Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
550KB
-
MD5
f1214cfabdff698a3d7d49daec1254c1
-
SHA1
8ac4c3c3eff05b6db38c26a16d1c69eb913d7194
-
SHA256
2877045b8070e96a89be7013bf36481f9abccb8fb7f527766a704e781882a5a9
-
SHA512
0486a8eb34dade29f3d2c568c7b4751fd86ad05a980c3fc20792336d8511ca8505f79819894758d6096177176cd6b42d3a461f075d8bf97856dea9e3c20fbd02
-
SSDEEP
12288:yYQwqLWzDCQH2bJMHfmntiheky65t4Wz26xNe0H6P:gb3QHwM9hJy6wtqNm
Malware Config
Extracted
vidar
http://proxy.johnmccrea.com/
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral2/memory/4504-1-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4504-3-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4504-7-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4504-8-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4504-25-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4504-26-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2664 set thread context of 4504 2664 file.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 3204 2664 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4504 MSBuild.exe 4504 MSBuild.exe 4504 MSBuild.exe 4504 MSBuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2664 wrote to memory of 4504 2664 file.exe 84 PID 2664 wrote to memory of 4504 2664 file.exe 84 PID 2664 wrote to memory of 4504 2664 file.exe 84 PID 2664 wrote to memory of 4504 2664 file.exe 84 PID 2664 wrote to memory of 4504 2664 file.exe 84 PID 2664 wrote to memory of 4504 2664 file.exe 84 PID 2664 wrote to memory of 4504 2664 file.exe 84 PID 2664 wrote to memory of 4504 2664 file.exe 84 PID 2664 wrote to memory of 4504 2664 file.exe 84 PID 2664 wrote to memory of 4504 2664 file.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 2522⤵
- Program crash
PID:3204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2664 -ip 26641⤵PID:4988