Analysis

  • max time kernel
    90s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 08:38

General

  • Target

    2668-8-0x0000000000400000-0x0000000000675000-memory.exe

  • Size

    2.5MB

  • MD5

    99ac392d2cccc7e47f7e82ca1e8e1de1

  • SHA1

    bb6a01062ddf5e2d9dd3303efe0c1c6733455254

  • SHA256

    cc35139081450e744e030d1a76f78dd5e0ad8d576b1865841cb57bc90b901843

  • SHA512

    c98c014583d31ce005ebcfbf0dbb934f8dc4172ed241cf9455a473fa32bbde635abb57c933a5f1b2578bb29b91677739671c2c3941b0b4a64b102682afb74091

  • SSDEEP

    3072:DXLzJjK+C+xc+CrwCsRMr6C5rBYBYwG8cmJAFMaq3A171J4Pq0/Qp8gyiaM:7LFjK+NxcLnsRMr6cYBYw8vq4t8t

Malware Config

Extracted

Family

vidar

Version

11

Botnet

250b9a73c7975e8d5fe6b982585fb708

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2668-8-0x0000000000400000-0x0000000000675000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2668-8-0x0000000000400000-0x0000000000675000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4524
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 216
      2⤵
      • Program crash
      PID:3948
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4524 -ip 4524
    1⤵
      PID:4616

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4524-0-0x0000000000400000-0x0000000000675000-memory.dmp

      Filesize

      2.5MB