Analysis

  • max time kernel
    197s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-06-2024 05:11

General

  • Target

    e185b5ac05bf0947b5fd19b8f0892afa4fcbbceba5fc76ad52ae3fdef2045829.exe

  • Size

    4.2MB

  • MD5

    8cfe70cf4f35c7f9b4ddba327d44c1f8

  • SHA1

    4fd044d2fee22138668153a7472b34e0b9a99c06

  • SHA256

    e185b5ac05bf0947b5fd19b8f0892afa4fcbbceba5fc76ad52ae3fdef2045829

  • SHA512

    aec1486ae4e64e8ca59baaf7a623fc4c6b56a3b3bcb6e46cadf82350799edfc62ede7bdb54fcbce490c5506e39f1dc778be160c130edcb6784667a448dafc811

  • SSDEEP

    49152:Yg0GkQNDv4gz+LzRdo/msRu92zAPZHPPumf7BQOyCEJ7eAPDbn5m0IcQgZV0Cego:yLNdo/TRuMyfPyCk7eIZIcQ0Ogo

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://t.me/memve4erin

https://steamcommunity.com/profiles/76561199699680841

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Signatures

  • Detect Vidar Stealer 5 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e185b5ac05bf0947b5fd19b8f0892afa4fcbbceba5fc76ad52ae3fdef2045829.exe
    "C:\Users\Admin\AppData\Local\Temp\e185b5ac05bf0947b5fd19b8f0892afa4fcbbceba5fc76ad52ae3fdef2045829.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:1060
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
          PID:512
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          2⤵
            PID:4364
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            2⤵
              PID:1736
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              2⤵
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:3080

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3080-67-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3080-118-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3080-87-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3080-72-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3080-70-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3272-37-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-33-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-13-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-65-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-63-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-62-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-60-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-57-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-55-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-53-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-51-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-49-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-47-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-45-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-43-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-41-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-40-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-0-0x000000007329E000-0x000000007329F000-memory.dmp

            Filesize

            4KB

          • memory/3272-35-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-9-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-31-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-29-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-27-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-25-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-23-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-21-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-19-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-17-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-15-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-11-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-7-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-6-0x0000000005B10000-0x0000000005B25000-memory.dmp

            Filesize

            84KB

          • memory/3272-66-0x0000000073290000-0x000000007397E000-memory.dmp

            Filesize

            6.9MB

          • memory/3272-5-0x0000000005B10000-0x0000000005B2C000-memory.dmp

            Filesize

            112KB

          • memory/3272-4-0x0000000073290000-0x000000007397E000-memory.dmp

            Filesize

            6.9MB

          • memory/3272-3-0x0000000005C30000-0x0000000005CDA000-memory.dmp

            Filesize

            680KB

          • memory/3272-71-0x0000000073290000-0x000000007397E000-memory.dmp

            Filesize

            6.9MB

          • memory/3272-2-0x0000000005B90000-0x0000000005C2C000-memory.dmp

            Filesize

            624KB

          • memory/3272-1-0x0000000000E80000-0x00000000012C0000-memory.dmp

            Filesize

            4.2MB