Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-09-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe
Resource
win11-20240802-en
General
-
Target
798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe
-
Size
283KB
-
MD5
a8fef7b198fa122ead5bcf5b84f2737b
-
SHA1
00ac0d1d6354ba397ea4d69265ed227817a29d8f
-
SHA256
798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30
-
SHA512
acf483ef4846e1bff039c615eca505547e3739c979a6ecf08bda31869d69c3b71dcbdab045ac28bfcd5bd8bc92201fd5841b54c48ccb39986b712a99f8ef7d3b
-
SSDEEP
6144:/aYRRx/KV1vo9X/FLI/tiDS/MqmPJOUv5/iqfMvBO71BBEO:/9Lx/i1a/FL2tKeOJv5/iqEY7FEO
Malware Config
Extracted
vidar
https://t.me/fneogr
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Signatures
-
Detect Vidar Stealer 16 IoCs
resource yara_rule behavioral2/memory/5808-3-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-8-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-7-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-26-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-27-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-43-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-59-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-60-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-61-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-85-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-92-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-93-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5808-94-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/4472-141-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/4472-150-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/4472-151-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1552 AKKEGDGCGD.exe 240 EHDAFIJJEC.exe -
Loads dropped DLL 2 IoCs
pid Process 5808 RegAsm.exe 5808 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1592 set thread context of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1552 set thread context of 700 1552 AKKEGDGCGD.exe 90 PID 240 set thread context of 4472 240 EHDAFIJJEC.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AKKEGDGCGD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EHDAFIJJEC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5960 timeout.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5808 RegAsm.exe 5808 RegAsm.exe 5808 RegAsm.exe 5808 RegAsm.exe 5808 RegAsm.exe 5808 RegAsm.exe 5808 RegAsm.exe 5808 RegAsm.exe 4472 RegAsm.exe 4472 RegAsm.exe 4472 RegAsm.exe 4472 RegAsm.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 1592 wrote to memory of 5808 1592 798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe 79 PID 5808 wrote to memory of 1552 5808 RegAsm.exe 81 PID 5808 wrote to memory of 1552 5808 RegAsm.exe 81 PID 5808 wrote to memory of 1552 5808 RegAsm.exe 81 PID 5808 wrote to memory of 240 5808 RegAsm.exe 85 PID 5808 wrote to memory of 240 5808 RegAsm.exe 85 PID 5808 wrote to memory of 240 5808 RegAsm.exe 85 PID 5808 wrote to memory of 5652 5808 RegAsm.exe 87 PID 5808 wrote to memory of 5652 5808 RegAsm.exe 87 PID 5808 wrote to memory of 5652 5808 RegAsm.exe 87 PID 5652 wrote to memory of 5960 5652 cmd.exe 89 PID 5652 wrote to memory of 5960 5652 cmd.exe 89 PID 5652 wrote to memory of 5960 5652 cmd.exe 89 PID 1552 wrote to memory of 700 1552 AKKEGDGCGD.exe 90 PID 1552 wrote to memory of 700 1552 AKKEGDGCGD.exe 90 PID 1552 wrote to memory of 700 1552 AKKEGDGCGD.exe 90 PID 1552 wrote to memory of 700 1552 AKKEGDGCGD.exe 90 PID 1552 wrote to memory of 700 1552 AKKEGDGCGD.exe 90 PID 1552 wrote to memory of 700 1552 AKKEGDGCGD.exe 90 PID 1552 wrote to memory of 700 1552 AKKEGDGCGD.exe 90 PID 1552 wrote to memory of 700 1552 AKKEGDGCGD.exe 90 PID 1552 wrote to memory of 700 1552 AKKEGDGCGD.exe 90 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91 PID 240 wrote to memory of 4472 240 EHDAFIJJEC.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe"C:\Users\Admin\AppData\Local\Temp\798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5808 -
C:\ProgramData\AKKEGDGCGD.exe"C:\ProgramData\AKKEGDGCGD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:700
-
-
-
C:\ProgramData\EHDAFIJJEC.exe"C:\ProgramData\EHDAFIJJEC.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HCBFIJJECFIE" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5652 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5960
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD53cc3c64c344fe15ed1ff28b4708b4e69
SHA189b21a0cf98cf01b412750cee558b7b857b7f95e
SHA2569cd036f0f1f2b9e229d9449c958da1d3528c0955069e5e3c02c0a0d629dfd1d7
SHA512d7fd0ea18e706044d726e3190e6be84a209e931ecc8d2bddbb50da3f179484789110ae63c497b4410450f89f952424662b052e5960bb5ca2e0d63f8bf19270bd
-
Filesize
283KB
MD5a8fef7b198fa122ead5bcf5b84f2737b
SHA100ac0d1d6354ba397ea4d69265ed227817a29d8f
SHA256798773e476a288869b80bc5b3029f754a5b890cd02b2dedfbb8e9d4aecc39f30
SHA512acf483ef4846e1bff039c615eca505547e3739c979a6ecf08bda31869d69c3b71dcbdab045ac28bfcd5bd8bc92201fd5841b54c48ccb39986b712a99f8ef7d3b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE
Filesize2KB
MD5e39c029e833d03e63f95f567f900009c
SHA1d3a8a2a93b196c2fa6e15ea9e07961508b98c9d8
SHA25615d439d383d0811d0b034f00025639246efd5cac92c3af80323a1c935b528297
SHA51282ddc5d68a63a7a0b081856a43cd027d16a4420dde1bbc162bd8193fe266b94e58a279579391125f6952f1520c76aa55f7cac18ab26b147b341b24b9db99347b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize2KB
MD5dd1fe1b28604aee93020a737bc2f0000
SHA1be0010830efcaa50887b83bc650be8bf5bc03915
SHA256a8ea8f94eabd58b777a1808e307cb995eb6e5542c9929db2f6f2faf9a9259c96
SHA512a41812f4468a147f36095686f3472e7320ef1b7226e23d41e0c08abaa73909bea1fc1d4c787ae553a84a0d070b824760a757a82c677f5d1f28372610cd5bd645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize1KB
MD516ffd8864d244b5fea256041ac8cfaa3
SHA16a503bec6891ba5457cf8b1477c592a5b62fb2fe
SHA256daab9af5cd301650f9639389174eadc04b84b302df5dacfd41ad5503cdcaa04e
SHA51252cb8166b22dcf32e1d1f91efe25379f5f7ac049730ea670be267062ab5e22eda79e1b0bc3b82ae4e9ce4507067a07426b7bac4875709c7954a2f0302285ddf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE
Filesize458B
MD5462827027e70ec3162b451ffe87767c9
SHA163b1c615afd7c7bf09e72c7d7e35fc82c93eaa09
SHA256d5de19681c9e98925cfeec0dd895485d8a2bf089172aef490906f2e012c05d64
SHA5122853319c8046be2788767b1f6233145972dfc7140f3a22e773051f7dea9515f582a355f401aa5d7fd684ce3c01751f4e3db7cc3957817131447294d93589e22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD5bb1caec4cedc536683dd2ec179622d6a
SHA1b9eeaa1acf81f381bb3b0931952dca2cd08316e0
SHA2567b06b5d367f5fc31f7dcb065f46053aff18815bcd48e787b7311ad57b30ee8f2
SHA51215066ffc8f76b50ec93957460928e0efc9a79b67a097c88f6bbe1015a8ed396f1091ac79750e8e2238f007c8dfcbd7873a53693e9d3a1f963f42bd6a3f42ccd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize458B
MD5f06b9b912f2dfb95f363db9b963c7452
SHA1ba5c083b34f750a63185015fa6aab56812af9f7c
SHA256d50e81b52fb443802c1be086c61f1f47b7f707e1fc6ea3183182c8094a878e9b
SHA5125813e0e4b8a63734e2ba5be4c1320b9f387e6ad7b3c1a62e9b6d7989dedd8a8d8de0cd881cabb179c9be6220918e3310833a209148aa931c4f0d119c1516f7ab