Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/07/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe
Resource
win7-20240708-en
General
-
Target
50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe
-
Size
5.0MB
-
MD5
7888f9f71da2bfb52f5480c2721168f8
-
SHA1
955b213b2e4bd923720e1c942edc293111bf7c51
-
SHA256
50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478
-
SHA512
1cc69d026a264f98a7314717da3a8d1ff8a44682cfc31dff70f21c8823c3ac7c10106207294818f1bd3f39894403473062c25acdd11596b0d1c3790a50208bd4
-
SSDEEP
98304:fMHIOnyxaYFQEYkcUSEj/5Yo40e2ewr2DJtyg:EHIOn+aYFQ87GKJyDyg
Malware Config
Extracted
vidar
https://t.me/bu77un
https://steamcommunity.com/profiles/76561199730044335
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Signatures
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral2/memory/4368-68-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/4368-66-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/4368-72-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/4368-85-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/4368-90-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/4368-94-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3080 set thread context of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4860 timeout.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 4368 MSBuild.exe 4368 MSBuild.exe 4368 MSBuild.exe 4368 MSBuild.exe 4368 MSBuild.exe 4368 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3080 wrote to memory of 1148 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 73 PID 3080 wrote to memory of 1148 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 73 PID 3080 wrote to memory of 1148 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 73 PID 3080 wrote to memory of 1356 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 74 PID 3080 wrote to memory of 1356 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 74 PID 3080 wrote to memory of 1356 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 74 PID 3080 wrote to memory of 2956 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 75 PID 3080 wrote to memory of 2956 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 75 PID 3080 wrote to memory of 2956 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 75 PID 3080 wrote to memory of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 PID 3080 wrote to memory of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 PID 3080 wrote to memory of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 PID 3080 wrote to memory of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 PID 3080 wrote to memory of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 PID 3080 wrote to memory of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 PID 3080 wrote to memory of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 PID 3080 wrote to memory of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 PID 3080 wrote to memory of 4368 3080 50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe 76 PID 4368 wrote to memory of 3616 4368 MSBuild.exe 78 PID 4368 wrote to memory of 3616 4368 MSBuild.exe 78 PID 4368 wrote to memory of 3616 4368 MSBuild.exe 78 PID 3616 wrote to memory of 4860 3616 cmd.exe 80 PID 3616 wrote to memory of 4860 3616 cmd.exe 80 PID 3616 wrote to memory of 4860 3616 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe"C:\Users\Admin\AppData\Local\Temp\50c0cbafc373b681cbfbf19308ba55fabf5b02c91884ffddcf27eb3fd67ec478.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:1148
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:1356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & rd /s /q "C:\ProgramData\EBFBFBFIIJDA" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:4860
-
-
-