Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 20:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
artifact.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
artifact.exe
-
Size
587KB
-
MD5
f9ed4d7fc5d978abdc6860539c0b2491
-
SHA1
66013ed2cdc880ce12af82019095aec9364d47e3
-
SHA256
24c1836bd5c60dde678cb2508cc5fb64a2aaf69d5ddf0dec3a3ff4ceee63904a
-
SHA512
c2e6a9a3f7e906ae94af666e0261c7337e93d81c18dc1c337fc1a0440d50197ed924f51b0be9c5dbc9b5e16e51dd40ef93d2eaa76a77a0c2ac68136312008fbe
-
SSDEEP
12288:JcYzQFE8IxkNke/zE2z+ry4vVMaRz8QFbn+79Uy/ls8aCwd:2uQFVIxvozr+gIz8++blstC
Malware Config
Extracted
Family
vidar
Version
38.3
Botnet
831
C2
https://api.faceit.com/core/v1/nicknames/vyh62lapin
Attributes
-
profile_id
831
Signatures
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/2128-2-0x0000000002200000-0x0000000002294000-memory.dmp family_vidar behavioral1/memory/2128-3-0x0000000000400000-0x0000000000498000-memory.dmp family_vidar behavioral1/memory/2128-19-0x0000000002200000-0x0000000002294000-memory.dmp family_vidar behavioral1/memory/2128-21-0x0000000000400000-0x0000000000498000-memory.dmp family_vidar behavioral1/memory/2128-20-0x0000000000400000-0x0000000000A6D000-memory.dmp family_vidar -
Program crash 1 IoCs
pid pid_target Process procid_target 2836 2128 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language artifact.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2836 2128 artifact.exe 32 PID 2128 wrote to memory of 2836 2128 artifact.exe 32 PID 2128 wrote to memory of 2836 2128 artifact.exe 32 PID 2128 wrote to memory of 2836 2128 artifact.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\artifact.exe"C:\Users\Admin\AppData\Local\Temp\artifact.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 13242⤵
- Program crash
PID:2836
-