Overview
overview
10Static
static
1SETAP_9090...10.dll
windows7-x64
1SETAP_9090...10.dll
windows10-2004-x64
1SETAP_9090...nw.exe
windows7-x64
1SETAP_9090...nw.exe
windows10-2004-x64
10SETAP_9090...40.dll
windows7-x64
1SETAP_9090...40.dll
windows10-2004-x64
1SETAP_9090...pp.dll
windows7-x64
3SETAP_9090...pp.dll
windows10-2004-x64
3SETAP_9090...1].exe
windows7-x64
1SETAP_9090...1].exe
windows10-2004-x64
1SETAP_9090...1].exe
windows7-x64
1SETAP_9090...1].exe
windows10-2004-x64
3SETAP_9090...1].exe
windows7-x64
1SETAP_9090...1].exe
windows10-2004-x64
1SETAP_9090...-1.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1SETAP_9090...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
79s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
SETAP_9090__Pa$$W0rdS~!!/python310.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
SETAP_9090__Pa$$W0rdS~!!/python310.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
SETAP_9090__Pa$$W0rdS~!!/pythonw.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
SETAP_9090__Pa$$W0rdS~!!/pythonw.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
SETAP_9090__Pa$$W0rdS~!!/vcruntime140.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
SETAP_9090__Pa$$W0rdS~!!/vcruntime140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
SETAP_9090__Pa$$W0rdS~!!/vcruntime140_app.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
SETAP_9090__Pa$$W0rdS~!!/vcruntime140_app.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/HDHelper_[0MB]_[1].exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/HDHelper_[0MB]_[1].exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/NvStereoUtilityOGL_[1MB]_[1].exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/NvStereoUtilityOGL_[1MB]_[1].exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/VSLauncher_[0MB]_[1].exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/VSLauncher_[0MB]_[1].exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-core-processthreads-l1-1-1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-core-profile-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-core-rtlsupport-l1-1-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-core-string-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-core-synch-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral20
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-core-synch-l1-2-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-core-sysinfo-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-core-timezone-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-core-util-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral24
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-crt-conio-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral28
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-crt-locale-l1-1-0.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-crt-math-l1-1-0.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-crt-multibyte-l1-1-0.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral32
Sample
SETAP_9090__Pa$$W0rdS~!!/x86/api-ms-win-crt-private-l1-1-0.dll
Resource
win10v2004-20240611-en
General
-
Target
SETAP_9090__Pa$$W0rdS~!!/pythonw.exe
-
Size
94KB
-
MD5
9a4cc0d8e7007f7ef20ca585324e0739
-
SHA1
f3e5a2e477cac4bab85940a2158eed78f2d74441
-
SHA256
040d121a3179f49cd3f33f4bc998bc8f78b7f560bfd93f279224d69e76a06e92
-
SHA512
54636a48141804112f5b4f2fc70cb7c959a041e5743aeedb5184091b51daa1d1a03f0016e8299c0d56d924c6c8ae585e4fc864021081ffdf1e6f3eab11dd43b3
-
SSDEEP
1536:9M/AhIxHHWMpdPa5wiE21M8kJIGFvb1Cwn/ZDs5yf:9M4SwMpdCq/IM8uIGfV/ZDso
Malware Config
Extracted
stealc
Signatures
-
Detect Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral4/memory/2628-29-0x0000000000E30000-0x000000000157C000-memory.dmp family_vidar_v7 behavioral4/memory/2628-44-0x0000000000E30000-0x000000000157C000-memory.dmp family_vidar_v7 -
Detects Windows executables referencing non-Windows User-Agents 2 IoCs
Processes:
resource yara_rule behavioral4/memory/2628-29-0x0000000000E30000-0x000000000157C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral4/memory/2628-44-0x0000000000E30000-0x000000000157C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 2 IoCs
Processes:
resource yara_rule behavioral4/memory/2628-29-0x0000000000E30000-0x000000000157C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral4/memory/2628-44-0x0000000000E30000-0x000000000157C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Detects executables containing potential Windows Defender anti-emulation checks 2 IoCs
Processes:
resource yara_rule behavioral4/memory/2628-29-0x0000000000E30000-0x000000000157C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation behavioral4/memory/2628-44-0x0000000000E30000-0x000000000157C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
coml.au3description ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation coml.au3 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
pythonw.exedescription pid process target process PID 4804 set thread context of 1824 4804 pythonw.exe netsh.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 1 IoCs
Processes:
pythonw.exepid process 4804 pythonw.exe -
Loads dropped DLL 3 IoCs
Processes:
pythonw.execoml.au3pid process 4804 pythonw.exe 4804 pythonw.exe 2628 coml.au3 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
coml.au3description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString coml.au3 -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4404 timeout.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
pythonw.exepythonw.exenetsh.execoml.au3pid process 2668 pythonw.exe 4804 pythonw.exe 4804 pythonw.exe 1824 netsh.exe 1824 netsh.exe 2628 coml.au3 2628 coml.au3 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
pythonw.exenetsh.exepid process 4804 pythonw.exe 1824 netsh.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
pythonw.exepythonw.exenetsh.execoml.au3cmd.exedescription pid process target process PID 2668 wrote to memory of 4804 2668 pythonw.exe pythonw.exe PID 2668 wrote to memory of 4804 2668 pythonw.exe pythonw.exe PID 4804 wrote to memory of 1824 4804 pythonw.exe netsh.exe PID 4804 wrote to memory of 1824 4804 pythonw.exe netsh.exe PID 4804 wrote to memory of 1824 4804 pythonw.exe netsh.exe PID 4804 wrote to memory of 1824 4804 pythonw.exe netsh.exe PID 1824 wrote to memory of 2628 1824 netsh.exe coml.au3 PID 1824 wrote to memory of 2628 1824 netsh.exe coml.au3 PID 1824 wrote to memory of 2628 1824 netsh.exe coml.au3 PID 1824 wrote to memory of 2628 1824 netsh.exe coml.au3 PID 1824 wrote to memory of 2628 1824 netsh.exe coml.au3 PID 2628 wrote to memory of 5108 2628 coml.au3 cmd.exe PID 2628 wrote to memory of 5108 2628 coml.au3 cmd.exe PID 2628 wrote to memory of 5108 2628 coml.au3 cmd.exe PID 5108 wrote to memory of 4404 5108 cmd.exe timeout.exe PID 5108 wrote to memory of 4404 5108 cmd.exe timeout.exe PID 5108 wrote to memory of 4404 5108 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SETAP_9090__Pa$$W0rdS~!!\pythonw.exe"C:\Users\Admin\AppData\Local\Temp\SETAP_9090__Pa$$W0rdS~!!\pythonw.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Httva\pythonw.exeC:\Users\Admin\AppData\Roaming\Httva\pythonw.exe2⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\coml.au3C:\Users\Admin\AppData\Local\Temp\coml.au34⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\coml.au3" & rd /s /q "C:\ProgramData\BAECFHJEBAAF" & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9ed5ce50Filesize
6.8MB
MD5d81f39cdad84738e004757bc319c03b8
SHA123f374ee188879ef7f0e05177e38fcd9d04d4b82
SHA25651b26d1f5b676ad1cb3b5a13a958ea0635c35ea44883ab3992d29c1af31b36b9
SHA512c7a7fb4db6d0222f240812df2bb94aa15e2063fbb4da83d2aa09675b48f8aab9391efc814b85f881b9494dc1691bb0369c4f0d375594729db879ccbc9082d91d
-
C:\Users\Admin\AppData\Local\Temp\coml.au3Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Roaming\Httva\VCRUNTIME140.dllFilesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
C:\Users\Admin\AppData\Roaming\Httva\ear.emlFilesize
68KB
MD558b327325f4203803325c7901fb16ccd
SHA16fa0f727ebdaf965744ecf0c67cc6b3fcc745620
SHA25683477ae6d1da7c9f4a88f067b9f15691c66c51c4c82078ab468cc0c04d0d426c
SHA512a1c85c473490f4eb5008a45a8af9909cb1caf0dd84602ed7ea08c593091a979d0814cd3c7a2cf6681790162e13315f482a05f53477428b1c946e2d96740eb307
-
C:\Users\Admin\AppData\Roaming\Httva\python310.dllFilesize
4.3MB
MD5e31064ef0869d01beb4841879a87a391
SHA17c26d7c27215afa8304df18a7a6bc4a03eaf70c5
SHA2562c9b70db08be7e17ee33130cc8ace2d02d381f7fd9a5cc3b52be9a2e4727c006
SHA51250036e765f8c95f8511f6961888e42378225c98cf0f57423c3c91a6b154d2220be251e38f1ab04f59cace563c6a8701b08097762f71f875b371655dbdb560622
-
C:\Users\Admin\AppData\Roaming\Httva\pythonw.exeFilesize
94KB
MD59a4cc0d8e7007f7ef20ca585324e0739
SHA1f3e5a2e477cac4bab85940a2158eed78f2d74441
SHA256040d121a3179f49cd3f33f4bc998bc8f78b7f560bfd93f279224d69e76a06e92
SHA51254636a48141804112f5b4f2fc70cb7c959a041e5743aeedb5184091b51daa1d1a03f0016e8299c0d56d924c6c8ae585e4fc864021081ffdf1e6f3eab11dd43b3
-
C:\Users\Admin\AppData\Roaming\Httva\towel.vhdFilesize
6.2MB
MD55b9a5e459770a6dd896c725ba08a1e95
SHA1546e8af7d2c72661ff63e9f57ab3ff009b863041
SHA256fff2204de2ce109fe1d8e014e9508368c38d40d9f863678bcf3129978f9db424
SHA512cc4673cb0b411a26a89a9c22241b5fca0107a11ecf1c8dfad1ec65060e64894fc7b2668cfd8ba1f18236b67fb21985fb8cbf5c3c7213d5040ecbad59d9ef6c22
-
memory/1824-22-0x000000007450E000-0x0000000074510000-memory.dmpFilesize
8KB
-
memory/1824-27-0x0000000074501000-0x000000007450F000-memory.dmpFilesize
56KB
-
memory/1824-23-0x0000000074501000-0x000000007450F000-memory.dmpFilesize
56KB
-
memory/1824-20-0x00007FFFBC790000-0x00007FFFBC985000-memory.dmpFilesize
2.0MB
-
memory/2628-44-0x0000000000E30000-0x000000000157C000-memory.dmpFilesize
7.3MB
-
memory/2628-29-0x0000000000E30000-0x000000000157C000-memory.dmpFilesize
7.3MB
-
memory/2628-31-0x00007FFFBC790000-0x00007FFFBC985000-memory.dmpFilesize
2.0MB
-
memory/2628-32-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/2668-0-0x00007FFF9E640000-0x00007FFF9E7B2000-memory.dmpFilesize
1.4MB
-
memory/4804-16-0x00007FFF9EA60000-0x00007FFF9EBD2000-memory.dmpFilesize
1.4MB
-
memory/4804-15-0x00007FFF9EA78000-0x00007FFF9EA79000-memory.dmpFilesize
4KB
-
memory/4804-14-0x00007FFF9EA60000-0x00007FFF9EBD2000-memory.dmpFilesize
1.4MB
-
memory/4804-17-0x00007FFF9EA60000-0x00007FFF9EBD2000-memory.dmpFilesize
1.4MB