Analysis
-
max time kernel
51s -
max time network
126s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/07/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
subsoft.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
subsoft.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
subsoft.exe
Resource
win11-20240709-en
General
-
Target
subsoft.exe
-
Size
3.5MB
-
MD5
6c4dafe1c0412f1c31b2a61dafa684c7
-
SHA1
25c40a9f065b29fd96e15c62911c1a5678b61d91
-
SHA256
8971036c709723136b99c2f912576f301c3a8ed94f28d6a65dc801ab7f652431
-
SHA512
e57cfb908f576552b2ea475d9edaf97bdebc71fbab24168e1223142f928d801fe8f43bf06eb9b11e50e17c52f1903d1166a58ab21729fb3619c5cf549eb66bec
-
SSDEEP
49152:MIpBmO0JacIrcS8dXMxuyCXk3fsk4GgMa6xI4iA+YtHhxCgynwLyv/CLHGe:MIpBmO0XHoBC0314Gg4xI4iAV7ZyiLm
Malware Config
Extracted
vidar
10.5
b607a7a47e1a6ff266af835d50c6eaa5
https://t.me/s41l0
https://steamcommunity.com/profiles/76561199743486170
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 YaBrowser/24.6.0.0 Safari/537.36
Signatures
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral3/memory/3616-71-0x0000000000400000-0x0000000000640000-memory.dmp family_vidar_v7 behavioral3/memory/3616-69-0x0000000000400000-0x0000000000640000-memory.dmp family_vidar_v7 behavioral3/memory/3616-73-0x0000000000400000-0x0000000000640000-memory.dmp family_vidar_v7 behavioral3/memory/3616-88-0x0000000000400000-0x0000000000640000-memory.dmp family_vidar_v7 behavioral3/memory/3616-134-0x0000000000400000-0x0000000000640000-memory.dmp family_vidar_v7 behavioral3/memory/3616-295-0x0000000000400000-0x0000000000640000-memory.dmp family_vidar_v7 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3124 AAAEBAFBGI.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3332 set thread context of 3616 3332 subsoft.exe 83 PID 3124 set thread context of 1096 3124 AAAEBAFBGI.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language subsoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language subsoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAAEBAFBGI.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 subsoft.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString subsoft.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2320 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3332 subsoft.exe 3332 subsoft.exe 3616 subsoft.exe 3616 subsoft.exe 3616 subsoft.exe 3616 subsoft.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3332 subsoft.exe Token: SeDebugPrivilege 3124 AAAEBAFBGI.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3332 wrote to memory of 5108 3332 subsoft.exe 82 PID 3332 wrote to memory of 5108 3332 subsoft.exe 82 PID 3332 wrote to memory of 5108 3332 subsoft.exe 82 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3332 wrote to memory of 3616 3332 subsoft.exe 83 PID 3616 wrote to memory of 3124 3616 subsoft.exe 85 PID 3616 wrote to memory of 3124 3616 subsoft.exe 85 PID 3616 wrote to memory of 3124 3616 subsoft.exe 85 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88 PID 3124 wrote to memory of 1096 3124 AAAEBAFBGI.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\subsoft.exe"C:\Users\Admin\AppData\Local\Temp\subsoft.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\subsoft.exe"C:\Users\Admin\AppData\Local\Temp\subsoft.exe"2⤵PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\subsoft.exe"C:\Users\Admin\AppData\Local\Temp\subsoft.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\ProgramData\AAAEBAFBGI.exe"C:\ProgramData\AAAEBAFBGI.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1096
-
-
-
C:\ProgramData\HCFCFHJDBK.exe"C:\ProgramData\HCFCFHJDBK.exe"3⤵PID:4784
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1216
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AAAAECGHCBGC" & exit3⤵PID:3576
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:2320
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD58e5286e3caa11c78e275892a38f2e772
SHA1ddada2f646640b394c04e7166db04200d226281b
SHA2569f619f332a9e5bd74a345778e86a871e9efb087bfea43ade7cbf9f63a12151b0
SHA5124f180892333915a52f5e2ee7a69d0ba628ed3d6c6425e2ba4b41f0ed5a06898b25bc0a0432dc6372add0c811b16e74d636a6466ba64fd9ccc34a93e900b5f5ce
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
4.9MB
MD5675737d9b22bcfefe651c11bd47d404c
SHA14b49f56572b458873b52eaa990f09556d37a54a1
SHA2568b020cde39d33b53f4c48a8c7ea30fb1f7854b13562508c0a1665ffd1397f7fc
SHA5120f25d1cc861c781a2baba08f0297963672df51a328a37038455aaabd8953f3ad38b04fbea473139fc6cd16004905556368b919325f0b72faeb16d0dcfae8d2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE
Filesize2KB
MD53b2c41628404202dad05c04172cfa7f5
SHA1669c76882e69a45c9b6c0bf4b7c28bbb5255c726
SHA256703f84c673d194b9c03e948922d7a97ff36d0fbff508de7af5c451472974bffa
SHA512cfd65c920f1a8e1bf9417e0aadf2f9288a2af0f58c747d9f3b78801b8ba76cba2ad29635d17e19ff5241167b0c39726dd18415c7182ca118247eb09638c88c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize2KB
MD501a51bb23a5d773c000d51e26726beee
SHA15fa6c1b0e2ec665302d80e12521db5ace0aa0996
SHA256b0f508d2773de1f61142a302d2ea6997d061f3b1bc93eba33c551cd1c2b97f27
SHA51204c771d32f7cb041672fedcae47d155a82832dd35bf47720f773672a91a720e8feb337b4e1fa5ca6e935a6bac502d34c4b908a47a721c802e07c58a440f2bcb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize1KB
MD5f08adb3651c268374ec476ad46154430
SHA1a0ae17069f3522be430a0cb3429873e6d2c91867
SHA2562993dc3ada12255a09a4c4422bc499a1e23bf7b1b0e0ec0e226448649083d48a
SHA512817c6c654f5265285d688e31fb7e7e81953dd87b9e9aa3e509e3053c22d7622d34c5dc18998d8944a796a591c863878e4f36d91ff51cd254bed12e40a8a99292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE
Filesize458B
MD5ccbbc1f2ccdb541e4f3cc59d64ef72c8
SHA1fc76f21238b350ebe015f4d5a252eab42157149f
SHA256f279f53efc5034cc366cfeb976c2b7070dcbcd0be4cab0eef771404c5fb5921d
SHA512cb144a0f7d1b954b54e1638be992e521aa15705e767c3f0e2664fe936883b2b3a6c7dbd001eb9993c5c5ee251a73effa5487661dacffc3361cadff1a8ef840f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD54effccb4e822d519f2d1e758fcf7106c
SHA12ae5a2f4e59f708796b54fc53e3f141c940877dd
SHA256b6993e1fb5bf253fe092b90d297f41214cf10d064a9d9693c2f33cdb1fdb4adc
SHA5120612c13cd83067b3da07227a870862e8eef25e66fb948ccfaef661572cf822a90297310749e9dbc8e2a7bb11722c9e26b32c87d3564c53296379ca041c144160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize458B
MD561ea45f567e9dde5b879a29250cf267c
SHA17533770c338cf2472625bc7864a6427f0dc78c54
SHA2565d6cb2a58fa790401c0c53547289efca926a9ceefa42427494c9e6cb2d79453c
SHA512e545f5988e4afd299f3d93c1ccc6492dcd654f3855e0eb8b375d9aa9f73f098120f19f1490a03efaf3a878cf3321ac6612dcee03fbda56c2a6b1198da7fa318a