Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    39s
  • max time network
    48s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 19:31 UTC

General

  • Target

    4faca83e2b6f22674e8695bca3562096d0a0d561e27dedcb503b9ce604e3bd56.exe

  • Size

    2.2MB

  • MD5

    01917d3e87f511f27fc4fe2a39e4f8c2

  • SHA1

    3712b70dfff1639b57d5aa349a548f06ccf59cbf

  • SHA256

    4faca83e2b6f22674e8695bca3562096d0a0d561e27dedcb503b9ce604e3bd56

  • SHA512

    bcb8cff4d96dd52f25fc000de8be99c5dbd41cc715662227ada96cc40ed9a1463e806537987a9fd5b22157623108da2ea506c25a53a661724201e05c2705322c

  • SSDEEP

    49152:lAgY7fvVtbBaxmcqMTBeerKQl+bH4JbjzzEBETT29YMST:llY7nTMBTBeerKQl+bYxzIBA6uMST

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Signatures

  • Detect Vidar Stealer 9 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4faca83e2b6f22674e8695bca3562096d0a0d561e27dedcb503b9ce604e3bd56.exe
    "C:\Users\Admin\AppData\Local\Temp\4faca83e2b6f22674e8695bca3562096d0a0d561e27dedcb503b9ce604e3bd56.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\kat51F8.tmp
      C:\Users\Admin\AppData\Local\Temp\kat51F8.tmp
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5056
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\kat51F8.tmp" & rd /s /q "C:\ProgramData\HIJEGDBGDBFI" & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1904
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 10
          4⤵
          • Delays execution with timeout.exe
          PID:2316

Network

  • flag-us
    DNS
    t.me
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    t.me
    IN A
  • flag-us
    DNS
    t.me
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    t.me
    IN A
  • flag-us
    DNS
    t.me
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    t.me
    IN A
  • flag-us
    DNS
    t.me
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    t.me
    IN A
  • flag-us
    DNS
    t.me
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    t.me
    IN A
  • flag-us
    DNS
    steamcommunity.com
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    steamcommunity.com
    IN A
  • flag-us
    DNS
    steamcommunity.com
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    steamcommunity.com
    IN A
  • flag-us
    DNS
    steamcommunity.com
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    steamcommunity.com
    IN A
  • flag-us
    DNS
    steamcommunity.com
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    steamcommunity.com
    IN A
  • flag-us
    DNS
    steamcommunity.com
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    steamcommunity.com
    IN A
  • flag-us
    DNS
    tea.arpdabl.org
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    tea.arpdabl.org
    IN A
  • flag-us
    DNS
    tea.arpdabl.org
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    tea.arpdabl.org
    IN A
  • flag-us
    DNS
    tea.arpdabl.org
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    tea.arpdabl.org
    IN A
  • flag-us
    DNS
    tea.arpdabl.org
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    tea.arpdabl.org
    IN A
  • flag-us
    DNS
    tea.arpdabl.org
    kat51F8.tmp
    Remote address:
    8.8.8.8:53
    Request
    tea.arpdabl.org
    IN A
No results found
  • 8.8.8.8:53
    t.me
    dns
    kat51F8.tmp
    250 B
    5

    DNS Request

    t.me

    DNS Request

    t.me

    DNS Request

    t.me

    DNS Request

    t.me

    DNS Request

    t.me

  • 8.8.8.8:53
    steamcommunity.com
    dns
    kat51F8.tmp
    320 B
    5

    DNS Request

    steamcommunity.com

    DNS Request

    steamcommunity.com

    DNS Request

    steamcommunity.com

    DNS Request

    steamcommunity.com

    DNS Request

    steamcommunity.com

  • 8.8.8.8:53
    tea.arpdabl.org
    dns
    kat51F8.tmp
    305 B
    5

    DNS Request

    tea.arpdabl.org

    DNS Request

    tea.arpdabl.org

    DNS Request

    tea.arpdabl.org

    DNS Request

    tea.arpdabl.org

    DNS Request

    tea.arpdabl.org

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kat51F8.tmp

    Filesize

    861KB

    MD5

    66064dbdb70a5eb15ebf3bf65aba254b

    SHA1

    0284fd320f99f62aca800fb1251eff4c31ec4ed7

    SHA256

    6a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795

    SHA512

    b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f

  • memory/1792-0-0x0000000000910000-0x0000000000911000-memory.dmp

    Filesize

    4KB

  • memory/1792-1-0x0000000004060000-0x0000000004170000-memory.dmp

    Filesize

    1.1MB

  • memory/1792-9-0x0000000000400000-0x0000000000641000-memory.dmp

    Filesize

    2.3MB

  • memory/5056-8-0x0000000000400000-0x0000000000648000-memory.dmp

    Filesize

    2.3MB

  • memory/5056-10-0x0000000000400000-0x0000000000648000-memory.dmp

    Filesize

    2.3MB

  • memory/5056-4-0x0000000000400000-0x0000000000648000-memory.dmp

    Filesize

    2.3MB

  • memory/5056-11-0x0000000000400000-0x0000000000648000-memory.dmp

    Filesize

    2.3MB

  • memory/5056-12-0x0000000000400000-0x0000000000648000-memory.dmp

    Filesize

    2.3MB

  • memory/5056-13-0x0000000000400000-0x0000000000648000-memory.dmp

    Filesize

    2.3MB

  • memory/5056-14-0x0000000000400000-0x0000000000648000-memory.dmp

    Filesize

    2.3MB

  • memory/5056-15-0x0000000000400000-0x0000000000648000-memory.dmp

    Filesize

    2.3MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.