Malware Analysis Report

2024-09-11 16:45

Sample ID 240614-svrdeaweqg
Target SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe
SHA256 e9edfb560307e1bd40f575a8dc1d9835e13059388cfb72ffbbe8aefc99d7fbf5
Tags
stealc vidar spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e9edfb560307e1bd40f575a8dc1d9835e13059388cfb72ffbbe8aefc99d7fbf5

Threat Level: Known bad

The file SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe was found to be: Known bad.

Malicious Activity Summary

stealc vidar spyware stealer

Detect Vidar Stealer

Vidar

Stealc

Downloads MZ/PE file

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of SetThreadContext

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Checks processor information in registry

Suspicious use of WriteProcessMemory

Delays execution with timeout.exe

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 15:27

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 15:27

Reported

2024-06-14 15:29

Platform

win10v2004-20240226-en

Max time kernel

141s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe"

Signatures

Detect Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Stealc

stealer stealc

Vidar

stealer vidar

Downloads MZ/PE file

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 652 set thread context of 4108 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 652 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 652 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 652 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 652 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 652 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 4108 wrote to memory of 4836 N/A C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\SysWOW64\cmd.exe
PID 4108 wrote to memory of 4836 N/A C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\SysWOW64\cmd.exe
PID 4108 wrote to memory of 4836 N/A C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\SysWOW64\cmd.exe
PID 4836 wrote to memory of 3920 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4836 wrote to memory of 3920 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 4836 wrote to memory of 3920 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe

Processes

C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe

"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe"

C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe

C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3156 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3788 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\GIIIIJDHJEGI" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 10

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 t.me udp
NL 149.154.167.99:443 t.me tcp
US 8.8.8.8:53 99.167.154.149.in-addr.arpa udp
US 8.8.8.8:53 23.249.124.192.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
DE 195.201.251.58:9000 195.201.251.58 tcp
US 8.8.8.8:53 58.251.201.195.in-addr.arpa udp
DE 195.201.251.58:9000 195.201.251.58 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
DE 195.201.251.58:9000 195.201.251.58 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 tcp
DE 195.201.251.58:9000 tcp
DE 195.201.251.58:9000 tcp
DE 195.201.251.58:9000 tcp
DE 195.201.251.58:9000 tcp
DE 195.201.251.58:9000 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
DE 195.201.251.58:9000 195.201.251.58 tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 142.250.200.10:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 4.173.189.20.in-addr.arpa udp

Files

memory/652-2-0x00007FF6B3450000-0x00007FF6B42DC000-memory.dmp

memory/4108-5-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/652-6-0x00007FF6B3450000-0x00007FF6B42DC000-memory.dmp

memory/4108-8-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/4108-9-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/4108-21-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/4108-22-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/4108-24-0x000000001D1A0000-0x000000001D3FF000-memory.dmp

memory/4108-39-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/4108-40-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/4108-56-0x0000000000800000-0x0000000000A48000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

memory/4108-63-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/4108-77-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/4108-78-0x0000000000800000-0x0000000000A48000-memory.dmp

memory/4108-79-0x0000000000800000-0x0000000000A48000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

MD5 20d4b8fa017a12a108c87f540836e250
SHA1 1ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA256 6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512 507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

memory/4108-85-0x0000000000800000-0x0000000000A48000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 15:27

Reported

2024-06-14 15:29

Platform

win7-20240221-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe"

Signatures

Detect Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Stealc

stealer stealc

Vidar

stealer vidar

Downloads MZ/PE file

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2168 set thread context of 2684 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe N/A
N/A N/A C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2168 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 2168 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 2168 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 2168 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 2168 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 2168 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
PID 2684 wrote to memory of 2880 N/A C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\SysWOW64\cmd.exe
PID 2684 wrote to memory of 2880 N/A C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\SysWOW64\cmd.exe
PID 2684 wrote to memory of 2880 N/A C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\SysWOW64\cmd.exe
PID 2684 wrote to memory of 2880 N/A C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\SysWOW64\cmd.exe
PID 2880 wrote to memory of 1116 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2880 wrote to memory of 1116 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2880 wrote to memory of 1116 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2880 wrote to memory of 1116 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe

Processes

C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe

"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.Malware-gen.16465.8601.exe"

C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe

C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KKEBKJJDGHCB" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 10

Network

Country Destination Domain Proto
US 8.8.8.8:53 t.me udp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
NL 149.154.167.99:443 t.me tcp
US 8.8.8.8:53 steamcommunity.com udp
BE 104.68.92.92:443 steamcommunity.com tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 tcp
FI 65.109.240.138:443 tcp
FI 65.109.240.138:443 tcp
FI 65.109.240.138:443 tcp
FI 65.109.240.138:443 tcp
FI 65.109.240.138:443 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp
FI 65.109.240.138:443 65.109.240.138 tcp

Files

memory/2168-2-0x000000013FD50000-0x0000000140BDC000-memory.dmp

memory/2684-9-0x00000000002F0000-0x0000000000538000-memory.dmp

memory/2684-8-0x00000000002F0000-0x0000000000538000-memory.dmp

memory/2684-11-0x00000000002F0000-0x0000000000538000-memory.dmp

memory/2168-10-0x000000013FD50000-0x0000000140BDC000-memory.dmp

memory/2684-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2684-5-0x00000000002F0000-0x0000000000538000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar8398.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

memory/2684-164-0x00000000002F0000-0x0000000000538000-memory.dmp

memory/2684-185-0x00000000002F0000-0x0000000000538000-memory.dmp

memory/2684-207-0x0000000016D30000-0x0000000016F8F000-memory.dmp

memory/2684-218-0x00000000002F0000-0x0000000000538000-memory.dmp

memory/2684-239-0x00000000002F0000-0x0000000000538000-memory.dmp

memory/2684-434-0x00000000002F0000-0x0000000000538000-memory.dmp

memory/2684-455-0x00000000002F0000-0x0000000000538000-memory.dmp

memory/2684-496-0x00000000002F0000-0x0000000000538000-memory.dmp