Analysis

  • max time kernel
    25s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 04:31

General

  • Target

    fl_patch_installer_20_7_2_1863.exe

  • Size

    110.3MB

  • MD5

    48906a21b1072092f48549c944333a93

  • SHA1

    b26e17bb3306ebe5f959d416480286f729aac923

  • SHA256

    5f89eb141d955c2e678cbb3b36b110f93f807ff7ef2b125fb99092fd6f0f668c

  • SHA512

    9c0895909d6712301b89f2be0ec31744d3693bfd07a26e99468b7ffdf5d7cb0bce224084752080248eb900387bcb8bfc9e288680a55be1181d2c85e35bc2e369

  • SSDEEP

    3145728:n/Kby+Xl9wy53Ly5QgBhs1uGrvqDJw3QaSv/:/eX1uyKLB/8cBH

Score
10/10

Malware Config

Extracted

Family

vidar

Version

40.4

Botnet

948

C2

https://romkaxarit.tumblr.com/

Attributes
  • profile_id

    948

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fl_patch_installer_20_7_2_1863.exe
    "C:\Users\Admin\AppData\Local\Temp\fl_patch_installer_20_7_2_1863.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:360
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\start.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Users\Admin\AppData\Local\Temp\fl_patch.exe
        fl_patch.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Users\Admin\AppData\Local\Temp\is-IQ4VG.tmp\fl_patch.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-IQ4VG.tmp\fl_patch.tmp" /SL5="$401AA,116119095,125440,C:\Users\Admin\AppData\Local\Temp\fl_patch.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          PID:2796
      • C:\Users\Admin\AppData\Local\Temp\uninstaller.exe
        uninstaller.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 952
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1104

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Image-Line\FL Studio 20\Plugins\Fruity\Generators\Wasp XT\is-O6A5O.tmp
    Filesize

    3.4MB

    MD5

    7b5f389263a80605a4770c80d8ae5af3

    SHA1

    7a226991aec4e0ff2761c92340d934ae7e91856d

    SHA256

    d7aa3d5081c199e35a9eb320e2b132bba9e4a7e48b535660833b85ffc662fef3

    SHA512

    6370800120f52f1106a672c868b4a97175a5435a54c737b7b81a410cceb3c698277aec9eb8e051dd25c71762e0fce513c6499d5d683a06a71fb621c5161b0c33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4F7E.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\start.bat
    Filesize

    52B

    MD5

    31d9a703e474b8308b47fcc645b6639f

    SHA1

    e4b0b1df8b05dd2ab9c319c7cd901ffc5ce5ccea

    SHA256

    95bbf6860fb9ccca9d9b41df75294f86f9bd6fbfee3ebe42306875145d62b357

    SHA512

    cee2921e71e364d5f9eee10c643f250e6c872996b7781f58058d6b19e0c9c67425a7f73df82efbfd56c57ee3760e1dd1264eea03038ce7213c5a4bb92caa756b

  • C:\Users\Admin\AppData\Local\Temp\uninstaller.exe
    Filesize

    838KB

    MD5

    96732cbc61bf97fbebebead194f07184

    SHA1

    12c1a5e772df670a110bd1ec0eed21b319f19286

    SHA256

    54b401a0fc715c1548cf451d93f3da3413af7609af37eee20c6f007f8b52a1f3

    SHA512

    55026ef2afdd8875f9fbc86bbfec95fc9e48bd4fc68d9c7966b72a1cbf48c447c88814344e607ab4f25d65458a5a96c77108b11be6465e2c822e9f8712989f63

  • \Users\Admin\AppData\Local\Temp\is-IQ4VG.tmp\fl_patch.tmp
    Filesize

    1.1MB

    MD5

    006c402fd22016b5a5a1c2180ca5ccc9

    SHA1

    dc8dae24ef11181d145c8d9f6f245f3b67a3e1d0

    SHA256

    5b246db2dfc1a5d000b0662e2a58e1cb9f89fdc87945597ec1e1f2f245fd7898

    SHA512

    caea20f48421f7918c9ead0316decba60460c74ff878666e0a48ae1e5b2eb41a37b03c1a59bc3aa416990e49cae155e19894461c28c225f4f9b42e184db289b1

  • memory/2628-26-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2628-104-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2628-195-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2796-105-0x0000000000400000-0x000000000052E000-memory.dmp
    Filesize

    1.2MB

  • memory/2796-193-0x0000000000400000-0x000000000052E000-memory.dmp
    Filesize

    1.2MB