Analysis
-
max time kernel
41s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
011abc7752ab3180e8016d7f395a1a10.dll
Resource
win7-20240221-en
General
-
Target
011abc7752ab3180e8016d7f395a1a10.dll
-
Size
2.3MB
-
MD5
011abc7752ab3180e8016d7f395a1a10
-
SHA1
c76164145c4a0debefa4a44cf9107e85d0428f32
-
SHA256
c58842bb0fdcff37f9ad04db475e9769a3a5449125d5044d518baea2640d2716
-
SHA512
037b0544cca532dbb0574d2ad189fc33ad794e67c2b71273f7a9c3973c5ac80aaaf2fbc4bf2cd30594b5d00f4062c2f99457c6ea4204a5dad54ec5dfda648ed3
-
SSDEEP
49152:x0ecwe0AWB48iGNnEtyX849TdByyfRhL3Au0EcoHUsdWwNs:oweu48iGStyXlRRhLwHsUsdWEs
Malware Config
Extracted
vidar
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
Signatures
-
Detect Vidar Stealer 10 IoCs
resource yara_rule behavioral2/memory/1100-2-0x0000000010000000-0x0000000010260000-memory.dmp family_vidar_v7 behavioral2/memory/1100-7-0x0000000010000000-0x0000000010260000-memory.dmp family_vidar_v7 behavioral2/memory/1100-5-0x0000000010000000-0x0000000010260000-memory.dmp family_vidar_v7 behavioral2/memory/2680-9-0x0000000000FE0000-0x0000000001228000-memory.dmp family_vidar_v7 behavioral2/memory/2680-8-0x0000000000FE0000-0x0000000001228000-memory.dmp family_vidar_v7 behavioral2/memory/2680-10-0x0000000000FE0000-0x0000000001228000-memory.dmp family_vidar_v7 behavioral2/memory/2680-11-0x0000000000FE0000-0x0000000001228000-memory.dmp family_vidar_v7 behavioral2/memory/2680-13-0x0000000000FE0000-0x0000000001228000-memory.dmp family_vidar_v7 behavioral2/memory/2680-12-0x0000000000FE0000-0x0000000001228000-memory.dmp family_vidar_v7 behavioral2/memory/2680-15-0x0000000000FE0000-0x0000000001228000-memory.dmp family_vidar_v7 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*madrePuta = "rundll32.exe C:\\Users\\Admin\\Documents\\FirefoxData.dll,EntryPoint" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1100 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4392 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2680 rundll32.exe 2680 rundll32.exe 2680 rundll32.exe 2680 rundll32.exe 2680 rundll32.exe 2680 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4640 wrote to memory of 1100 4640 rundll32.exe 80 PID 4640 wrote to memory of 1100 4640 rundll32.exe 80 PID 4640 wrote to memory of 1100 4640 rundll32.exe 80 PID 1100 wrote to memory of 2680 1100 rundll32.exe 81 PID 1100 wrote to memory of 2680 1100 rundll32.exe 81 PID 1100 wrote to memory of 2680 1100 rundll32.exe 81 PID 1100 wrote to memory of 2680 1100 rundll32.exe 81 PID 1100 wrote to memory of 2680 1100 rundll32.exe 81 PID 1100 wrote to memory of 2680 1100 rundll32.exe 81 PID 1100 wrote to memory of 2232 1100 rundll32.exe 82 PID 1100 wrote to memory of 2232 1100 rundll32.exe 82 PID 1100 wrote to memory of 2232 1100 rundll32.exe 82 PID 2232 wrote to memory of 4840 2232 cmd.exe 84 PID 2232 wrote to memory of 4840 2232 cmd.exe 84 PID 2232 wrote to memory of 4840 2232 cmd.exe 84 PID 2680 wrote to memory of 4532 2680 rundll32.exe 87 PID 2680 wrote to memory of 4532 2680 rundll32.exe 87 PID 2680 wrote to memory of 4532 2680 rundll32.exe 87 PID 4532 wrote to memory of 4392 4532 cmd.exe 89 PID 4532 wrote to memory of 4392 4532 cmd.exe 89 PID 4532 wrote to memory of 4392 4532 cmd.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\011abc7752ab3180e8016d7f395a1a10.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\011abc7752ab3180e8016d7f395a1a10.dll,#12⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\SysWOW64\rundll32.exe" & rd /s /q "C:\ProgramData\AAKEGIJEHJDG" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:4392
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*madrePuta" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*madrePuta" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f4⤵
- Adds Run key to start application
PID:4840
-
-
-