Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/09/2024, 15:48
240926-s8v9hsvgkn 1025/09/2024, 20:19
240925-y33djayfne 1025/09/2024, 20:16
240925-y2axwsyeqa 10Analysis
-
max time kernel
32s -
max time network
71s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/09/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
66f4247962974_vfdsgasd12.exe
Resource
win11-20240802-en
General
-
Target
66f4247962974_vfdsgasd12.exe
-
Size
403KB
-
MD5
8b0b12811b60a92a72b636a46fadb0ba
-
SHA1
0ab6b31b69b7964de2e9639169d036c68f9efd76
-
SHA256
1174cade1bd7b389c084b340898d4afd84e1145d9294d8a550f3a532f09cda7c
-
SHA512
abf908cb7505acd792aa1d9a346ec1b635f5c078ad2104b5d5a0678cc54e216a843fbacba25ebff6a7baed6a6463ee8fc433ff1c71178775366b7f4aade1227a
-
SSDEEP
12288:dHROWCWIpXQ6dvhXe+iGaXImXN18/7LV+z+0EO:ludvbwX4/7LV/0t
Malware Config
Extracted
vidar
11
9bf5e431869643a2ac397d2dc0d687fb
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 13 IoCs
resource yara_rule behavioral1/memory/3708-3-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3708-8-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3708-6-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3708-20-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3708-21-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3708-37-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3708-38-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3804-61-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3804-62-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3804-77-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3804-85-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3000-130-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3000-131-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4120 set thread context of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 2136 set thread context of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 4916 set thread context of 3420 4916 66f4247962974_vfdsgasd12.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66f4247962974_vfdsgasd12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66f4247962974_vfdsgasd12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66f4247962974_vfdsgasd12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3708 RegAsm.exe 3708 RegAsm.exe 3708 RegAsm.exe 3708 RegAsm.exe 3804 RegAsm.exe 3804 RegAsm.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 4120 wrote to memory of 3708 4120 66f4247962974_vfdsgasd12.exe 80 PID 2136 wrote to memory of 3024 2136 66f4247962974_vfdsgasd12.exe 88 PID 2136 wrote to memory of 3024 2136 66f4247962974_vfdsgasd12.exe 88 PID 2136 wrote to memory of 3024 2136 66f4247962974_vfdsgasd12.exe 88 PID 2136 wrote to memory of 2212 2136 66f4247962974_vfdsgasd12.exe 89 PID 2136 wrote to memory of 2212 2136 66f4247962974_vfdsgasd12.exe 89 PID 2136 wrote to memory of 2212 2136 66f4247962974_vfdsgasd12.exe 89 PID 2136 wrote to memory of 2752 2136 66f4247962974_vfdsgasd12.exe 90 PID 2136 wrote to memory of 2752 2136 66f4247962974_vfdsgasd12.exe 90 PID 2136 wrote to memory of 2752 2136 66f4247962974_vfdsgasd12.exe 90 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 2136 wrote to memory of 3804 2136 66f4247962974_vfdsgasd12.exe 91 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94 PID 4916 wrote to memory of 3420 4916 66f4247962974_vfdsgasd12.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵PID:32
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵PID:4328
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:728
-
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵PID:3180
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵PID:3112
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵PID:1140
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵PID:1992
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵PID:1920
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"C:\Users\Admin\AppData\Local\Temp\66f4247962974_vfdsgasd12.exe"1⤵PID:2616
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3272
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD57db6cef80eafac6e18a510ab209edfe2
SHA13ee98c48386788861bf1d99043e6836df4763308
SHA2564db72158cdd9735367a53c79b929d7e93d2778c970e883faa1b37f741ae01bed
SHA51278e958b8a7b712349471879d6449f6e9c165511942f71093259cd139f6709f08498bb664562552ba2aa3e218bc3f396f43f26360ca646f1999573772a5b63c2d
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD53d0514f5227d0ba8f91af3531108aa9e
SHA1e785caa409acb468d4cc46790320a54f1ff99db6
SHA256aac8c93892fef76efc9790da21d518ed553e974256217b4244b34d73bdd0f8ee
SHA5122990a16921b56e0e00ef40e01c6a5d8ab425475de36fad0228d5f9d31643e476de620f594063fd5a253b47219c10e0de1094aeeea215be00225c7cb79fbc3eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5c85f4bad474bd6d55c682c08512ee07b
SHA1c5ef60fd5912b85cd55ee60f0e76f577075308a8
SHA256d88ecb10ce1ff2c83c1785cf53b76fa1dbd37caffc835238113967dc2e524d7a
SHA51247bcbd88c237d09851e706fef4edbd5e4637f639bdc06c7af225d859ef75890aa62bd82f8144f78f8782a8096a36de4b509b27a55f3b913fac0877369c13738c
-
Filesize
425B
MD5bb27934be8860266d478c13f2d65f45e
SHA1a69a0e171864dcac9ade1b04fc0313e6b4024ccb
SHA25685ad0d9909461517acf2e24ff116ca350e9b7000b4eefb23aa3647423c9745b4
SHA51287dd77feac509a25b30c76c119752cc25020cca9c53276c2082aef2a8c75670ef67e1e70024a63d44ae442b64f4bc464aee6691e80c525376bb7421929cfa3bb
-
Filesize
33KB
MD5ca2de42323366d53df3b4b72dc5c5067
SHA1bdefecddb939749649cec35b33cc9043d67d2181
SHA25629038555176b01b059212eed383ab56bb1bb451cd63fa81be0c02a05fbb83919
SHA5125ff732548594811682fadc857c7e6c1058a2eae7586b7a9e66d82d5ad53e0cdcafe2cfb14b164eccbfa7eef4b33ede18f3f0f1c5cae0fd8a6ac8cb153c9c768d
-
Filesize
33KB
MD5f6196c8b3f01d1e4eba2d9a116237295
SHA16c364919737630a1343a5afda25419f863cd798e
SHA256ca6667bad28f93e6456cd3e02c22e64fefb117dfea93a345cb6a68d072534725
SHA512595cc8d5bf51202dfbefbf366e3502a8972a5f1e041f4376fa4193f1cf869aa4b312e6402bd6401b510d27de100864b91ad8b9858a72d27b83efdd87d30605e9
-
Filesize
33KB
MD50bc5e6d855eb12bc02f1a3fa1e2a29a9
SHA1f26cf382b40901a0315a33ea855303f6b52b436b
SHA256eb0d8ac75877bcf2624b96ea83714297f26b5800a28853566737643baeec5bca
SHA512d64a020f6521080a5e54b55eaa868e65cbb261967e9f8c323818539f33533b1ef7952d37ccab2e2b0b5e232bf78939b245073afb6d0fd4067204c8dd5740394e
-
Filesize
33KB
MD5b195c75701eb19949697cebe16ed8b9a
SHA172573b883201bb1f5e379bd111b04503fde48966
SHA256462466bad94ec849f13dccc53307485ec3a403d4946fd920badb8897fe106dfa
SHA512a7c6f61acb6fc620b1044721bb090c97446ba6520b84c44dc597855693d46cc5b924907c7e90412aeb8d37168efbaf8ae140f36664ed289e2af3073e5253da79
-
Filesize
33KB
MD5dc6e061cd70dab075cd75951339436e2
SHA1007deadc93fef686e2453db3518873a65680b311
SHA256a63c98a6450c933c172a39341fd6198b29ae90c157365332ffd1e2b904832ea7
SHA512e23f69fbe16c99c0309526f100775a88513dbebc5481b43498a3411553a1c47eb39c79eceee4bf1e264356c8906672c316fb8a6c42fcfedb9473df775bca898d
-
Filesize
1023KB
MD56eb91bf5cd6610314b769a9290aac293
SHA1508f1941dd699c85bafb015d973add048aa05800
SHA256f0f3541f348fbc28a09d9f2cac0c03c971e2842e83fdcc2d2c2ff51492aa3cbe
SHA512e4fe1af5ee420fa012b6fc702ffa499eb11bede93120fef72a0ecc9eb09597c24d9ea87581c44041c1206599f7c3c932af4dc450bdbd143c4eb67bcb6267fef9