Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
1.0MB
-
MD5
63787e6df0b85a10bd1132dfd3afe6c7
-
SHA1
eac8d56fbdafb416169733b19beaf28a16d1c02b
-
SHA256
1d40c76cecaabdf1e1d0004aa15cb469aa4374d1d0b2e48a47e588b1f84113d6
-
SHA512
ff918db3ff75cc046d351fee632714cc2895773905ed1c70bcf12f2e13ef1ff34b943b58d93e9b5620e9104cff8130859b4a4e07925ee063766fe08d107ab395
-
SSDEEP
24576:RzZyLptSB4iQTOnBWKt2Cqh+cwAtEspRStDH:RNB+kBWU2qcjw
Malware Config
Extracted
vidar
10.8
057d037117dc13a05f53caea44d69e65
https://steamcommunity.com/profiles/76561199761128941
https://t.me/iyigunl
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral2/memory/4844-30-0x00000000043D0000-0x0000000004611000-memory.dmp family_vidar_v7 behavioral2/memory/4844-31-0x00000000043D0000-0x0000000004611000-memory.dmp family_vidar_v7 behavioral2/memory/4844-32-0x00000000043D0000-0x0000000004611000-memory.dmp family_vidar_v7 behavioral2/memory/4844-41-0x00000000043D0000-0x0000000004611000-memory.dmp family_vidar_v7 behavioral2/memory/4844-42-0x00000000043D0000-0x0000000004611000-memory.dmp family_vidar_v7 behavioral2/memory/4844-57-0x00000000043D0000-0x0000000004611000-memory.dmp family_vidar_v7 behavioral2/memory/4844-58-0x00000000043D0000-0x0000000004611000-memory.dmp family_vidar_v7 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
pid Process 4844 Newbie.pif -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 5080 tasklist.exe 960 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newbie.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Newbie.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Newbie.pif -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5080 tasklist.exe Token: SeDebugPrivilege 960 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4844 Newbie.pif 4844 Newbie.pif 4844 Newbie.pif -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2932 wrote to memory of 4600 2932 file.exe 84 PID 2932 wrote to memory of 4600 2932 file.exe 84 PID 2932 wrote to memory of 4600 2932 file.exe 84 PID 4600 wrote to memory of 5080 4600 cmd.exe 89 PID 4600 wrote to memory of 5080 4600 cmd.exe 89 PID 4600 wrote to memory of 5080 4600 cmd.exe 89 PID 4600 wrote to memory of 320 4600 cmd.exe 90 PID 4600 wrote to memory of 320 4600 cmd.exe 90 PID 4600 wrote to memory of 320 4600 cmd.exe 90 PID 4600 wrote to memory of 960 4600 cmd.exe 92 PID 4600 wrote to memory of 960 4600 cmd.exe 92 PID 4600 wrote to memory of 960 4600 cmd.exe 92 PID 4600 wrote to memory of 1800 4600 cmd.exe 93 PID 4600 wrote to memory of 1800 4600 cmd.exe 93 PID 4600 wrote to memory of 1800 4600 cmd.exe 93 PID 4600 wrote to memory of 1052 4600 cmd.exe 94 PID 4600 wrote to memory of 1052 4600 cmd.exe 94 PID 4600 wrote to memory of 1052 4600 cmd.exe 94 PID 4600 wrote to memory of 2348 4600 cmd.exe 95 PID 4600 wrote to memory of 2348 4600 cmd.exe 95 PID 4600 wrote to memory of 2348 4600 cmd.exe 95 PID 4600 wrote to memory of 3844 4600 cmd.exe 96 PID 4600 wrote to memory of 3844 4600 cmd.exe 96 PID 4600 wrote to memory of 3844 4600 cmd.exe 96 PID 4600 wrote to memory of 4844 4600 cmd.exe 97 PID 4600 wrote to memory of 4844 4600 cmd.exe 97 PID 4600 wrote to memory of 4844 4600 cmd.exe 97 PID 4600 wrote to memory of 2964 4600 cmd.exe 98 PID 4600 wrote to memory of 2964 4600 cmd.exe 98 PID 4600 wrote to memory of 2964 4600 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Monday Monday.cmd & Monday.cmd & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:320
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2872283⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CupsRoseColdTemple" Dried3⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Sean + ..\Personals + ..\Sisters + ..\Accurate + ..\Reforms + ..\Seeks + ..\Wide G3⤵
- System Location Discovery: System Language Discovery
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\287228\Newbie.pifNewbie.pif G3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4844
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
430KB
MD56261d0d04934edc2021cecd9efde267f
SHA1e8a9863b980e0467c170a672aeaa32079bd0aca1
SHA25652c92ad7b293347000ebad19aff295cc6f62bb218bcb2673931cdfe244f63063
SHA512489fe9f3408c235d32f9750cfec60678bba02a64def7f93aea38c4c4321032597b4ae1c8c796100e229d86d5b7a4d8144f0fc0686b09dbb8575c6c3924e39923
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
70KB
MD586b928224b489a52df6e2f86fe93b03d
SHA18bd998a4e0314ffbc01f3e1302b55c6da8f7da92
SHA2562697305e81a99b9a947660c7d1f403856f58ba8be7821a7da7fdf2e5df226166
SHA512127ee1b2727d4d148b8ee0b705fb0e5478500ef2759fc4d04d451aba67329049dcc51965886baa0c53f8924593ccf527f62cdf9ee849dc3930a760023e505e73
-
Filesize
871KB
MD57f390ff6cb070c1eef18913ca89fb116
SHA1930081918a896cccfbeafd5dd1216ef1d4b40f3f
SHA256e196cb9a07d65dd23f51e1a1343abf88ec7937a8b37e86d257ddebd95ed23563
SHA5123ba2e20cb0762e39d2b2a03729d45cb001f19011c638cd0adffd4e1a88a4048fbd76d7b54e489adeaa927fbcdc899c47373346967736db68cb2d99ea1c9211e3
-
Filesize
923B
MD5c921c5d969228b0a434965f6811f2fa4
SHA1a48cbc871b077769fd8d042a55f058a47aef35e7
SHA2561124cc8fa0c74e7afc30991d84757859482aaa78bb5a41ed16958fe731bc96b4
SHA512ceb7f6126d773a798cfda30bb7d36d1bf760d176cf2b87207873a375c57fa133343b68f0526561607e94ac03675dc6eafe8790304611dbccbd572d22d4bf6bdb
-
Filesize
7KB
MD53eb198fb1b67eb2f082106bb255dc745
SHA184a228c0a4b1edba32a2251246cdfa620ffe781b
SHA2563e06ef6ea9b11bc0a9688f9767bee5ece3a94c9d1a06ab9b13600b229972d9b6
SHA512bd16e14a35b88c0989e1518e0132799cf035ac039944bba7ddc77a13b4aa7f9e749241b98b646796f96e259f1288b0f927a0ff2885118978fc1e6366a5f8ba17
-
Filesize
57KB
MD54adf5737f34a4319c8c13922b2ee7b2c
SHA1cfa8b5188f28e9e3cb69d607a0e06ede7c989449
SHA256947717f4c2669fa6cece6c3cd377ac1abc4f843edd366cda3e3463f9c9da4da7
SHA512d909f8d2deca1cc61782c5b2e252abe0fe7aca5284dd7e2422f7df993a17d1eb5eb6b44b34d3ab088c355b4a8bb7b4fc34fed4f66851da6d257ec7786ff86d78
-
Filesize
58KB
MD59ee271fa1bdb3b7541beec9d6d902639
SHA120d55b4b1d6b0641bdd3959c6bc7aa1d07e65384
SHA256231f4b9879fe4c6780678df58a96139dbdaf2febdfdcc66be341898a5a53e28d
SHA5128e790009329240556cd95796f2fee93f73b773925077d44ee060754810867656be5082c83109b52fd99ad48d8ac84f1a018056181233e7e5171793dd6297d6e6
-
Filesize
89KB
MD50e01cf39db0d8427fd3595c9b18344c1
SHA1c74b40bf071b10a2ab9c22e835d479125c15e076
SHA256bd8d9df4c743109da71de7f66b91001c0586d6d833465b6d5a9e7749f1e053a0
SHA512b51048e11a5928aab18d9c30d924a1fd31f851b7a0f325716f7d67b12e4e5de8763ffa040dfe0c5a5cdb7d6590afa777b8c67009ea898e72f659a9e11be52612
-
Filesize
79KB
MD53712e812a78834d7aa69c12997af91fa
SHA1ca2012ef7da7b1a7a67cba4c9060977312022387
SHA25600b103476cdad44aaaec2e46f0dcd2efaa2878bdb22b3136927dd2da5a800d9c
SHA512f98b3c3abefebf8f9c5ae7b5d7ad622a5891836dea654659c7c137c90f7bc286834e5a612dccde6eca260ab12851ae8637d992dc3e4a4716160a581424c4705f
-
Filesize
62KB
MD5bf720c8d92df223cc60d80c60156bc51
SHA10fcac1ea0db937218434c6d1fb718c7cbf33bc14
SHA2562546b099519c23ce35883d567b1f838ea6d1b2345790b3365a58a215a7834fd7
SHA5123369aff6dd1cf3084f322ac33f76cee5f0a511525cb0ff3fcf5ab3b447a75bac02a5bbceb5c7e6dc34fcffba5ec2fca1ad7c4e0a2c2fd81d179a16f6e046a2cf
-
Filesize
15KB
MD5fe4df561b372a9998c92b74c3f32d039
SHA1c2f7d9e7bea882c9a35bd46cf6ba04b6f78a7b9a
SHA256873a6fbee241e07ee2daa7b22ca65de6af171a3b1fc1518d87b50071117f254c
SHA512c7d7bffbafd8ccde21cc331911680488d73dc8c13cd78c9fd35f5fbf872436486c4420c98387764ed98cbe9aefcb3c9fd3286085a5108e37950b07a6b1372a96