Analysis

  • max time kernel
    90s
  • max time network
    123s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-06-2024 16:36

General

  • Target

    2da1abbc4cc0cb6c5819206da60dbb09d72b02034ef375cd40ce289bdf2dc417.exe

  • Size

    425KB

  • MD5

    c64af626c4ed0784e010f5f2210e97f4

  • SHA1

    03ff97d0f1530600ef134d64ddeabbe5770432a6

  • SHA256

    2da1abbc4cc0cb6c5819206da60dbb09d72b02034ef375cd40ce289bdf2dc417

  • SHA512

    b8905e33b1a01fc94ed440c7c435e58b2fb43639aa377118e1ab894de2bf20d52803fd80e73c863c4bb8b8fda6cf246e7d942cc8f985e3d81a9c7702af268f0a

  • SSDEEP

    12288:tAZeNp7Ik3kXzCNAt8T7yejH2KlN2fq3S9:tAop5KCNEoWS3

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

10.1

Botnet

cac73a25dd295fef8853d330a75f6da4

C2

https://t.me/memve4erin

https://steamcommunity.com/profiles/76561199699680841

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Signatures

  • Detect Vidar Stealer 11 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2da1abbc4cc0cb6c5819206da60dbb09d72b02034ef375cd40ce289bdf2dc417.exe
    "C:\Users\Admin\AppData\Local\Temp\2da1abbc4cc0cb6c5819206da60dbb09d72b02034ef375cd40ce289bdf2dc417.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\ProgramData\DGDBAKKJKK.exe
        "C:\ProgramData\DGDBAKKJKK.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4916
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 316
          4⤵
          • Program crash
          PID:1456
      • C:\ProgramData\IDAEBGCAAE.exe
        "C:\ProgramData\IDAEBGCAAE.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3124
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:3132
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 252
            4⤵
            • Program crash
            PID:4412
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HCFBFBAEBKJK" & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            4⤵
            • Delays execution with timeout.exe
            PID:2128
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 316
        2⤵
        • Program crash
        PID:2080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1960 -ip 1960
      1⤵
        PID:2572
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5108 -ip 5108
        1⤵
          PID:2288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3124 -ip 3124
          1⤵
            PID:4744

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\DGDBAKKJKK.exe

            Filesize

            632KB

            MD5

            b60d8d01724703616e7cbbd320a9bd75

            SHA1

            16f170f595d6db225f1376315406bf10146d1743

            SHA256

            cc6d774ca5b7d8d89289ccace5a25c5c3db0b30c330c10f0233c1d0cb8c9e24c

            SHA512

            7560876438eb1401b542ff491e3d800b3ba06163ef62362f4e8a1e0bab26d809a24d045d396f2269648114c67ceb9dfec96f33f8b1491257b4240179345d0d00

          • C:\ProgramData\IDAEBGCAAE.exe

            Filesize

            1.8MB

            MD5

            c6c9f27d335d4e47b5ea12653e806be6

            SHA1

            e53242d463e2c94383ec646e7e04504b96b4d176

            SHA256

            514efbae5faa43878c743c3db36f81c25ab5d6da93b879b6e88e7a63b1b19769

            SHA512

            7e00bdac39c89821b776dda372693d29e0e7188f8ef747037b971461af79545908f8fc8c9bbf7a30f1b0cc4ceea45632e91c1093e784002994808c19bd2a7347

          • memory/1960-0-0x0000000000C00000-0x0000000000C01000-memory.dmp

            Filesize

            4KB

          • memory/3060-38-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-55-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-20-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-22-0x000000001B760000-0x000000001B9BF000-memory.dmp

            Filesize

            2.4MB

          • memory/3060-37-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-3-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-54-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-19-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-5-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-96-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-95-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3060-1-0x0000000000400000-0x0000000000648000-memory.dmp

            Filesize

            2.3MB

          • memory/3132-92-0x0000000000400000-0x0000000000596000-memory.dmp

            Filesize

            1.6MB

          • memory/3132-91-0x0000000000400000-0x0000000000596000-memory.dmp

            Filesize

            1.6MB

          • memory/3132-94-0x0000000000400000-0x0000000000596000-memory.dmp

            Filesize

            1.6MB

          • memory/4916-81-0x00000000050F0000-0x00000000050FA000-memory.dmp

            Filesize

            40KB

          • memory/4916-103-0x0000000008DF0000-0x0000000008E66000-memory.dmp

            Filesize

            472KB

          • memory/4916-79-0x0000000004F40000-0x0000000004FD2000-memory.dmp

            Filesize

            584KB

          • memory/4916-78-0x0000000005440000-0x00000000059E6000-memory.dmp

            Filesize

            5.6MB

          • memory/4916-77-0x000000007175E000-0x000000007175F000-memory.dmp

            Filesize

            4KB

          • memory/4916-108-0x0000000071750000-0x0000000071F01000-memory.dmp

            Filesize

            7.7MB

          • memory/4916-75-0x0000000000400000-0x000000000046C000-memory.dmp

            Filesize

            432KB

          • memory/4916-97-0x0000000008230000-0x0000000008848000-memory.dmp

            Filesize

            6.1MB

          • memory/4916-98-0x0000000007D60000-0x0000000007E6A000-memory.dmp

            Filesize

            1.0MB

          • memory/4916-99-0x0000000007C90000-0x0000000007CA2000-memory.dmp

            Filesize

            72KB

          • memory/4916-100-0x0000000007CF0000-0x0000000007D2C000-memory.dmp

            Filesize

            240KB

          • memory/4916-101-0x0000000007E70000-0x0000000007EBC000-memory.dmp

            Filesize

            304KB

          • memory/4916-102-0x0000000008AC0000-0x0000000008B26000-memory.dmp

            Filesize

            408KB

          • memory/4916-80-0x0000000071750000-0x0000000071F01000-memory.dmp

            Filesize

            7.7MB

          • memory/4916-104-0x0000000008DA0000-0x0000000008DBE000-memory.dmp

            Filesize

            120KB

          • memory/4916-105-0x000000000A250000-0x000000000A412000-memory.dmp

            Filesize

            1.8MB

          • memory/4916-106-0x000000000A950000-0x000000000AE7C000-memory.dmp

            Filesize

            5.2MB

          • memory/5108-76-0x0000000003360000-0x0000000003361000-memory.dmp

            Filesize

            4KB