Analysis
-
max time kernel
134s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
282KB
-
MD5
f33b34d0de9bb27980bc99ea468c1181
-
SHA1
b6ddd17ceed5372febacae3d2c3b95165053fc62
-
SHA256
6b6b6dcf20260d92fbf0fd6cea9d4bdabf29e047af19ad026b58c4aaf448a67e
-
SHA512
e6a7083752cafcc5264ee312cc4804b646c5f9788c24905a7df689c1520552b73ebc04ff1af5ef0c0c93c026cc3249738fa194caef75ba2f9af7ea1a3f72545e
-
SSDEEP
6144:Ms6bXo+ImXuZeO59j7MLE/Ut67PmromTk8uHc+1BagPivpNEO:MnbLBXkZ7Bc67PmkR2g6/EO
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/4788-4-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/4788-9-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/4788-7-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4928 set thread context of 4788 4928 file.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4788 RegAsm.exe 4788 RegAsm.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4788 4928 file.exe 84 PID 4928 wrote to memory of 4788 4928 file.exe 84 PID 4928 wrote to memory of 4788 4928 file.exe 84 PID 4928 wrote to memory of 4788 4928 file.exe 84 PID 4928 wrote to memory of 4788 4928 file.exe 84 PID 4928 wrote to memory of 4788 4928 file.exe 84 PID 4928 wrote to memory of 4788 4928 file.exe 84 PID 4928 wrote to memory of 4788 4928 file.exe 84 PID 4928 wrote to memory of 4788 4928 file.exe 84 PID 4928 wrote to memory of 4788 4928 file.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4788
-