Analysis

  • max time kernel
    95s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 20:33

General

  • Target

    3024-101-0x0000000000400000-0x0000000000676000-memory.exe

  • Size

    2.5MB

  • MD5

    abf76e2c021166e68a37a89b989cb32e

  • SHA1

    d53d0c98675a3b21c0218edc0b319c828577dfdd

  • SHA256

    8dfad05271f8f8fee275ee9be8ef6e1c51f20a23c47d162953a97f4ca3053c32

  • SHA512

    072373b327a8dbf45574ef78a4c514f771cc47cbf7e25c46f8affb9a6e486563d6311d805e73725e88767111c2d889dbcb14159597dae7160bd87595543e1188

  • SSDEEP

    6144:5lqPvKpKJNJGyRlyw8aSp0Vbux0R4kF/Y/o8+:5mRJNMalyLaO0Ix6BY/s

Malware Config

Extracted

Family

vidar

Version

11

Botnet

8b4d47586874b08947203f03e4db3962

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3024-101-0x0000000000400000-0x0000000000676000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\3024-101-0x0000000000400000-0x0000000000676000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2084
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 216
      2⤵
      • Program crash
      PID:712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2084 -ip 2084
    1⤵
      PID:1740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2084-0-0x0000000000400000-0x0000000000676000-memory.dmp

      Filesize

      2.5MB