Analysis

  • max time kernel
    39s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 22:52

General

  • Target

    eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe

  • Size

    5.0MB

  • MD5

    2f2dfd078b537e652c51f27f3991eceb

  • SHA1

    19366ed13df7ffc57dfac258ec2fdf12e0d86e52

  • SHA256

    eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d

  • SHA512

    f94f60bc97297c5c4e50390cae99f21dba52a3b388a4b74c69ed38032bed9fc6ba58d28940b19f11302c627df9c3515425abfe4679469a9c94ad28ec9dd47286

  • SSDEEP

    49152:BiJg66kIT64M7GHu9h6kgDWZdkR+E2sM/Hsk23ghtL7abuY69Xf9UQvxXKtJwBHn:B2g66n64M7zX3aKY69Xf9UQvFm2HiyZ

Malware Config

Extracted

Family

vidar

Version

10.5

Botnet

b607a7a47e1a6ff266af835d50c6eaa5

C2

https://t.me/s41l0

https://steamcommunity.com/profiles/76561199743486170

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 YaBrowser/24.6.0.0 Safari/537.36

Signatures

  • Detect Vidar Stealer 3 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe
    "C:\Users\Admin\AppData\Local\Temp\eb73f5f90f16a21beb5888a3262bfbc20a96b7a70eae30e3a761989236ae6e6d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\ProgramData\JEBGCBAFCG.exe
        "C:\ProgramData\JEBGCBAFCG.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
            PID:1616
        • C:\ProgramData\JEBKJDAFHJ.exe
          "C:\ProgramData\JEBKJDAFHJ.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:972
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
              PID:2132
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KJDAECAEBKJJ" & exit
            3⤵
              PID:1936
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                4⤵
                • Delays execution with timeout.exe
                PID:1048

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

          Filesize

          471B

          MD5

          62c1ef2b72999cce45e887fb39c56ec0

          SHA1

          c34034f44d2967b54cd323509fee5091c93cf390

          SHA256

          f4eacd6f6139c73db852c26504775698f58e2739df230d47f8c1e9c24b8dd0a1

          SHA512

          c00b56a7045472c75b42bc5d0ddf2bc093c701cb493a8616d2b37b4dabdedf8cd49309d9d0e4843cc0e3be7f1b4f8e14e94ef1bd6c0af5431ceeb13cc7c0a5f8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d1f16561f32356c62b7fc341e79cd716

          SHA1

          beaaeecaa59f7fdd4c7664a8485d824e80370e21

          SHA256

          98b945e5453b63cade5768b2385995498d864801739d6b2cfda2c79569eef871

          SHA512

          480f52dbafa265d78ae6e0f8d2e9641636b5ac1e8d84d59492114e068713c49f8374c2bda4d8bc2f57349067ad150b091392b715d6c16d88e3b88d6327f567a3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2550f0badbf3bd867e895e1de851d327

          SHA1

          66aba7214d39dd23092586628eb726d3ce46e683

          SHA256

          11751fec923f5d49002967fcd5aff76d5068f774a60ec65c5f1b20ebd1e48fd3

          SHA512

          99700664d48695c5ec19efb13abc27c52c269a69221a2d3e94f3f0dd58160d19ab5e6cddb6ea696af96cbe941e4544df7d48d7d80b2d9fb7f70fe95abbb5ff98

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3c159e197f4bc9ec09899f1eebb7da41

          SHA1

          7738e7db3229aea375a8b7f6c55d0fdb01fc276e

          SHA256

          0d4141f9afdc29ef994de14c1966986b0ea109410255f90a1956e9c6ac091c6a

          SHA512

          5895ab7de0d2aa6c74c1478d8dd48a40cbf2e32cf9545e7945370a7dea97dd08f2c9c1105cc928497891c892db70e7ded83a9e186ee0becd302861752587fb21

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

          Filesize

          400B

          MD5

          dde321071645fe265c6c5ba57048838f

          SHA1

          a79f9d5ebc77881c2736ea1df39c0c63f60a7c25

          SHA256

          51a049d00bd589b3b73fbaf01144a65df932631bf1c1fc170f9255ab55f6a195

          SHA512

          8baef0c07b8b6109af1458dc7f05f5325e821d6180c1e718f172a533cca3ed907e50f3e94e843142ccb8de254ae724c5f4b534174e7e49215a01742a9d6657ce

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\76561199743486170[1].htm

          Filesize

          33KB

          MD5

          1cdd1ccbba2fd203346751e52959190b

          SHA1

          2c69504858f580f9c18463bd0e0eeb7cbdac3efc

          SHA256

          6003c7dd8865229bc183c1a887bb338c0b604b61447fb990660621b725420263

          SHA512

          73f9468714eb11860c03847e08f4ad187a219828d5d92537d8fd2af43e1dd90235d89aca7312d99a2657fe26f1d69bf2d8fd490823b0586ce79e640da93c204c

        • C:\Users\Admin\AppData\Local\Temp\CabA90D.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarA93F.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \ProgramData\JEBGCBAFCG.exe

          Filesize

          4.7MB

          MD5

          8e5286e3caa11c78e275892a38f2e772

          SHA1

          ddada2f646640b394c04e7166db04200d226281b

          SHA256

          9f619f332a9e5bd74a345778e86a871e9efb087bfea43ade7cbf9f63a12151b0

          SHA512

          4f180892333915a52f5e2ee7a69d0ba628ed3d6c6425e2ba4b41f0ed5a06898b25bc0a0432dc6372add0c811b16e74d636a6466ba64fd9ccc34a93e900b5f5ce

        • \ProgramData\JEBKJDAFHJ.exe

          Filesize

          4.9MB

          MD5

          675737d9b22bcfefe651c11bd47d404c

          SHA1

          4b49f56572b458873b52eaa990f09556d37a54a1

          SHA256

          8b020cde39d33b53f4c48a8c7ea30fb1f7854b13562508c0a1665ffd1397f7fc

          SHA512

          0f25d1cc861c781a2baba08f0297963672df51a328a37038455aaabd8953f3ad38b04fbea473139fc6cd16004905556368b919325f0b72faeb16d0dcfae8d2a2

        • memory/972-577-0x00000000013D0000-0x00000000018B2000-memory.dmp

          Filesize

          4.9MB

        • memory/972-586-0x0000000005270000-0x0000000005454000-memory.dmp

          Filesize

          1.9MB

        • memory/972-587-0x0000000005820000-0x00000000059AA000-memory.dmp

          Filesize

          1.5MB

        • memory/1308-484-0x00000000055E0000-0x000000000574C000-memory.dmp

          Filesize

          1.4MB

        • memory/1308-483-0x0000000004D10000-0x0000000004ED8000-memory.dmp

          Filesize

          1.8MB

        • memory/1308-482-0x0000000000300000-0x00000000007BA000-memory.dmp

          Filesize

          4.7MB

        • memory/1512-49-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-61-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-41-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-37-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-1-0x00000000000D0000-0x00000000005DC000-memory.dmp

          Filesize

          5.0MB

        • memory/1512-70-0x0000000074520000-0x0000000074C0E000-memory.dmp

          Filesize

          6.9MB

        • memory/1512-2-0x0000000005010000-0x0000000005186000-memory.dmp

          Filesize

          1.5MB

        • memory/1512-3-0x0000000074520000-0x0000000074C0E000-memory.dmp

          Filesize

          6.9MB

        • memory/1512-84-0x0000000074520000-0x0000000074C0E000-memory.dmp

          Filesize

          6.9MB

        • memory/1512-35-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-31-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-29-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-27-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-25-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-23-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-21-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-15-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-13-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-11-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-9-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-65-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-43-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-55-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-45-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-33-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-19-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-48-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-0-0x000000007452E000-0x000000007452F000-memory.dmp

          Filesize

          4KB

        • memory/1512-51-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-53-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-4-0x00000000056A0000-0x00000000057FC000-memory.dmp

          Filesize

          1.4MB

        • memory/1512-57-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-59-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-63-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-39-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-17-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-6-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-7-0x0000000000A60000-0x0000000000A75000-memory.dmp

          Filesize

          84KB

        • memory/1512-5-0x0000000000A60000-0x0000000000A7C000-memory.dmp

          Filesize

          112KB

        • memory/2716-745-0x0000000000400000-0x0000000000640000-memory.dmp

          Filesize

          2.2MB

        • memory/2716-447-0x0000000000400000-0x0000000000640000-memory.dmp

          Filesize

          2.2MB

        • memory/2716-83-0x0000000000400000-0x0000000000640000-memory.dmp

          Filesize

          2.2MB

        • memory/2716-68-0x0000000000400000-0x0000000000640000-memory.dmp

          Filesize

          2.2MB

        • memory/2716-66-0x0000000000400000-0x0000000000640000-memory.dmp

          Filesize

          2.2MB