Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    34s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 01:18

General

  • Target

    6c6ec35999113818b53305fdfd10b9afb24129d3299a06e2f8b4204f327ab98d.exe

  • Size

    292KB

  • MD5

    ad31361e15557683381bfeafda7fc981

  • SHA1

    0fa8a544b8c85e1337f1d7794c809c4c76690428

  • SHA256

    6c6ec35999113818b53305fdfd10b9afb24129d3299a06e2f8b4204f327ab98d

  • SHA512

    21aa9d918a6c884f6c4572e3b714b73c96b73fa69723181ec42966104644cd99689d7e75830d5f3a7b61400f7c21c20fec35a22672524e01e1091210bf9af8cb

  • SSDEEP

    6144:O5fP3M3itSVctOcalWs0q4Heb+J4ejNBN++lUjjHEO:O5fPc3itsIOcOyhNjNv++UjHEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Signatures

  • Detect Vidar Stealer 22 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c6ec35999113818b53305fdfd10b9afb24129d3299a06e2f8b4204f327ab98d.exe
    "C:\Users\Admin\AppData\Local\Temp\6c6ec35999113818b53305fdfd10b9afb24129d3299a06e2f8b4204f327ab98d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2268
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\ProgramData\CGDHDHJEBG.exe
          "C:\ProgramData\CGDHDHJEBG.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:976
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
            • Loads dropped DLL
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2516
            • C:\Program Files\Google\Chrome\Application\WWKKG8NYRQ4Z29F6GCW.exe
              "C:\Program Files\Google\Chrome\Application\WWKKG8NYRQ4Z29F6GCW.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2996
        • C:\ProgramData\IJEHCGIJEC.exe
          "C:\ProgramData\IJEHCGIJEC.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2948
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:2796
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2900
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\FBKKFBAEGDHJ" & exit
            3⤵
              PID:2524
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                4⤵
                • Delays execution with timeout.exe
                PID:1288

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Google\Chrome\Application\WWKKG8NYRQ4Z29F6GCW.exe

          Filesize

          63KB

          MD5

          b58b926c3574d28d5b7fdd2ca3ec30d5

          SHA1

          d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

          SHA256

          6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

          SHA512

          b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

        • C:\ProgramData\JKJDAEBFCBKE\KJJJJD

          Filesize

          148KB

          MD5

          90a1d4b55edf36fa8b4cc6974ed7d4c4

          SHA1

          aba1b8d0e05421e7df5982899f626211c3c4b5c1

          SHA256

          7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

          SHA512

          ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

          Filesize

          471B

          MD5

          a9a1372a0439df0204e4d41c403fa5f8

          SHA1

          c587388167e8347ba675ec5006699faeec23f488

          SHA256

          e26cfb5aee36722884618870d3516be88350fdc6683162d31ae8eb3c170febce

          SHA512

          52ae09aab02fbce6d88ad8a97f8ec73b99076ac32b8b7f6a3bbf35b6e631e2b7818dd3b7d88efa66987ad5475d01f414cb85963b8c3343a526d610f3c43a3c0c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1a8dad5f79605219db458276b4822a2d

          SHA1

          abfeb7c62bcc5f66d1d21bee713d6d28eb0a993f

          SHA256

          98b379025270f4babdb0fba938c5395c27da26ba5c7b83d91ac8f408ade41179

          SHA512

          8394daf32eb739e1f951bda57e14b6af7106281f16e5f6601334b6c3883fe0a86d1084e24bf7b4ab7029e7e40568e18f87e8d6d30c6ea4ed5b816aef54e0c4a0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

          Filesize

          400B

          MD5

          0ae3c220302c850ff6b053952ef724bd

          SHA1

          9d271d5c15fc736bb203d47d8f54e8b0d9f2cf8b

          SHA256

          a950c9a8a113b6932c8149dd5ac7510f02470fcaab827494c0efb2559f5f9645

          SHA512

          b61458ee66249609aa4aa46fe81e4f6599c1be6e8d40c3bee67366dfbaf22ee1a9b6c9a59b80cf7bfbb72410e5f9382f8690629220efe47f6e26d6c8e207a9bc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\76561199768374681[1].htm

          Filesize

          33KB

          MD5

          7516ef517aba329f2af47671dd024337

          SHA1

          112866e2dd00887de5860639bb5cd7f6dc8fccb5

          SHA256

          67697799b2dbf42559573e4ac5fca0a3834357f36c95596e7caed48f558d5068

          SHA512

          4528d131c9a114bc2a41462261ebc218887e64cc8e330ff8d9aee1973cd99bd802512ec764113c290c4d842e00f86ff51d5b361f429ba685eece69b8b5194d97

        • C:\Users\Admin\AppData\Local\Temp\Cab2C40.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar2C82.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \ProgramData\CGDHDHJEBG.exe

          Filesize

          338KB

          MD5

          7abd5004d90827227cb77ecebc6c0aba

          SHA1

          39c7f736d4041cb246b31d34f455460cdc3a071e

          SHA256

          13d8eb0461863ad7a6f2cd6c20133e6141b7ee60c2cfa16be07b050a1702b5ad

          SHA512

          7d95b29386c7a42da65be1888ce33d1e6e323da9e667cd72def869da3dfd60209b023d03e5258fcf52a71d7d2dd9a98e620cd1a44bc0e68da6d9567041a5e616

        • \ProgramData\IJEHCGIJEC.exe

          Filesize

          292KB

          MD5

          9d0327bd2962fd98512fb4ad5fc9ad19

          SHA1

          37fd2898d15b6e4e4be596c11120649e374a091b

          SHA256

          86d1e9372127505a6200e134641390297bd255de3b742d874108cbf5670d3d9c

          SHA512

          9a768adcd08acc5766d2b7a46e1360c2a2551405248bf774bc736b196d902bbeee56e472bd8f94a8c993f54e6e2402a9a14d6131500cf7979b89ccdbdd6ecc15

        • \ProgramData\mozglue.dll

          Filesize

          593KB

          MD5

          c8fd9be83bc728cc04beffafc2907fe9

          SHA1

          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

          SHA256

          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

          SHA512

          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

        • \ProgramData\nss3.dll

          Filesize

          2.0MB

          MD5

          1cc453cdf74f31e4d913ff9c10acdde2

          SHA1

          6e85eae544d6e965f15fa5c39700fa7202f3aafe

          SHA256

          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

          SHA512

          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

        • memory/976-561-0x0000000000C80000-0x0000000000CD6000-memory.dmp

          Filesize

          344KB

        • memory/976-602-0x0000000072F50000-0x000000007363E000-memory.dmp

          Filesize

          6.9MB

        • memory/976-597-0x0000000072F50000-0x000000007363E000-memory.dmp

          Filesize

          6.9MB

        • memory/976-580-0x0000000072F50000-0x000000007363E000-memory.dmp

          Filesize

          6.9MB

        • memory/976-560-0x0000000072F5E000-0x0000000072F5F000-memory.dmp

          Filesize

          4KB

        • memory/2364-443-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2364-198-0x0000000020170000-0x00000000203CF000-memory.dmp

          Filesize

          2.4MB

        • memory/2364-212-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-238-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-9-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-10-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-362-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-381-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-424-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-159-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-180-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-8-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-13-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-6-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-7-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-16-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-18-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2364-5-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2468-4-0x0000000074710000-0x0000000074DFE000-memory.dmp

          Filesize

          6.9MB

        • memory/2468-2-0x0000000074710000-0x0000000074DFE000-memory.dmp

          Filesize

          6.9MB

        • memory/2468-1-0x0000000000F20000-0x0000000000F6A000-memory.dmp

          Filesize

          296KB

        • memory/2468-0-0x000000007471E000-0x000000007471F000-memory.dmp

          Filesize

          4KB

        • memory/2468-14-0x0000000074710000-0x0000000074DFE000-memory.dmp

          Filesize

          6.9MB

        • memory/2516-584-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/2516-582-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/2516-591-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/2516-585-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/2516-589-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/2516-586-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/2516-603-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/2516-583-0x0000000000400000-0x0000000000459000-memory.dmp

          Filesize

          356KB

        • memory/2900-664-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-650-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-648-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-646-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-644-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-653-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-662-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-643-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-781-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-800-0x0000000000400000-0x0000000000657000-memory.dmp

          Filesize

          2.3MB

        • memory/2900-819-0x000000001A390000-0x000000001A5EF000-memory.dmp

          Filesize

          2.4MB

        • memory/2948-618-0x0000000000E10000-0x0000000000E5A000-memory.dmp

          Filesize

          296KB

        • memory/2996-620-0x0000000000340000-0x0000000000352000-memory.dmp

          Filesize

          72KB