Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 15:28

General

  • Target

    SecuriteInfo.com.W32.ABRisk.JZOD-0687.30425.1987.exe

  • Size

    964KB

  • MD5

    310e5c68c94e313befd538b9e999360a

  • SHA1

    7578eb69585740bb27adaa947dd661b2a0c8c2a6

  • SHA256

    2d0c0b18bc6dd823e612901f146dcb895aebae5ec0c648a97ffb36d035e05cfa

  • SHA512

    b206a01ed5cff100afc3a16a824ca79a050c6f495983f6795b88a9a78e939352e7249e45b6b429401c00c6360cf591c3037914373a8a1c7a1c485f25666bdd47

  • SSDEEP

    12288:czZ0rwIrpsK7p3ADr20z9Fc2DNaC5o1e5lW+9jMDLniSjJojUiCm0c5ersBM3K:czZ0fKg3ADrO2paC5fg+Wn5oju8ZM3

Malware Config

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199751190313

https://t.me/pech0nk

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Signatures

  • Detect Vidar Stealer 7 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.ABRisk.JZOD-0687.30425.1987.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.ABRisk.JZOD-0687.30425.1987.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k move Wishlist Wishlist.cmd & Wishlist.cmd & exit
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2436
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa.exe opssvc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2316
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1716
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2768
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 103622
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2148
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "LarryAuthenticationOasisToe" Booty
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2440
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Adapter + ..\Anything + ..\Tied + ..\Evaluated + ..\Supports + ..\Rpm j
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2172
      • C:\Users\Admin\AppData\Local\Temp\103622\Meetings.pif
        Meetings.pif j
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2340
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\103622\j

    Filesize

    427KB

    MD5

    8f528293473b899c5afa328c6a170b3a

    SHA1

    e654ddb8d8f971796ab1fb212ccd7c7ba416dcf3

    SHA256

    a3327d135729e0b777f1e30e58fc4311ceaf03475fd211059fdce0600f6e8188

    SHA512

    0e006fb2ca110384a9c60df1f34f815146f3b62d352e2f74e71925ef9b00945a3cf849bde9bd3620e07658d105dcd2d2b78d1714685685251110d672a29934f4

  • C:\Users\Admin\AppData\Local\Temp\Adapter

    Filesize

    99KB

    MD5

    8b6f1f2201b2f8d90fe081f320e54e82

    SHA1

    1dcc8c41bc83b32f11ff9e34d40cb124c1a7ca01

    SHA256

    9fa49b94c13afa4dc4eaccacc8503987fcd4ceedae513a9623b92fa6fac785b3

    SHA512

    704f9ef1ddb751c202a57aae2309585120f71df2ad1fb3d2eabb1292dd97cbc3781c34afc3911bf9aa6547b4be103da45797e4039ed67a885253906fe210f9ba

  • C:\Users\Admin\AppData\Local\Temp\Anything

    Filesize

    93KB

    MD5

    32c52e372228b08cfa705475952d765a

    SHA1

    7ff1ba2b292ac737f37dfa41783296cd7f1d7076

    SHA256

    8df1b33e8284b146f1dc627101490dc368d318fc3be8930c48e6b27fdd671ad8

    SHA512

    c698cc07ca0b943b91affe614cd490613f7302939629bf90a9bb58a62e6246d2ef1a000e62da947667c41b98b58c6b356a053d99bad099fe3c828fb8f40206eb

  • C:\Users\Admin\AppData\Local\Temp\Booty

    Filesize

    820B

    MD5

    8db1764990c99af60fcf1787e60d15ce

    SHA1

    ab3304472d824a19b897e5687df8ea65c95c5191

    SHA256

    0be09e900c3c94649d9f377e20c741cb6e33d5a979f39bcadb75324b362aec60

    SHA512

    96aef0b9b980046320faf1bbfc6374a5878b68a9af967a866f468ef6386ed4341091f888a0779706e8caeca92881c3f2d1f22910afe3eac7a526138805832124

  • C:\Users\Admin\AppData\Local\Temp\CabE062.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Evaluated

    Filesize

    76KB

    MD5

    32be8624f37939fccf1d6ea3aa6096f1

    SHA1

    f8a8e96e2b98e5fdef155a65528257b2041014be

    SHA256

    6111a302deea56749db8e58efdd7d4c869a246f710b6bf1354e9a9c1640d90c4

    SHA512

    e0656682458ea32e61898c4d12fbedaae7d78e4eacc716393551d9df866542bc6d9a69dc81073540f7fd41c6463ea815486015ebbaeb2af8633fa01f5c931af8

  • C:\Users\Admin\AppData\Local\Temp\Involves

    Filesize

    871KB

    MD5

    e623fa4ec82f7dbd0ec08e5f3d561732

    SHA1

    b8a55104bac8b18e2154d4ee897812452ceceebc

    SHA256

    e148fdbad41832ac0fc37c47be781e2e697dfdc162f699d3824f6306992abf36

    SHA512

    df134ac272abc704991a29598d35aef4d0aea1b05c928e345db23962472a4ab152dc7424649904cf8f0aac51f0302996b4bdb99273ed69f80ea59bade81dc696

  • C:\Users\Admin\AppData\Local\Temp\Rpm

    Filesize

    44KB

    MD5

    8008c91fdc56c2b9f46ef20f73e44dbd

    SHA1

    6790bd39aa4b8554e353981ac976be91fac2474d

    SHA256

    f068e15e188c59f812bdb592520e72ce2037bed7e59997abb176a5af03633dc4

    SHA512

    2de1bada15e1aac0d2bda9ca5e088d622f5119c0729f286929420f53f112e794b2565d7af3bb00debacd25fbfa6c19f9aa1f305bf1f9e060ee86e568324b34c9

  • C:\Users\Admin\AppData\Local\Temp\Supports

    Filesize

    55KB

    MD5

    a0dc06c61dfba4f8aaefcb00ea8da5ac

    SHA1

    693eb5b82c3711c9258679e17f16cdc713e6f7b7

    SHA256

    689301e325d539f63274c28d02c0e7a4f974b9be403ffc5eb336d83f48ae7b74

    SHA512

    99d5bd226ad735d50267e6cc5878dba05fbfa2cd32209a627c8c9e478404af320fad4b00153e112dd340aeeea260822e0df32fc210cd811567528810a40e7320

  • C:\Users\Admin\AppData\Local\Temp\TarE094.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Tied

    Filesize

    60KB

    MD5

    40a165154e137c049b04007667ca734f

    SHA1

    1390e4a6f2341b5407b3684430bf8587e120acc6

    SHA256

    0da19e869cad67f2b12baa681097bb38da57df7a2c3894dab318bdb0dfa04bbc

    SHA512

    3cdb738e3aac924d4e72adea6c484b4285dba2a5ea4d7e7140c7cc327fd2dee64c45efca09ef16ddcdf8b837e993170a9004a879a274ef2bd17a053ede900c89

  • C:\Users\Admin\AppData\Local\Temp\Wishlist

    Filesize

    21KB

    MD5

    231d04277395b867882c0ea5c02ee457

    SHA1

    15c25ab0820fb21a402d6e5503346c6834d8a075

    SHA256

    34593672094e4bd25ed9f6cbd003ef76aa544503c6f62994054891059bcc2b2f

    SHA512

    d997cc05651497ed9ea7cd373e3545f54d8066aa3142a00234589fed81bdd16dca02e13023220672e56379a98bc8fbe5107e323af1dea6afb54ac897e1b58d40

  • \Users\Admin\AppData\Local\Temp\103622\Meetings.pif

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • memory/2340-31-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB

  • memory/2340-30-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB

  • memory/2340-32-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB

  • memory/2340-29-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB

  • memory/2340-28-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB

  • memory/2340-27-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB

  • memory/2340-171-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB

  • memory/2340-190-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB

  • memory/2340-209-0x00000000134C0000-0x000000001371F000-memory.dmp

    Filesize

    2.4MB

  • memory/2340-219-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB

  • memory/2340-238-0x00000000039C0000-0x0000000003C03000-memory.dmp

    Filesize

    2.3MB