Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
282KB
-
MD5
f33b34d0de9bb27980bc99ea468c1181
-
SHA1
b6ddd17ceed5372febacae3d2c3b95165053fc62
-
SHA256
6b6b6dcf20260d92fbf0fd6cea9d4bdabf29e047af19ad026b58c4aaf448a67e
-
SHA512
e6a7083752cafcc5264ee312cc4804b646c5f9788c24905a7df689c1520552b73ebc04ff1af5ef0c0c93c026cc3249738fa194caef75ba2f9af7ea1a3f72545e
-
SSDEEP
6144:Ms6bXo+ImXuZeO59j7MLE/Ut67PmromTk8uHc+1BagPivpNEO:MnbLBXkZ7Bc67PmkR2g6/EO
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Signatures
-
Detect Vidar Stealer 9 IoCs
resource yara_rule behavioral1/memory/1224-14-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1224-20-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1224-17-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1224-10-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1224-8-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1224-11-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1716-15-0x00000000021E0000-0x00000000041E0000-memory.dmp family_vidar_v7 behavioral1/memory/1224-23-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/1224-24-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1716 set thread context of 1224 1716 file.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1472 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1224 RegAsm.exe 1224 RegAsm.exe 1224 RegAsm.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2500 1716 file.exe 32 PID 1716 wrote to memory of 2500 1716 file.exe 32 PID 1716 wrote to memory of 2500 1716 file.exe 32 PID 1716 wrote to memory of 2500 1716 file.exe 32 PID 1716 wrote to memory of 2500 1716 file.exe 32 PID 1716 wrote to memory of 2500 1716 file.exe 32 PID 1716 wrote to memory of 2500 1716 file.exe 32 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1716 wrote to memory of 1224 1716 file.exe 33 PID 1224 wrote to memory of 2996 1224 RegAsm.exe 36 PID 1224 wrote to memory of 2996 1224 RegAsm.exe 36 PID 1224 wrote to memory of 2996 1224 RegAsm.exe 36 PID 1224 wrote to memory of 2996 1224 RegAsm.exe 36 PID 2996 wrote to memory of 1472 2996 cmd.exe 38 PID 2996 wrote to memory of 1472 2996 cmd.exe 38 PID 2996 wrote to memory of 1472 2996 cmd.exe 38 PID 2996 wrote to memory of 1472 2996 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2500
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\IIDAAFBGDBKJ" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1472
-
-
-