Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2024, 11:23

General

  • Target

    file.exe

  • Size

    292KB

  • MD5

    26e1bcdecaa337ee8e8b3694603c803f

  • SHA1

    4d489fc1eb967acc177cdc5ff7cdd77dac3020d4

  • SHA256

    44408030fc2d6ab0d35a060e03f750a4d53dd9045debd1c189da636d07e86147

  • SHA512

    7c606989961c028555e27bb85658f7bc94d362f20b17702675eb24cb8a05ba0d52fa525e28ea74265d437ec3d09799481882fedbb987fc04edd5aafbfcdf623f

  • SSDEEP

    6144:O/U+c8P+Iwx+Sp66wGPJJNwK0LTyib+2VvW5EO:Os/9Jp6SBw7LTyiLW5EO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Signatures

  • Detect Vidar Stealer 22 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\ProgramData\JJEGCBGIDH.exe
        "C:\ProgramData\JJEGCBGIDH.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:328
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2500
          • C:\Program Files\Google\Chrome\Application\7MGA6517FGFOGM6MFDK.exe
            "C:\Program Files\Google\Chrome\Application\7MGA6517FGFOGM6MFDK.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2996
      • C:\ProgramData\EBAFBGIDHC.exe
        "C:\ProgramData\EBAFBGIDHC.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2660
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\CGHCFBAAAFHJ" & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 10
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Google\Chrome\Application\7MGA6517FGFOGM6MFDK.exe

    Filesize

    63KB

    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

    Filesize

    471B

    MD5

    a9a1372a0439df0204e4d41c403fa5f8

    SHA1

    c587388167e8347ba675ec5006699faeec23f488

    SHA256

    e26cfb5aee36722884618870d3516be88350fdc6683162d31ae8eb3c170febce

    SHA512

    52ae09aab02fbce6d88ad8a97f8ec73b99076ac32b8b7f6a3bbf35b6e631e2b7818dd3b7d88efa66987ad5475d01f414cb85963b8c3343a526d610f3c43a3c0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aee5dcc0538ebf2eba6465d7e0a79eeb

    SHA1

    fae63d50b8542fd54a9315e3964101dd4b2f3d9e

    SHA256

    3c6d0ed6278395a3fa4816c8337d8b55fc04e84a1c0c3b9081975e7b1289c1e8

    SHA512

    5c7fba0d9799574dfb2a1de0d55ad372e57b2078639deee0356857989897fe56cf2cbc29a9afbca49dd97bdd54293a3a7ef7f6b6e8ac3ea780d3f0074604b0ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4536c93d763a378c62b0afbda4885e52

    SHA1

    3905035ffbbee80a39f1929e84fa321b0af39d6b

    SHA256

    fb0e82e7b3eaa9d525e6f6c9dbafa3bf4667cab515b4b8845cf20ac8fc247aef

    SHA512

    8558d4960140b3ce3018a413c6a1eae0ab35b92d142920839587463f42d67c031ae205f7caa620e75e18005adf17566e7785008a8d6a174587370712a0bfd313

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

    Filesize

    400B

    MD5

    c9f78531c6ac06cbaa7a041b3f9bb1a8

    SHA1

    d180aeb2c02317577f173a2d2daaed4181ce6a6d

    SHA256

    8cdfa6d5421f9745a793f9d767f4b22b41551ec2a6043de278c70f4163c137d7

    SHA512

    44f3d84a18119b9a2c5dc843a7587aec04ae2bea03c1b8d7613666db60555a90b53e9e759bdbb1b321a167b09da77c7ab0f74a779c515e6c4a1345864f988756

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\76561199768374681[1].htm

    Filesize

    33KB

    MD5

    4e78a3f070723a59a2f887cef4e96638

    SHA1

    77cc5281720e2eb709d2ce58183aa5203792ea36

    SHA256

    dacaf900e6c164b042565f6ac8499ee4ff3b80381ee635ea767697f6fa549a22

    SHA512

    3f2b22cf1958e63b3e5c16159e6b5bd6656a896980f06928fd62287cfddb006969135a557507659d983f86393513305d1ea1c9d931a82871e42a17526ff59a22

  • C:\Users\Admin\AppData\Local\Temp\Cab4A2C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4A4E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \ProgramData\EBAFBGIDHC.exe

    Filesize

    292KB

    MD5

    9d0327bd2962fd98512fb4ad5fc9ad19

    SHA1

    37fd2898d15b6e4e4be596c11120649e374a091b

    SHA256

    86d1e9372127505a6200e134641390297bd255de3b742d874108cbf5670d3d9c

    SHA512

    9a768adcd08acc5766d2b7a46e1360c2a2551405248bf774bc736b196d902bbeee56e472bd8f94a8c993f54e6e2402a9a14d6131500cf7979b89ccdbdd6ecc15

  • \ProgramData\JJEGCBGIDH.exe

    Filesize

    338KB

    MD5

    7abd5004d90827227cb77ecebc6c0aba

    SHA1

    39c7f736d4041cb246b31d34f455460cdc3a071e

    SHA256

    13d8eb0461863ad7a6f2cd6c20133e6141b7ee60c2cfa16be07b050a1702b5ad

    SHA512

    7d95b29386c7a42da65be1888ce33d1e6e323da9e667cd72def869da3dfd60209b023d03e5258fcf52a71d7d2dd9a98e620cd1a44bc0e68da6d9567041a5e616

  • \ProgramData\mozglue.dll

    Filesize

    593KB

    MD5

    c8fd9be83bc728cc04beffafc2907fe9

    SHA1

    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

    SHA256

    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

    SHA512

    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

  • \ProgramData\nss3.dll

    Filesize

    2.0MB

    MD5

    1cc453cdf74f31e4d913ff9c10acdde2

    SHA1

    6e85eae544d6e965f15fa5c39700fa7202f3aafe

    SHA256

    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

    SHA512

    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

  • memory/328-540-0x00000000011D0000-0x0000000001226000-memory.dmp

    Filesize

    344KB

  • memory/328-541-0x0000000072990000-0x000000007307E000-memory.dmp

    Filesize

    6.9MB

  • memory/328-770-0x0000000072990000-0x000000007307E000-memory.dmp

    Filesize

    6.9MB

  • memory/328-539-0x000000007299E000-0x000000007299F000-memory.dmp

    Filesize

    4KB

  • memory/328-594-0x0000000072990000-0x000000007307E000-memory.dmp

    Filesize

    6.9MB

  • memory/2316-4-0x0000000074170000-0x000000007485E000-memory.dmp

    Filesize

    6.9MB

  • memory/2316-0-0x000000007417E000-0x000000007417F000-memory.dmp

    Filesize

    4KB

  • memory/2316-1-0x0000000001070000-0x00000000010BA000-memory.dmp

    Filesize

    296KB

  • memory/2316-17-0x0000000074170000-0x000000007485E000-memory.dmp

    Filesize

    6.9MB

  • memory/2316-2-0x0000000074170000-0x000000007485E000-memory.dmp

    Filesize

    6.9MB

  • memory/2464-627-0x0000000000A50000-0x0000000000A9A000-memory.dmp

    Filesize

    296KB

  • memory/2500-593-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2500-590-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2500-588-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2500-596-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2500-589-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2500-586-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2500-584-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2500-625-0x0000000000401000-0x0000000000441000-memory.dmp

    Filesize

    256KB

  • memory/2660-657-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2660-651-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2660-809-0x0000000020590000-0x00000000207EF000-memory.dmp

    Filesize

    2.4MB

  • memory/2660-808-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2660-771-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2660-649-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2660-653-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2660-655-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2660-660-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2660-663-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2660-661-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-11-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-378-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-188-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-209-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-228-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-10-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-16-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-5-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-359-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-198-0x000000001A530000-0x000000001A78F000-memory.dmp

    Filesize

    2.4MB

  • memory/2812-421-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-6-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-160-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-8-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-7-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-19-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-440-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-14-0x0000000000400000-0x0000000000657000-memory.dmp

    Filesize

    2.3MB

  • memory/2812-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB