Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/09/2024, 15:48

240926-s8v9hsvgkn 10

25/09/2024, 20:19

240925-y33djayfne 10

25/09/2024, 20:16

240925-y2axwsyeqa 10

Analysis

  • max time kernel
    32s
  • max time network
    71s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/09/2024, 20:19

General

  • Target

    66f4247962974_vfdsgasd12.exe

  • Size

    403KB

  • MD5

    8b0b12811b60a92a72b636a46fadb0ba

  • SHA1

    0ab6b31b69b7964de2e9639169d036c68f9efd76

  • SHA256

    1174cade1bd7b389c084b340898d4afd84e1145d9294d8a550f3a532f09cda7c

  • SHA512

    abf908cb7505acd792aa1d9a346ec1b635f5c078ad2104b5d5a0678cc54e216a843fbacba25ebff6a7baed6a6463ee8fc433ff1c71178775366b7f4aade1227a

  • SSDEEP

    12288:dHROWCWIpXQ6dvhXe+iGaXImXN18/7LV+z+0EO:ludvbwX4/7LV/0t

Malware Config

Extracted

Family

vidar

Version

11

Botnet

9bf5e431869643a2ac397d2dc0d687fb

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Signatures

  • Detect Vidar Stealer 13 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
    "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:3708
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4072
    • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
      "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:3024
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
            PID:2212
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
              PID:2752
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              2⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3804
          • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
            "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
            1⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4916
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              2⤵
              • System Location Discovery: System Language Discovery
              PID:3420
          • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
            "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
            1⤵
              PID:32
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                2⤵
                  PID:3000
              • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
                "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
                1⤵
                  PID:4328
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    2⤵
                      PID:728
                  • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
                    "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
                    1⤵
                      PID:3180
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        2⤵
                          PID:1780
                      • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
                        "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
                        1⤵
                          PID:3112
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            2⤵
                              PID:2496
                          • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
                            "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
                            1⤵
                              PID:1140
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                2⤵
                                  PID:3648
                              • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
                                "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
                                1⤵
                                  PID:1992
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                    2⤵
                                      PID:3580
                                  • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
                                    "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
                                    1⤵
                                      PID:1920
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        2⤵
                                          PID:772
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          2⤵
                                            PID:3056
                                        • C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe
                                          "C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"
                                          1⤵
                                            PID:2616
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              2⤵
                                                PID:3272

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\ProgramData\EBAFBGIDHCBF\CFHIIJ

                                              Filesize

                                              160KB

                                              MD5

                                              f310cf1ff562ae14449e0167a3e1fe46

                                              SHA1

                                              85c58afa9049467031c6c2b17f5c12ca73bb2788

                                              SHA256

                                              e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                              SHA512

                                              1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                            • C:\ProgramData\EBAFBGIDHCBF\KFHCAE

                                              Filesize

                                              40KB

                                              MD5

                                              a182561a527f929489bf4b8f74f65cd7

                                              SHA1

                                              8cd6866594759711ea1836e86a5b7ca64ee8911f

                                              SHA256

                                              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                              SHA512

                                              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                            • C:\ProgramData\EBAFBGIDHCBF\KKKJKE

                                              Filesize

                                              114KB

                                              MD5

                                              7db6cef80eafac6e18a510ab209edfe2

                                              SHA1

                                              3ee98c48386788861bf1d99043e6836df4763308

                                              SHA256

                                              4db72158cdd9735367a53c79b929d7e93d2778c970e883faa1b37f741ae01bed

                                              SHA512

                                              78e958b8a7b712349471879d6449f6e9c165511942f71093259cd139f6709f08498bb664562552ba2aa3e218bc3f396f43f26360ca646f1999573772a5b63c2d

                                            • C:\ProgramData\IIEHJKJJJECF\BAKFCB

                                              Filesize

                                              20KB

                                              MD5

                                              a603e09d617fea7517059b4924b1df93

                                              SHA1

                                              31d66e1496e0229c6a312f8be05da3f813b3fa9e

                                              SHA256

                                              ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                                              SHA512

                                              eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                                              Filesize

                                              471B

                                              MD5

                                              3d0514f5227d0ba8f91af3531108aa9e

                                              SHA1

                                              e785caa409acb468d4cc46790320a54f1ff99db6

                                              SHA256

                                              aac8c93892fef76efc9790da21d518ed553e974256217b4244b34d73bdd0f8ee

                                              SHA512

                                              2990a16921b56e0e00ef40e01c6a5d8ab425475de36fad0228d5f9d31643e476de620f594063fd5a253b47219c10e0de1094aeeea215be00225c7cb79fbc3eac

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                                              Filesize

                                              400B

                                              MD5

                                              c85f4bad474bd6d55c682c08512ee07b

                                              SHA1

                                              c5ef60fd5912b85cd55ee60f0e76f577075308a8

                                              SHA256

                                              d88ecb10ce1ff2c83c1785cf53b76fa1dbd37caffc835238113967dc2e524d7a

                                              SHA512

                                              47bcbd88c237d09851e706fef4edbd5e4637f639bdc06c7af225d859ef75890aa62bd82f8144f78f8782a8096a36de4b509b27a55f3b913fac0877369c13738c

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\66f4247962974_vfdsgasd12.exe.log

                                              Filesize

                                              425B

                                              MD5

                                              bb27934be8860266d478c13f2d65f45e

                                              SHA1

                                              a69a0e171864dcac9ade1b04fc0313e6b4024ccb

                                              SHA256

                                              85ad0d9909461517acf2e24ff116ca350e9b7000b4eefb23aa3647423c9745b4

                                              SHA512

                                              87dd77feac509a25b30c76c119752cc25020cca9c53276c2082aef2a8c75670ef67e1e70024a63d44ae442b64f4bc464aee6691e80c525376bb7421929cfa3bb

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BP5TNA7\76561199780418869[1].htm

                                              Filesize

                                              33KB

                                              MD5

                                              ca2de42323366d53df3b4b72dc5c5067

                                              SHA1

                                              bdefecddb939749649cec35b33cc9043d67d2181

                                              SHA256

                                              29038555176b01b059212eed383ab56bb1bb451cd63fa81be0c02a05fbb83919

                                              SHA512

                                              5ff732548594811682fadc857c7e6c1058a2eae7586b7a9e66d82d5ad53e0cdcafe2cfb14b164eccbfa7eef4b33ede18f3f0f1c5cae0fd8a6ac8cb153c9c768d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MUFQOQI9\76561199780418869[1].htm

                                              Filesize

                                              33KB

                                              MD5

                                              f6196c8b3f01d1e4eba2d9a116237295

                                              SHA1

                                              6c364919737630a1343a5afda25419f863cd798e

                                              SHA256

                                              ca6667bad28f93e6456cd3e02c22e64fefb117dfea93a345cb6a68d072534725

                                              SHA512

                                              595cc8d5bf51202dfbefbf366e3502a8972a5f1e041f4376fa4193f1cf869aa4b312e6402bd6401b510d27de100864b91ad8b9858a72d27b83efdd87d30605e9

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MUFQOQI9\76561199780418869[1].htm

                                              Filesize

                                              33KB

                                              MD5

                                              0bc5e6d855eb12bc02f1a3fa1e2a29a9

                                              SHA1

                                              f26cf382b40901a0315a33ea855303f6b52b436b

                                              SHA256

                                              eb0d8ac75877bcf2624b96ea83714297f26b5800a28853566737643baeec5bca

                                              SHA512

                                              d64a020f6521080a5e54b55eaa868e65cbb261967e9f8c323818539f33533b1ef7952d37ccab2e2b0b5e232bf78939b245073afb6d0fd4067204c8dd5740394e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\N0IA4YT0\76561199780418869[1].htm

                                              Filesize

                                              33KB

                                              MD5

                                              b195c75701eb19949697cebe16ed8b9a

                                              SHA1

                                              72573b883201bb1f5e379bd111b04503fde48966

                                              SHA256

                                              462466bad94ec849f13dccc53307485ec3a403d4946fd920badb8897fe106dfa

                                              SHA512

                                              a7c6f61acb6fc620b1044721bb090c97446ba6520b84c44dc597855693d46cc5b924907c7e90412aeb8d37168efbaf8ae140f36664ed289e2af3073e5253da79

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\N0IA4YT0\76561199780418869[1].htm

                                              Filesize

                                              33KB

                                              MD5

                                              dc6e061cd70dab075cd75951339436e2

                                              SHA1

                                              007deadc93fef686e2453db3518873a65680b311

                                              SHA256

                                              a63c98a6450c933c172a39341fd6198b29ae90c157365332ffd1e2b904832ea7

                                              SHA512

                                              e23f69fbe16c99c0309526f100775a88513dbebc5481b43498a3411553a1c47eb39c79eceee4bf1e264356c8906672c316fb8a6c42fcfedb9473df775bca898d

                                            • C:\Users\Admin\AppData\Local\Temp\delays.tmp

                                              Filesize

                                              1023KB

                                              MD5

                                              6eb91bf5cd6610314b769a9290aac293

                                              SHA1

                                              508f1941dd699c85bafb015d973add048aa05800

                                              SHA256

                                              f0f3541f348fbc28a09d9f2cac0c03c971e2842e83fdcc2d2c2ff51492aa3cbe

                                              SHA512

                                              e4fe1af5ee420fa012b6fc702ffa499eb11bede93120fef72a0ecc9eb09597c24d9ea87581c44041c1206599f7c3c932af4dc450bdbd143c4eb67bcb6267fef9

                                            • memory/2136-41-0x0000000074E10000-0x00000000755C1000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/2136-49-0x0000000074E10000-0x00000000755C1000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/3000-131-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3000-130-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3708-22-0x00000000203E0000-0x000000002063F000-memory.dmp

                                              Filesize

                                              2.4MB

                                            • memory/3708-37-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3708-3-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3708-8-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3708-6-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3708-21-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3708-20-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3708-38-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3804-61-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3804-85-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3804-77-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/3804-63-0x0000000022790000-0x00000000229EF000-memory.dmp

                                              Filesize

                                              2.4MB

                                            • memory/3804-62-0x0000000000400000-0x0000000000676000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/4120-39-0x0000000074E10000-0x00000000755C1000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4120-0-0x0000000074E1E000-0x0000000074E1F000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4120-11-0x0000000074E10000-0x00000000755C1000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/4120-1-0x00000000002B0000-0x0000000000318000-memory.dmp

                                              Filesize

                                              416KB