Analysis
-
max time kernel
39s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe
Resource
win10-20240611-en
General
-
Target
eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe
-
Size
5.0MB
-
MD5
2f2dfd078b537e652c51f27f3991eceb
-
SHA1
19366ed13df7ffc57dfac258ec2fdf12e0d86e52
-
SHA256
eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d
-
SHA512
f94f60bc97297c5c4e50390cae99f21dba52a3b388a4b74c69ed38032bed9fc6ba58d28940b19f11302c627df9c3515425abfe4679469a9c94ad28ec9dd47286
-
SSDEEP
49152:BiJg66kIT64M7GHu9h6kgDWZdkR+E2sM/Hsk23ghtL7abuY69Xf9UQvxXKtJwBHn:B2g66n64M7zX3aKY69Xf9UQvFm2HiyZ
Malware Config
Extracted
vidar
10.5
b607a7a47e1a6ff266af835d50c6eaa5
https://t.me/s41l0
https://steamcommunity.com/profiles/76561199743486170
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 YaBrowser/24.6.0.0 Safari/537.36
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/2716-83-0x0000000000400000-0x0000000000640000-memory.dmp family_vidar_v7 behavioral1/memory/2716-447-0x0000000000400000-0x0000000000640000-memory.dmp family_vidar_v7 behavioral1/memory/2716-745-0x0000000000400000-0x0000000000640000-memory.dmp family_vidar_v7 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1308 JEBGCBAFCG.exe 972 JEBKJDAFHJ.exe -
Loads dropped DLL 8 IoCs
pid Process 2716 MSBuild.exe 2716 MSBuild.exe 2716 MSBuild.exe 2716 MSBuild.exe 2716 MSBuild.exe 2716 MSBuild.exe 2716 MSBuild.exe 2716 MSBuild.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1512 set thread context of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1308 set thread context of 1616 1308 JEBGCBAFCG.exe 35 PID 972 set thread context of 2132 972 JEBKJDAFHJ.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JEBGCBAFCG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JEBKJDAFHJ.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1048 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2716 MSBuild.exe 2716 MSBuild.exe 2716 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe Token: SeDebugPrivilege 1308 JEBGCBAFCG.exe Token: SeDebugPrivilege 972 JEBKJDAFHJ.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 1512 wrote to memory of 2716 1512 eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe 30 PID 2716 wrote to memory of 1308 2716 MSBuild.exe 34 PID 2716 wrote to memory of 1308 2716 MSBuild.exe 34 PID 2716 wrote to memory of 1308 2716 MSBuild.exe 34 PID 2716 wrote to memory of 1308 2716 MSBuild.exe 34 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 1308 wrote to memory of 1616 1308 JEBGCBAFCG.exe 35 PID 2716 wrote to memory of 972 2716 MSBuild.exe 36 PID 2716 wrote to memory of 972 2716 MSBuild.exe 36 PID 2716 wrote to memory of 972 2716 MSBuild.exe 36 PID 2716 wrote to memory of 972 2716 MSBuild.exe 36 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37 PID 972 wrote to memory of 2132 972 JEBKJDAFHJ.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe"C:\Users\Admin\AppData\Local\Temp\eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\ProgramData\JEBGCBAFCG.exe"C:\ProgramData\JEBGCBAFCG.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1616
-
-
-
C:\ProgramData\JEBKJDAFHJ.exe"C:\ProgramData\JEBKJDAFHJ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2132
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KJDAECAEBKJJ" & exit3⤵PID:1936
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:1048
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD562c1ef2b72999cce45e887fb39c56ec0
SHA1c34034f44d2967b54cd323509fee5091c93cf390
SHA256f4eacd6f6139c73db852c26504775698f58e2739df230d47f8c1e9c24b8dd0a1
SHA512c00b56a7045472c75b42bc5d0ddf2bc093c701cb493a8616d2b37b4dabdedf8cd49309d9d0e4843cc0e3be7f1b4f8e14e94ef1bd6c0af5431ceeb13cc7c0a5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f16561f32356c62b7fc341e79cd716
SHA1beaaeecaa59f7fdd4c7664a8485d824e80370e21
SHA25698b945e5453b63cade5768b2385995498d864801739d6b2cfda2c79569eef871
SHA512480f52dbafa265d78ae6e0f8d2e9641636b5ac1e8d84d59492114e068713c49f8374c2bda4d8bc2f57349067ad150b091392b715d6c16d88e3b88d6327f567a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52550f0badbf3bd867e895e1de851d327
SHA166aba7214d39dd23092586628eb726d3ce46e683
SHA25611751fec923f5d49002967fcd5aff76d5068f774a60ec65c5f1b20ebd1e48fd3
SHA51299700664d48695c5ec19efb13abc27c52c269a69221a2d3e94f3f0dd58160d19ab5e6cddb6ea696af96cbe941e4544df7d48d7d80b2d9fb7f70fe95abbb5ff98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c159e197f4bc9ec09899f1eebb7da41
SHA17738e7db3229aea375a8b7f6c55d0fdb01fc276e
SHA2560d4141f9afdc29ef994de14c1966986b0ea109410255f90a1956e9c6ac091c6a
SHA5125895ab7de0d2aa6c74c1478d8dd48a40cbf2e32cf9545e7945370a7dea97dd08f2c9c1105cc928497891c892db70e7ded83a9e186ee0becd302861752587fb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5dde321071645fe265c6c5ba57048838f
SHA1a79f9d5ebc77881c2736ea1df39c0c63f60a7c25
SHA25651a049d00bd589b3b73fbaf01144a65df932631bf1c1fc170f9255ab55f6a195
SHA5128baef0c07b8b6109af1458dc7f05f5325e821d6180c1e718f172a533cca3ed907e50f3e94e843142ccb8de254ae724c5f4b534174e7e49215a01742a9d6657ce
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\76561199743486170[1].htm
Filesize33KB
MD51cdd1ccbba2fd203346751e52959190b
SHA12c69504858f580f9c18463bd0e0eeb7cbdac3efc
SHA2566003c7dd8865229bc183c1a887bb338c0b604b61447fb990660621b725420263
SHA51273f9468714eb11860c03847e08f4ad187a219828d5d92537d8fd2af43e1dd90235d89aca7312d99a2657fe26f1d69bf2d8fd490823b0586ce79e640da93c204c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
4.7MB
MD58e5286e3caa11c78e275892a38f2e772
SHA1ddada2f646640b394c04e7166db04200d226281b
SHA2569f619f332a9e5bd74a345778e86a871e9efb087bfea43ade7cbf9f63a12151b0
SHA5124f180892333915a52f5e2ee7a69d0ba628ed3d6c6425e2ba4b41f0ed5a06898b25bc0a0432dc6372add0c811b16e74d636a6466ba64fd9ccc34a93e900b5f5ce
-
Filesize
4.9MB
MD5675737d9b22bcfefe651c11bd47d404c
SHA14b49f56572b458873b52eaa990f09556d37a54a1
SHA2568b020cde39d33b53f4c48a8c7ea30fb1f7854b13562508c0a1665ffd1397f7fc
SHA5120f25d1cc861c781a2baba08f0297963672df51a328a37038455aaabd8953f3ad38b04fbea473139fc6cd16004905556368b919325f0b72faeb16d0dcfae8d2a2