Analysis
-
max time kernel
93s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 23:47
Behavioral task
behavioral1
Sample
8d442c8da30d06eb4d55de0e891fe8214b1f7b5179de9e60348911c4ffdca2de.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d442c8da30d06eb4d55de0e891fe8214b1f7b5179de9e60348911c4ffdca2de.exe
Resource
win10v2004-20240802-en
General
-
Target
8d442c8da30d06eb4d55de0e891fe8214b1f7b5179de9e60348911c4ffdca2de.exe
-
Size
2.5MB
-
MD5
689dfa167c8b1d6887414b7179b4ca15
-
SHA1
a590849f8a5572b2fe6af9ed9bdbc9b727c1f860
-
SHA256
8d442c8da30d06eb4d55de0e891fe8214b1f7b5179de9e60348911c4ffdca2de
-
SHA512
ac5bef34dbde52329487d5afe911729c81f89077967662a937e6258cecf3d85a01397de5200f2380f0ba036f48bea2765f15df3c02b97aa881e547e38cb3b248
-
SSDEEP
6144:KKynBLh/DXvm55d7j8PbJ0XoJtmZSZBKkhzXgd:juDX+vd7wPF0XutVekhz6
Malware Config
Extracted
vidar
11
58cd250b15e666e5f72fcf5caa6cb131
Signatures
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral2/memory/3208-0-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Program crash 1 IoCs
pid pid_target Process procid_target 2536 3208 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d442c8da30d06eb4d55de0e891fe8214b1f7b5179de9e60348911c4ffdca2de.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d442c8da30d06eb4d55de0e891fe8214b1f7b5179de9e60348911c4ffdca2de.exe"C:\Users\Admin\AppData\Local\Temp\8d442c8da30d06eb4d55de0e891fe8214b1f7b5179de9e60348911c4ffdca2de.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 2162⤵
- Program crash
PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3208 -ip 32081⤵PID:3560