2532-41-0x0000000000820000-0x000000000082A000-memory.dmp

memory/2532-43-0x0000000000B70000-0x0000000000B7A000-memory.dmp

memory/2532-44-0x0000000000B80000-0x0000000000B88000-memory.dmp

memory/2532-45-0x0000000000B90000-0x0000000000B9E000-memory.dmp

memory/2532-46-0x0000000000BA0000-0x0000000000BA8000-memory.dmp

memory/2532-47-0x00000000021C0000-0x00000000021C8000-memory.dmp

memory/2532-48-0x00000000021D0000-0x00000000021D8000-memory.dmp

memory/2532-49-0x00000000021E0000-0x00000000021E8000-memory.dmp

memory/2532-50-0x0000000002240000-0x0000000002248000-memory.dmp

memory/2532-51-0x0000000002250000-0x0000000002258000-memory.dmp

memory/2604-53-0x0000000000220000-0x0000000000320000-memory.dmp

memory/2604-54-0x0000000000400000-0x000000000048F000-memory.dmp

memory/2604-68-0x0000000000400000-0x00000000008B6000-memory.dmp

memory/2532-69-0x00000000741BE000-0x00000000741BF000-memory.dmp

memory/2532-71-0x00000000741B0000-0x000000007489E000-memory.dmp

memory/2604-72-0x0000000000220000-0x0000000000320000-memory.dmp

memory/2604-73-0x0000000000400000-0x000000000048F000-memory.dmp