Analysis

  • max time kernel
    51s
  • max time network
    126s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/07/2024, 15:25

General

  • Target

    subsoft.exe

  • Size

    3.5MB

  • MD5

    6c4dafe1c0412f1c31b2a61dafa684c7

  • SHA1

    25c40a9f065b29fd96e15c62911c1a5678b61d91

  • SHA256

    8971036c709723136b99c2f912576f301c3a8ed94f28d6a65dc801ab7f652431

  • SHA512

    e57cfb908f576552b2ea475d9edaf97bdebc71fbab24168e1223142f928d801fe8f43bf06eb9b11e50e17c52f1903d1166a58ab21729fb3619c5cf549eb66bec

  • SSDEEP

    49152:MIpBmO0JacIrcS8dXMxuyCXk3fsk4GgMa6xI4iA+YtHhxCgynwLyv/CLHGe:MIpBmO0XHoBC0314Gg4xI4iAV7ZyiLm

Malware Config

Extracted

Family

vidar

Version

10.5

Botnet

b607a7a47e1a6ff266af835d50c6eaa5

C2

https://t.me/s41l0

https://steamcommunity.com/profiles/76561199743486170

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 YaBrowser/24.6.0.0 Safari/537.36

Signatures

  • Detect Vidar Stealer 6 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\subsoft.exe
    "C:\Users\Admin\AppData\Local\Temp\subsoft.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Users\Admin\AppData\Local\Temp\subsoft.exe
      "C:\Users\Admin\AppData\Local\Temp\subsoft.exe"
      2⤵
        PID:5108
      • C:\Users\Admin\AppData\Local\Temp\subsoft.exe
        "C:\Users\Admin\AppData\Local\Temp\subsoft.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3616
        • C:\ProgramData\AAAEBAFBGI.exe
          "C:\ProgramData\AAAEBAFBGI.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3124
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
              PID:1096
          • C:\ProgramData\HCFCFHJDBK.exe
            "C:\ProgramData\HCFCFHJDBK.exe"
            3⤵
              PID:4784
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                4⤵
                  PID:1216
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AAAAECGHCBGC" & exit
                3⤵
                  PID:3576
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    4⤵
                    • Delays execution with timeout.exe
                    PID:2320

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\AAAEBAFBGI.exe

              Filesize

              4.7MB

              MD5

              8e5286e3caa11c78e275892a38f2e772

              SHA1

              ddada2f646640b394c04e7166db04200d226281b

              SHA256

              9f619f332a9e5bd74a345778e86a871e9efb087bfea43ade7cbf9f63a12151b0

              SHA512

              4f180892333915a52f5e2ee7a69d0ba628ed3d6c6425e2ba4b41f0ed5a06898b25bc0a0432dc6372add0c811b16e74d636a6466ba64fd9ccc34a93e900b5f5ce

            • C:\ProgramData\EGHJKJKKJDHI\BGIIEG

              Filesize

              160KB

              MD5

              f310cf1ff562ae14449e0167a3e1fe46

              SHA1

              85c58afa9049467031c6c2b17f5c12ca73bb2788

              SHA256

              e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

              SHA512

              1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

            • C:\ProgramData\HCFCFHJDBK.exe

              Filesize

              4.9MB

              MD5

              675737d9b22bcfefe651c11bd47d404c

              SHA1

              4b49f56572b458873b52eaa990f09556d37a54a1

              SHA256

              8b020cde39d33b53f4c48a8c7ea30fb1f7854b13562508c0a1665ffd1397f7fc

              SHA512

              0f25d1cc861c781a2baba08f0297963672df51a328a37038455aaabd8953f3ad38b04fbea473139fc6cd16004905556368b919325f0b72faeb16d0dcfae8d2a2

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              2KB

              MD5

              3b2c41628404202dad05c04172cfa7f5

              SHA1

              669c76882e69a45c9b6c0bf4b7c28bbb5255c726

              SHA256

              703f84c673d194b9c03e948922d7a97ff36d0fbff508de7af5c451472974bffa

              SHA512

              cfd65c920f1a8e1bf9417e0aadf2f9288a2af0f58c747d9f3b78801b8ba76cba2ad29635d17e19ff5241167b0c39726dd18415c7182ca118247eb09638c88c07

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              2KB

              MD5

              01a51bb23a5d773c000d51e26726beee

              SHA1

              5fa6c1b0e2ec665302d80e12521db5ace0aa0996

              SHA256

              b0f508d2773de1f61142a302d2ea6997d061f3b1bc93eba33c551cd1c2b97f27

              SHA512

              04c771d32f7cb041672fedcae47d155a82832dd35bf47720f773672a91a720e8feb337b4e1fa5ca6e935a6bac502d34c4b908a47a721c802e07c58a440f2bcb3

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              1KB

              MD5

              f08adb3651c268374ec476ad46154430

              SHA1

              a0ae17069f3522be430a0cb3429873e6d2c91867

              SHA256

              2993dc3ada12255a09a4c4422bc499a1e23bf7b1b0e0ec0e226448649083d48a

              SHA512

              817c6c654f5265285d688e31fb7e7e81953dd87b9e9aa3e509e3053c22d7622d34c5dc18998d8944a796a591c863878e4f36d91ff51cd254bed12e40a8a99292

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              458B

              MD5

              ccbbc1f2ccdb541e4f3cc59d64ef72c8

              SHA1

              fc76f21238b350ebe015f4d5a252eab42157149f

              SHA256

              f279f53efc5034cc366cfeb976c2b7070dcbcd0be4cab0eef771404c5fb5921d

              SHA512

              cb144a0f7d1b954b54e1638be992e521aa15705e767c3f0e2664fe936883b2b3a6c7dbd001eb9993c5c5ee251a73effa5487661dacffc3361cadff1a8ef840f7

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              450B

              MD5

              4effccb4e822d519f2d1e758fcf7106c

              SHA1

              2ae5a2f4e59f708796b54fc53e3f141c940877dd

              SHA256

              b6993e1fb5bf253fe092b90d297f41214cf10d064a9d9693c2f33cdb1fdb4adc

              SHA512

              0612c13cd83067b3da07227a870862e8eef25e66fb948ccfaef661572cf822a90297310749e9dbc8e2a7bb11722c9e26b32c87d3564c53296379ca041c144160

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              458B

              MD5

              61ea45f567e9dde5b879a29250cf267c

              SHA1

              7533770c338cf2472625bc7864a6427f0dc78c54

              SHA256

              5d6cb2a58fa790401c0c53547289efca926a9ceefa42427494c9e6cb2d79453c

              SHA512

              e545f5988e4afd299f3d93c1ccc6492dcd654f3855e0eb8b375d9aa9f73f098120f19f1490a03efaf3a878cf3321ac6612dcee03fbda56c2a6b1198da7fa318a

            • memory/3124-150-0x0000000005810000-0x000000000597C000-memory.dmp

              Filesize

              1.4MB

            • memory/3124-149-0x0000000005640000-0x0000000005808000-memory.dmp

              Filesize

              1.8MB

            • memory/3124-148-0x00000000006A0000-0x0000000000B5A000-memory.dmp

              Filesize

              4.7MB

            • memory/3124-147-0x0000000072F2E000-0x0000000072F2F000-memory.dmp

              Filesize

              4KB

            • memory/3332-31-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-15-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-61-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-59-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-57-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-55-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-53-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-51-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-49-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-47-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-45-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-43-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-41-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-40-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-37-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-35-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-33-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-0-0x0000000074B6E000-0x0000000074B6F000-memory.dmp

              Filesize

              4KB

            • memory/3332-29-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-27-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-25-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-23-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-21-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-19-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-17-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-1-0x0000000000830000-0x0000000000BAE000-memory.dmp

              Filesize

              3.5MB

            • memory/3332-13-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-11-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-9-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-65-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-63-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-2-0x0000000005710000-0x00000000057AC000-memory.dmp

              Filesize

              624KB

            • memory/3332-3-0x0000000074B60000-0x0000000075311000-memory.dmp

              Filesize

              7.7MB

            • memory/3332-74-0x0000000074B60000-0x0000000075311000-memory.dmp

              Filesize

              7.7MB

            • memory/3332-68-0x0000000074B60000-0x0000000075311000-memory.dmp

              Filesize

              7.7MB

            • memory/3332-4-0x00000000058B0000-0x0000000005A52000-memory.dmp

              Filesize

              1.6MB

            • memory/3332-5-0x0000000005A50000-0x0000000005BDC000-memory.dmp

              Filesize

              1.5MB

            • memory/3332-67-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-8-0x0000000005640000-0x0000000005655000-memory.dmp

              Filesize

              84KB

            • memory/3332-6-0x0000000006190000-0x0000000006736000-memory.dmp

              Filesize

              5.6MB

            • memory/3332-7-0x0000000005640000-0x000000000565C000-memory.dmp

              Filesize

              112KB

            • memory/3616-295-0x0000000000400000-0x0000000000640000-memory.dmp

              Filesize

              2.2MB

            • memory/3616-71-0x0000000000400000-0x0000000000640000-memory.dmp

              Filesize

              2.2MB

            • memory/3616-69-0x0000000000400000-0x0000000000640000-memory.dmp

              Filesize

              2.2MB

            • memory/3616-134-0x0000000000400000-0x0000000000640000-memory.dmp

              Filesize

              2.2MB

            • memory/3616-88-0x0000000000400000-0x0000000000640000-memory.dmp

              Filesize

              2.2MB

            • memory/3616-73-0x0000000000400000-0x0000000000640000-memory.dmp

              Filesize

              2.2MB

            • memory/4784-229-0x0000000005200000-0x000000000538A000-memory.dmp

              Filesize

              1.5MB

            • memory/4784-228-0x0000000005020000-0x0000000005204000-memory.dmp

              Filesize

              1.9MB

            • memory/4784-227-0x0000000000070000-0x0000000000552000-memory.dmp

              Filesize

              4.9MB