Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe
Resource
win7-20240903-en
General
-
Target
ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe
-
Size
217KB
-
MD5
785a37d8d62771cc35c6f5cc145e1219
-
SHA1
0e35b6c575670d4e8cbe0f13e7a7db9aadc8819f
-
SHA256
ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0
-
SHA512
d1fa909e78ba7b9478ffd7f627873a1e0013231cb9436d9f8895b262c7e0ba3efc1225d7d9797cad774062f9781afbdefe72b0ff9b23ddf540869f7b2b11f1be
-
SSDEEP
3072:iaVZueXuixgt+jZws6YXpNbgdEVKpInNt50IurswoYdWF3SS7AXzpLAGQRRaqtK0:lwHiW+lweoVer5MboYdi/CwR/EO
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Extracted
vidar
https://t.me/fneogr
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Extracted
lumma
https://condedqpwqm.shop/api
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral2/memory/3716-90-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/3716-94-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/3716-103-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/3716-115-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/3716-116-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/3716-132-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/3716-134-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 2 IoCs
pid Process 5092 AdminCAKKKJEHDB.exe 696 AdminIIJKJDAFHJ.exe -
Loads dropped DLL 2 IoCs
pid Process 3376 RegAsm.exe 3376 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3400 set thread context of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 5092 set thread context of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 696 set thread context of 4556 696 AdminIIJKJDAFHJ.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2824 4556 WerFault.exe 106 3872 4556 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminCAKKKJEHDB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminIIJKJDAFHJ.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3376 RegAsm.exe 3376 RegAsm.exe 3376 RegAsm.exe 3376 RegAsm.exe 3716 RegAsm.exe 3716 RegAsm.exe 3716 RegAsm.exe 3716 RegAsm.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3400 wrote to memory of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 3400 wrote to memory of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 3400 wrote to memory of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 3400 wrote to memory of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 3400 wrote to memory of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 3400 wrote to memory of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 3400 wrote to memory of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 3400 wrote to memory of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 3400 wrote to memory of 3376 3400 ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe 89 PID 3376 wrote to memory of 2452 3376 RegAsm.exe 94 PID 3376 wrote to memory of 2452 3376 RegAsm.exe 94 PID 3376 wrote to memory of 2452 3376 RegAsm.exe 94 PID 2452 wrote to memory of 5092 2452 cmd.exe 96 PID 2452 wrote to memory of 5092 2452 cmd.exe 96 PID 2452 wrote to memory of 5092 2452 cmd.exe 96 PID 5092 wrote to memory of 4804 5092 AdminCAKKKJEHDB.exe 98 PID 5092 wrote to memory of 4804 5092 AdminCAKKKJEHDB.exe 98 PID 5092 wrote to memory of 4804 5092 AdminCAKKKJEHDB.exe 98 PID 5092 wrote to memory of 4824 5092 AdminCAKKKJEHDB.exe 99 PID 5092 wrote to memory of 4824 5092 AdminCAKKKJEHDB.exe 99 PID 5092 wrote to memory of 4824 5092 AdminCAKKKJEHDB.exe 99 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 5092 wrote to memory of 3716 5092 AdminCAKKKJEHDB.exe 100 PID 3376 wrote to memory of 2972 3376 RegAsm.exe 101 PID 3376 wrote to memory of 2972 3376 RegAsm.exe 101 PID 3376 wrote to memory of 2972 3376 RegAsm.exe 101 PID 2972 wrote to memory of 696 2972 cmd.exe 103 PID 2972 wrote to memory of 696 2972 cmd.exe 103 PID 2972 wrote to memory of 696 2972 cmd.exe 103 PID 696 wrote to memory of 4556 696 AdminIIJKJDAFHJ.exe 106 PID 696 wrote to memory of 4556 696 AdminIIJKJDAFHJ.exe 106 PID 696 wrote to memory of 4556 696 AdminIIJKJDAFHJ.exe 106 PID 696 wrote to memory of 4556 696 AdminIIJKJDAFHJ.exe 106 PID 696 wrote to memory of 4556 696 AdminIIJKJDAFHJ.exe 106 PID 696 wrote to memory of 4556 696 AdminIIJKJDAFHJ.exe 106 PID 696 wrote to memory of 4556 696 AdminIIJKJDAFHJ.exe 106 PID 696 wrote to memory of 4556 696 AdminIIJKJDAFHJ.exe 106 PID 696 wrote to memory of 4556 696 AdminIIJKJDAFHJ.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe"C:\Users\Admin\AppData\Local\Temp\ffb0ca6890b94342d54d26250a6c6104b9e916858fb7242b58709f38c65b93b0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCAKKKJEHDB.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\AdminCAKKKJEHDB.exe"C:\Users\AdminCAKKKJEHDB.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:4804
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:4824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIIJKJDAFHJ.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\AdminIIJKJDAFHJ.exe"C:\Users\AdminIIJKJDAFHJ.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 13366⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 13126⤵
- Program crash
PID:3872
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4556 -ip 45561⤵PID:2300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4556 -ip 45561⤵PID:2832
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
294KB
MD520c0e4911043acdf83cd6f5818060b6d
SHA1b38d5071947e729ea05caa84958b515b53da5db6
SHA256656c58153302a82bdc4994a170163628f1aedd101b0efe6471b5af0d4173c1f5
SHA512aece9c46c5274e3660016d2795ccc0eae9578fa40ec39679e8385398675fcfbc2d08d7ed105cbafb75ced2224ee8e76720e2bf41d2c25f4a7992fa245b71543b
-
Filesize
345KB
MD5197d0030a586a58018e1b782ad30aac2
SHA1b1f31df2a1325581b42d721175192b34454075b3
SHA256b713e25a919ff9981e87d770ef46432843c3ffdb3d395564a7dc65bb55fa420e
SHA5128d01bff9ebb6795b85c143aac184f04b0483e2a2ddcd6aeaf5fe491521ad96f2756c6e9162fbff941f6e22712d5975d88fa14a32cc0b59269335b5efed2d49e5