Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-09-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe
Resource
win11-20240802-en
General
-
Target
5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe
-
Size
282KB
-
MD5
5dd74b81e1e9f3ab155e1603a2fa793b
-
SHA1
653cdaf8617c7fdec6f39db3334e858bec9a2d66
-
SHA256
5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26
-
SHA512
9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa
-
SSDEEP
6144:kpKO3JjtQLCz0sVHReGoBtSTMv+ONYwjBv8ncRoHvYpUTl/KF//sEO:kvLVVBUt8Mv+ejBv8cGzTVKdsEO
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Signatures
-
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/5776-4-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5776-7-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5776-9-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5776-28-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/5776-29-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5832 set thread context of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5480 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5776 RegAsm.exe 5776 RegAsm.exe 5776 RegAsm.exe 5776 RegAsm.exe 5776 RegAsm.exe 5776 RegAsm.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 5832 wrote to memory of 2976 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 80 PID 5832 wrote to memory of 2976 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 80 PID 5832 wrote to memory of 2976 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 80 PID 5832 wrote to memory of 4868 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 81 PID 5832 wrote to memory of 4868 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 81 PID 5832 wrote to memory of 4868 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 81 PID 5832 wrote to memory of 5724 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 82 PID 5832 wrote to memory of 5724 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 82 PID 5832 wrote to memory of 5724 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 82 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5832 wrote to memory of 5776 5832 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 83 PID 5776 wrote to memory of 1436 5776 RegAsm.exe 85 PID 5776 wrote to memory of 1436 5776 RegAsm.exe 85 PID 5776 wrote to memory of 1436 5776 RegAsm.exe 85 PID 1436 wrote to memory of 5480 1436 cmd.exe 87 PID 1436 wrote to memory of 5480 1436 cmd.exe 87 PID 1436 wrote to memory of 5480 1436 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe"C:\Users\Admin\AppData\Local\Temp\5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:5724
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\EGDGDHJJDGHC" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5480
-
-
-