Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 01:27

General

  • Target

    90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0.exe

  • Size

    983KB

  • MD5

    126fe36209cb4c46477e6d7aa4f3fe56

  • SHA1

    69a1cef90f0e6739c9fd5ae2a984567327bea9f6

  • SHA256

    90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0

  • SHA512

    5ab26243cef267be9fc4ef5d4934b91714298ac018865d2494aa306cb5f0e85c04e2b5ee7c809410e82eca76616a707a3b70b274c81082ad961a0dfe0ef16515

  • SSDEEP

    24576:0zZhzsd7E63T2FPay3SUP6nAK8T85vrQ+uXcMLumwjjZpyXWIWI:0ex6FPayCUPgX8azQ+uMMLuVjFO

Malware Config

Extracted

Family

vidar

Version

10.8

Botnet

057d037117dc13a05f53caea44d69e65

C2

https://steamcommunity.com/profiles/76561199761128941

https://t.me/iyigunl

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Signatures

  • Detect Vidar Stealer 7 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0.exe
    "C:\Users\Admin\AppData\Local\Temp\90f608b784fc8eac0a899d6aec257ec4beaf836e0cc808c7496f131aba61bef0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k move Injuries Injuries.cmd & Injuries.cmd & exit
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1620
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa.exe opssvc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1952
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2228
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2748
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 253462
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2832
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "MPEGWARNINGTHOMPSONCONTRIBUTION" Herein
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2884
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Misc + ..\Allowance + ..\Porn + ..\Recover + ..\Kept + ..\Physician + ..\Intervention l
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2880
      • C:\Users\Admin\AppData\Local\Temp\253462\Phys.pif
        Phys.pif l
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2800
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\253462\l

    Filesize

    413KB

    MD5

    4159d578026fd8e7cbc9954e759eb6c1

    SHA1

    13a6e40edbbc6c1b505940b20a574faaed6a6eb2

    SHA256

    7c2513949f017a2e83e9063a9ec86f5681004f5fabb7260c8f7f3f8b3bfc885f

    SHA512

    6ff9eadb8ebb0ea05c2e2ae9de383e011e5b12f71cdfbadb6f982f7759d1696eb4e5d2c3ed88d51b2c07de45f57a4dd52a6ca363704c92a78413d003e73f8b7b

  • C:\Users\Admin\AppData\Local\Temp\Allowance

    Filesize

    66KB

    MD5

    bb7c291b88341abeb75fcf31fd11023a

    SHA1

    49b3c454e50a1015d6497aae54d79de8f02d1108

    SHA256

    3153e4c7695733e0c45c670ca0ec7c5f494ab1ed847748a629c0c0e5db4e0c6b

    SHA512

    ecc994918e47cea2d73e43c6673b1a5a351410d3197d705831435d8232494aec7858e445f2408b1b98b06eb044ad42bf49bc0f678bf10f0bbb4303a153e3f55c

  • C:\Users\Admin\AppData\Local\Temp\Cab1392.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Herein

    Filesize

    400B

    MD5

    5170b94a86c13edd64fb944e28d2f663

    SHA1

    1f8bb55c3ecccd14bfb73ef777a52c6b81eb245a

    SHA256

    be7a3d2f08713e3b42b92e1c3ef934e633a389889ed73bf068ec9138187d09a1

    SHA512

    a17f303255f434db8ad970a6a0f55f098cbc82f669cd4cf0dc3904ce52b6890d177aa60c6b7b581bd923d0cdbf9fce5acda865db97f330c11826a0a0d9d167d3

  • C:\Users\Admin\AppData\Local\Temp\Injuries

    Filesize

    24KB

    MD5

    496c08160a691c57ffd0471c8e9ef277

    SHA1

    9e6afd3d4c615c84f99e6e268cbf6e60f6ed6d9e

    SHA256

    0d24de79ebf809dcd57a89294f143861d505092223d149ae9a19d57a916d3ac1

    SHA512

    63b0bc063a0327aac10716bc1c9b608ac21e97a6e7a2b47efb90d9928e5f24a24b85452970759d2d4310f837f21e31b9881467fb8379fc3bd9f9c5c5d1e19c68

  • C:\Users\Admin\AppData\Local\Temp\Intervention

    Filesize

    9KB

    MD5

    9ca6164776cf3429f486d52569765867

    SHA1

    cf8ad5707508caf25d96d9c29e82164d83f53283

    SHA256

    e58c24376c89daff35c809fe91bf11a1d57f104d0bd90aa0000d166b6aaa26c8

    SHA512

    e57a484a21f4b886dae45d9153c2a045db31d1e4a078094233070a3ebcf9a39c243fac0d925491cff455ec8768d1ea4f30473311daca0c50170588d9735562dd

  • C:\Users\Admin\AppData\Local\Temp\Kept

    Filesize

    69KB

    MD5

    f8c61333627a131302681706c1459438

    SHA1

    9ac71acdeb1ed6b42fbaacf443740a38670d2c0f

    SHA256

    3bc3635289c129efb20a0ff653d60f3c96fda1189f7ec51f04bf156e1cfa7123

    SHA512

    f3cba93805fc95efb47aa8c133b22a95be2c84f85aaa3cd8ec0a46eafde3f11787e61241482701b7d34908ad78ecd77f33adb4554b8699d793a9aad293347f6f

  • C:\Users\Admin\AppData\Local\Temp\Misc

    Filesize

    51KB

    MD5

    51e632c49896a28a23f0396918e65d26

    SHA1

    7120617bd17d08e510e8fbacd297c91cc97c94dc

    SHA256

    8997ed572af22361b240e9b3d0624d3dde721fb18a7e861fdca28dffec08366f

    SHA512

    3e86d51f4af318de5ef9f11b00b67a758326f16374ec3d93ccb7e390afdb2dd3094435b006631a4eef3175d4baf9835f1fe0295833f408e8e24df1f57acb0e57

  • C:\Users\Admin\AppData\Local\Temp\Physician

    Filesize

    57KB

    MD5

    a38bf1f9a1a38c2c378ef6877c4bc38c

    SHA1

    5aff1011f153afb0b6fa52c1b54a359e1e2debeb

    SHA256

    19ff7dd70889bbc33dc24571343c83870c05d636aac93a189b5c7f335f29c78d

    SHA512

    21d5cd51e87176d135912e2991cad67f4034fd65ea2e6e248490054aed1405ea31d8de0042a09ad6abecab3624bce54b53e07ece834fc623a061a508b54d2c64

  • C:\Users\Admin\AppData\Local\Temp\Porn

    Filesize

    92KB

    MD5

    a7817d3eb29454c7684c964d821a0921

    SHA1

    e9255613f48ce11ea42b7e10a87801c99ce6e0e9

    SHA256

    7fa0ef328a6ee25d87ef6383b7beb3801660f66e0b68f12ad3a0f797878bb9a2

    SHA512

    7d2d00e5df72200fa41cc1edbbfd89e062cc6353f641c16ad40527fb38f8b0f57b17cc4b57a53f0737a0ced08eca2deb47a2c82f3bc85bbf3db07404da5b6626

  • C:\Users\Admin\AppData\Local\Temp\Recover

    Filesize

    69KB

    MD5

    8b2234451b9df0dce40d8a623944340d

    SHA1

    275e93f7552cb73630bfa95726ead6b683c598ca

    SHA256

    832efb7162fd948aa3087dcc0aa8c2ae0b9da324f5dd55dea94cf9f5403783a2

    SHA512

    e2be22d8336f4b61c58b9d8f4578c191d50de2cf0d89d12e1005e234f4c98d492eed5f7ccfe197577cfa53fd5b4b0a6a6e1ffc86044f932102a04c561cfc5763

  • C:\Users\Admin\AppData\Local\Temp\Shopzilla

    Filesize

    872KB

    MD5

    98ba1d5591ec0bed1d499c607d565096

    SHA1

    b6ecb941541e77e91339bee10ad7af8a07f01933

    SHA256

    b4b0c98a5c8b23b8eb98502903cec8234ddf9e6fd4e6c08d334c74089dbd8cb1

    SHA512

    d267a44d42a456ee4df7925db72103094867e9c7206917a3743fa87c09b01b784bfe61f9b97f159d6df9d54b05c121f9c4e9d1ea804bcd6363dc5b4c761f7f67

  • C:\Users\Admin\AppData\Local\Temp\Tar13B5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\253462\Phys.pif

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • memory/2800-32-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB

  • memory/2800-34-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB

  • memory/2800-33-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB

  • memory/2800-29-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB

  • memory/2800-31-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB

  • memory/2800-30-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB

  • memory/2800-175-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB

  • memory/2800-194-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB

  • memory/2800-214-0x00000000139B0000-0x0000000013C0F000-memory.dmp

    Filesize

    2.4MB

  • memory/2800-223-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB

  • memory/2800-242-0x0000000003C40000-0x0000000003E81000-memory.dmp

    Filesize

    2.3MB