Analysis
-
max time kernel
35s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
amoguuuuus/sрооf.exe
Resource
win10v2004-20240802-en
General
-
Target
amoguuuuus/sрооf.exe
-
Size
447KB
-
MD5
eba859aa8105b84ea4e9e7726d3aa96c
-
SHA1
2c6b45eba06308dfd0a17776c7a2ef71c9d55b06
-
SHA256
a18e38ddac5882867a012958d04eebbbe6249ffd7880ff7703f91e6b32c1737d
-
SHA512
d8f69f8027adfe40af15ba47654a27878c2428ee56f3e1b135c7bfdd38862290ece630d33b38b7c90f23d6f7856b3e183c647c0ac8190807973b8f0cded33d4c
-
SSDEEP
12288:AUMdX23s7N6pQOAmAPAxRIMQdGTdv8726yuvC3aAnZ:ZKZ6pQxmAPIudGT+wu6N
Malware Config
Extracted
vidar
8.3
eaf6a345ac330495ebc83200e0a7497d
https://steamcommunity.com/profiles/76561199651834633
https://t.me/raf6ik
-
profile_id_v2
eaf6a345ac330495ebc83200e0a7497d
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/4728-5-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/4728-9-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 behavioral1/memory/4728-11-0x0000000000400000-0x0000000000644000-memory.dmp family_vidar_v7 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5048 set thread context of 4728 5048 sрооf.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 2608 4728 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sрооf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5048 sрооf.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5048 wrote to memory of 4728 5048 sрооf.exe 84 PID 5048 wrote to memory of 4728 5048 sрооf.exe 84 PID 5048 wrote to memory of 4728 5048 sрооf.exe 84 PID 5048 wrote to memory of 4728 5048 sрооf.exe 84 PID 5048 wrote to memory of 4728 5048 sрооf.exe 84 PID 5048 wrote to memory of 4728 5048 sрооf.exe 84 PID 5048 wrote to memory of 4728 5048 sрооf.exe 84 PID 5048 wrote to memory of 4728 5048 sрооf.exe 84 PID 5048 wrote to memory of 4728 5048 sрооf.exe 84 PID 5048 wrote to memory of 4728 5048 sрооf.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\amoguuuuus\sрооf.exe"C:\Users\Admin\AppData\Local\Temp\amoguuuuus\sрооf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 9603⤵
- Program crash
PID:2608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4728 -ip 47281⤵PID:4756