Analysis
-
max time kernel
94s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe
Resource
win10v2004-20240802-en
General
-
Target
d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe
-
Size
5.4MB
-
MD5
36a83d96995c446168b609e1a78be2f2
-
SHA1
0287565d24362cb66310fd1828f113477faeda5b
-
SHA256
d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2
-
SHA512
7a8782e68ca89833d50b73709fccfca1e566566acbac1a6f520c848cdfebc88d3d926ae651a5883f631ccdc7cf8ef85deaad8d55403e0b11db5def14e42c51f9
-
SSDEEP
98304:VdrNiA8MrTLJfiEOgYjmTSoWWNBQR1KNEU2KxbMrUEAweMDa2AmJImWwu2EoF6:Hhj8MrTL3O5jmeoW920cTMDanmamWU6
Malware Config
Extracted
vidar
11
851a571734f99bc6b99c23ec833c0bb8
https://t.me/jamsemlg
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
https://reinforcenh.shop/api
https://stogeneratmns.shop/api
https://fragnantbui.shop/api
https://drawzhotdog.shop/api
https://vozmeatillu.shop/api
https://offensivedzvju.shop/api
https://ghostreedmnu.shop/api
https://gutterydhowi.shop/api
Extracted
vidar
11
c8450254a9a0920212cb81ae7f386da3
https://t.me/jamsemlg
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 18 IoCs
resource yara_rule behavioral2/memory/844-3-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-6-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-8-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-27-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-28-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-55-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-56-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-72-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-73-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-90-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/844-91-0x0000000000400000-0x0000000000B77000-memory.dmp family_vidar_v7 behavioral2/memory/2764-131-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2764-135-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2764-133-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2764-154-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2764-155-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2764-171-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2764-172-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 2 IoCs
pid Process 4948 KFHJJDHJEG.exe 3656 DHIJEHJDHJ.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3492 set thread context of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 4948 set thread context of 4252 4948 KFHJJDHJEG.exe 92 PID 3656 set thread context of 2764 3656 DHIJEHJDHJ.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KFHJJDHJEG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHIJEHJDHJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2604 timeout.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 844 RegAsm.exe 844 RegAsm.exe 844 RegAsm.exe 844 RegAsm.exe 844 RegAsm.exe 844 RegAsm.exe 844 RegAsm.exe 844 RegAsm.exe 2764 RegAsm.exe 2764 RegAsm.exe 2764 RegAsm.exe 2764 RegAsm.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 3492 wrote to memory of 844 3492 d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe 83 PID 844 wrote to memory of 4948 844 RegAsm.exe 89 PID 844 wrote to memory of 4948 844 RegAsm.exe 89 PID 844 wrote to memory of 4948 844 RegAsm.exe 89 PID 4948 wrote to memory of 4252 4948 KFHJJDHJEG.exe 92 PID 4948 wrote to memory of 4252 4948 KFHJJDHJEG.exe 92 PID 4948 wrote to memory of 4252 4948 KFHJJDHJEG.exe 92 PID 4948 wrote to memory of 4252 4948 KFHJJDHJEG.exe 92 PID 4948 wrote to memory of 4252 4948 KFHJJDHJEG.exe 92 PID 4948 wrote to memory of 4252 4948 KFHJJDHJEG.exe 92 PID 4948 wrote to memory of 4252 4948 KFHJJDHJEG.exe 92 PID 4948 wrote to memory of 4252 4948 KFHJJDHJEG.exe 92 PID 4948 wrote to memory of 4252 4948 KFHJJDHJEG.exe 92 PID 844 wrote to memory of 3656 844 RegAsm.exe 93 PID 844 wrote to memory of 3656 844 RegAsm.exe 93 PID 844 wrote to memory of 3656 844 RegAsm.exe 93 PID 3656 wrote to memory of 1800 3656 DHIJEHJDHJ.exe 95 PID 3656 wrote to memory of 1800 3656 DHIJEHJDHJ.exe 95 PID 3656 wrote to memory of 1800 3656 DHIJEHJDHJ.exe 95 PID 3656 wrote to memory of 4188 3656 DHIJEHJDHJ.exe 96 PID 3656 wrote to memory of 4188 3656 DHIJEHJDHJ.exe 96 PID 3656 wrote to memory of 4188 3656 DHIJEHJDHJ.exe 96 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 3656 wrote to memory of 2764 3656 DHIJEHJDHJ.exe 97 PID 844 wrote to memory of 1464 844 RegAsm.exe 100 PID 844 wrote to memory of 1464 844 RegAsm.exe 100 PID 844 wrote to memory of 1464 844 RegAsm.exe 100 PID 1464 wrote to memory of 2604 1464 cmd.exe 102 PID 1464 wrote to memory of 2604 1464 cmd.exe 102 PID 1464 wrote to memory of 2604 1464 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe"C:\Users\Admin\AppData\Local\Temp\d3dc76e29c6672e790121e3b7acf66eeacefe184e2fc75ad3f2be6e29478e0f2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:844 -
C:\ProgramData\KFHJJDHJEG.exe"C:\ProgramData\KFHJJDHJEG.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4252
-
-
-
C:\ProgramData\DHIJEHJDHJ.exe"C:\ProgramData\DHIJEHJDHJ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4188
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\ECAEGHIJEHJD" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2604
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
404KB
MD507beff810640c60bf60464f5e1efb5b0
SHA12af2ee421ae26a98f9775bfe46821ffb47b406d3
SHA2562161f38eb7e940f7dadbf1cff93e3219846ad9dd1d181aceadddd9b1f549bf70
SHA5121ed5082b2652d1253c13803c3607afe4befa564c03f1203a6ad157f0187482382d7a1438e34a95667495c89a6ebe020d838fe61ec7f697de865fc55a3b031fa5
-
Filesize
371KB
MD5052eafad306073dc67e384f1f371c415
SHA127b45865e79e48634533d3971ddf2a0164c4f3bb
SHA2569136c32467cd79e8fdb7ea154540093c005c6cf636bc52d7af6caf170a1a828b
SHA512ad82848aca1d1c7af997c35ebd7fa6a04d01b8d09ab89f6ebeb41fd3c1b147507d6a110602fa3b6a6087b3d1ccf30d9e81f2b76af431da28dc81f4b3c6bd032d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE
Filesize2KB
MD5f278136b3e1ef36d16735cf0aa8f849f
SHA1894515b3c0a64908fb5dbbbba0ea0aa134156fbb
SHA2564a1c2cef0084a069feaad563975dcc2e2ec7c4b169aac35c96672b4db4a46818
SHA512a2da95a042ffbdca3caadf9f0e194e5e41a865fb2dda024db25853a9b27499d8b515ef390ab4a91e7249b4343635953b21376efcc54a12aced47ade77f6f4a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize2KB
MD51370fd6a4edeee6cbe1c427d9edf0f2f
SHA1f7446fabeacd1f07655baf58e854d26a4bda44c0
SHA25680ee5ca49c18f2b29d62d079aee6cac6eab60158f62e82bb77d962882ae524d3
SHA51270e94f3d78e20c1f221e62e9d173c9f7816999cf166acd6a5ca7145c0d92641869bef698dffec68721c71dcf30a43a925efe5f6a2ce8f4d63664a083854a9ba5
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize1KB
MD5d94d8c5b1b40de2212329a6d293f6055
SHA154078cc1ef07b695ab67e5b58dcc5438f7c9ac14
SHA256a7590cbe26aa78658d285be4ca06d9a3467abbc272a0f5a0d6b9508b216c92c1
SHA5123094c5805b51296bbb7a9efe30936148148a17ded72101f323c8a4b895be67db319358cc5777cb1afc49c4d08a0ec0d994137e7188f59d0a2d93f41d6893f422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE
Filesize458B
MD5b8e449114f2e606c2c4b5617950c807d
SHA1972808ea84cc1813961f453d857d2f6fd76bef32
SHA256f4309a51fa2e1d93a2f58bad424efb383a236f6134a8d77f4a6bca5cc46bb777
SHA512040f8ce3a865951b992ed08344b1f5651aa534bfe862d47f03891ede2776d1a1454634f162d7048d5814f71be6c67965fa064fab72ba1c0e7622eefaf6b9c3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD5e7cb4cda77fefe9d07e3545449521f3b
SHA17e735a2846a50912f9dac2c93717ea910a766b21
SHA256d7507ef5ca9eef49189460b1121628f546f7228d961238130691315eb51117f9
SHA512222ca2ed88f5bb6583c504f68d1a94a277a8e004757b14fb41b9e0dc2ff01a5af469f3f11983a6d0a2cfc4cf19df9da8c43bbcd3c46cb22a29fdd65903e47b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5a40fedafe5a8f6501e77e0e6a04516d8
SHA1679d9c4d322e3a6724c6a2c7e4eda9b25991da05
SHA256b8528fe204d1182b77ba433b3ccaa58e516c365a65a4733d3737f8f8c2617d35
SHA51241cad2d6740f642f4c4b3dd193184ce8f9c73769e4a952bdd361b17f6ac76a2e7e21f963b8eeb8781aa6526b9c7772dded6aa68757e5dd57c3ec281958e46a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5488a9e592fe3d08d734034720b860754
SHA1cfff1529a8c83239102d032907882cb9047c1298
SHA256e98677a40a8a4e441d393d6e7f5c5dac1c50e9fc0c702763583c943922e5d5e1
SHA512a01f204e4120676597ec709eb5d66a64013d64aadea01594e203245c594fd2632fea1d5af9bbd6d73852c88493012ad35df10ddf9480fa480a30d620328ff67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize458B
MD56243a0b9cce972904712db5dd5cab79a
SHA1c1c91405df9573c7d1d8c46adf4d8b47363da33e
SHA256d66c03571b2fa34963f2844985248715ddb99766c93d60f448a8a7541ba64a4d
SHA512973602f4c0f25c5549fc7dcd53f7f1127b4364287c07368357f866902cdcdf885b5d423020c588777b59c5f18b3a7e7354615e958ae8c09fcf8622843d9a5f79