Analysis
-
max time kernel
47s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
HSRMinty/sрооf.exe
Resource
win10v2004-20240910-en
General
-
Target
HSRMinty/sрооf.exe
-
Size
447KB
-
MD5
eba859aa8105b84ea4e9e7726d3aa96c
-
SHA1
2c6b45eba06308dfd0a17776c7a2ef71c9d55b06
-
SHA256
a18e38ddac5882867a012958d04eebbbe6249ffd7880ff7703f91e6b32c1737d
-
SHA512
d8f69f8027adfe40af15ba47654a27878c2428ee56f3e1b135c7bfdd38862290ece630d33b38b7c90f23d6f7856b3e183c647c0ac8190807973b8f0cded33d4c
-
SSDEEP
12288:AUMdX23s7N6pQOAmAPAxRIMQdGTdv8726yuvC3aAnZ:ZKZ6pQxmAPIudGT+wu6N
Malware Config
Extracted
vidar
8.3
eaf6a345ac330495ebc83200e0a7497d
https://steamcommunity.com/profiles/76561199651834633
https://t.me/raf6ik
-
profile_id_v2
eaf6a345ac330495ebc83200e0a7497d
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/4256-5-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/4256-12-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/4256-10-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4736 set thread context of 4256 4736 sрооf.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 2116 4256 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sрооf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4736 sрооf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4736 wrote to memory of 4896 4736 sрооf.exe 86 PID 4736 wrote to memory of 4896 4736 sрооf.exe 86 PID 4736 wrote to memory of 4896 4736 sрооf.exe 86 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87 PID 4736 wrote to memory of 4256 4736 sрооf.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\HSRMinty\sрооf.exe"C:\Users\Admin\AppData\Local\Temp\HSRMinty\sрооf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 18843⤵
- Program crash
PID:2116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4256 -ip 42561⤵PID:2396