Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/10/2024, 13:31

General

  • Target

    66fe13d56fd43_EdgeOUpdater.exe

  • Size

    26KB

  • MD5

    cdb17e17bc4e4d51fde6a4620cec014c

  • SHA1

    c184c6c58a66555685be713dcd2d11e6f0af7c37

  • SHA256

    b10c9d5286c17c05f587660664ab7f5723817fc98343c02c6b91ccc562e1019f

  • SHA512

    acde9cf8b3ee05efe99f5bd1e096e2016f0f6f7fc196f89f6a9592480ee0afe134d4ebdb2a5c6c8782290c5da31b07f9e58cc1722a9fe4bf70d9ca05e1b2417a

  • SSDEEP

    384:HvVTF7OeRFOJPxyhd/jP+ZhxZL8fDPE5I0+TkFBUM9ekamBrqEjDD2DUj7+uWZFj:H95FOJPxQWV2/k7Uuhq4/+uWz

Malware Config

Extracted

Family

vidar

C2

http://proxy.johnmccrea.com/

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Drops startup file 64 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66fe13d56fd43_EdgeOUpdater.exe
    "C:\Users\Admin\AppData\Local\Temp\66fe13d56fd43_EdgeOUpdater.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\LKMService.exe
      "C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:512
      • C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
        "C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" --checker
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3968
      • C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\c86d3b2355674b36886dcbb5d6b481f6.exe
        "C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\c86d3b2355674b36886dcbb5d6b481f6.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3832
          • C:\Users\Admin\Documents\iofolko5\JRhNrW3G6RE9VCsdraEcF3ls.exe
            C:\Users\Admin\Documents\iofolko5\JRhNrW3G6RE9VCsdraEcF3ls.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2952
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              6⤵
                PID:3192
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                6⤵
                  PID:3176
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  6⤵
                    PID:1832
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    6⤵
                      PID:5064
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Checks processor information in registry
                      PID:1456
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 276
                      6⤵
                      • Program crash
                      PID:1576
                  • C:\Users\Admin\Documents\iofolko5\2q3g7Z3He8F_YSmixVOmslma.exe
                    C:\Users\Admin\Documents\iofolko5\2q3g7Z3He8F_YSmixVOmslma.exe
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3720
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Checks processor information in registry
                      PID:4264
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 1128
                        7⤵
                        • Program crash
                        PID:3236
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 244
                      6⤵
                      • Program crash
                      PID:1840
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 244
                  4⤵
                  • Program crash
                  PID:4892

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\LKMService.exe

            Filesize

            26KB

            MD5

            cdb17e17bc4e4d51fde6a4620cec014c

            SHA1

            c184c6c58a66555685be713dcd2d11e6f0af7c37

            SHA256

            b10c9d5286c17c05f587660664ab7f5723817fc98343c02c6b91ccc562e1019f

            SHA512

            acde9cf8b3ee05efe99f5bd1e096e2016f0f6f7fc196f89f6a9592480ee0afe134d4ebdb2a5c6c8782290c5da31b07f9e58cc1722a9fe4bf70d9ca05e1b2417a

          • C:\Users\Admin\AppData\Local\Temp\EdgeUpdater\c86d3b2355674b36886dcbb5d6b481f6.exe

            Filesize

            2.0MB

            MD5

            06fba6c386d7f07e237e6a6a498a8bc2

            SHA1

            4b066789f5c7746ef15a79f1449ec90a54252051

            SHA256

            59231c487319c53dfb105e6d4c54fb1dec8e5094e7525921e5a4ebd72d19eaf5

            SHA512

            c0bd8db4bad2b1f6d876af994690f292567f797c95268a97fdddf221388ae0e577dbb730734eab8005679fa568673e38a21c8495909114d5785f2b1138ca6e49

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0642a5478c514c15a484cd342f81dc99.lnk

            Filesize

            1KB

            MD5

            14eddb5023474911f7799b04d08a4d98

            SHA1

            7bf3be6145525ce49ccfa73c0f6c2a64edcfdb9e

            SHA256

            576284aeb9bf1bc1b100157b1092dd944adcacbeaad69a326ad42e0e88df30b7

            SHA512

            f4e0746c20ffd000495907f1aa872136d7164aed73820bf4fd581c7b8e73bacbf36f321e52982c94a184cef45c9eadab7223db971ffb4736d8f8cc33e2849fab

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_311e17b439804fbea104017e2050ab56.lnk

            Filesize

            1KB

            MD5

            44be8098e5450f70b86b333d16063aa4

            SHA1

            8b3fd2446276e112cf59e6b2804f6ec88561c792

            SHA256

            d991e062e9060d70b6235de187243c26c94e1d0b4c535d65c5f6341c4cd778ba

            SHA512

            5e9f4a963e22c1892fcddd9af32c7859791354c71315cd7c16f9dff5db1959c82319127ae9ba915f811f0188b21af4eb46702e730ccca7930082aebe24cdf788

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a1886a28f18b4814a3c2d8f18c2e073c.lnk

            Filesize

            1KB

            MD5

            7b71cef3add81b6cc851b3b66d7b281a

            SHA1

            77705014753fbcc95bddf0b0c5d8a1501db51e30

            SHA256

            6835eb358bacc75a2643d6031b37357f2d9f53ad197fc9e88f05d1a5b80e9b84

            SHA512

            04f3d3211e3222300d0c389682468aeb2a41014809ad0c6c9ce44007deb1d12e19eb447b99e7dc2ab0274b26a19d1b51e83ff793ec80829edfee72b1a150e92f

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c8e8f7a024734c6cafdbd33c7b4fa85a.lnk

            Filesize

            1KB

            MD5

            af98e26779210d7cb917f44b1b3e2dad

            SHA1

            449e487ee4a96b759720d3f9b0409a3c54596fd2

            SHA256

            c85a11762f88141dc1b13b8b6aac13b9b6daecaf82c86779d89f12d29962179c

            SHA512

            ec8f508300644b7ed57199e4dd5ae70e128c619dd8b970bd10ad846ca529e0aa9a9478a34eb775e7eae06847298a91b3ff115edd5d1bbf40edfba188e9439c1c

          • C:\Users\Admin\Documents\iofolko5\2q3g7Z3He8F_YSmixVOmslma.exe

            Filesize

            503KB

            MD5

            e56fabec4d4e56972f896e326b206e7a

            SHA1

            31b56104ea4446cc6348931f82f094800df0c720

            SHA256

            20175d2f268bff73e352a5a5b85d987b8a5958311b1032251f7341def5396f4b

            SHA512

            97b59a2f293f16af5c80c2c689c7eca42908faec51b69914597f5e90fdb3b420f6d2ba72ac01ba39a8c5822fcf36f2b509bf0a14328e11e61a969f4573c17390

          • C:\Users\Admin\Documents\iofolko5\JRhNrW3G6RE9VCsdraEcF3ls.exe

            Filesize

            580KB

            MD5

            dd44827a4ff7c9f0d3b4d94b8151144e

            SHA1

            6dacc2fcec01a0f34d27619c4cade3c25f3a6d52

            SHA256

            b830fb5d195f47d080d73af41060f8be9049d20d26453ca00107367ce2fd1d9a

            SHA512

            ade978c03223b23dba01c9119a17838d38d078270421857557ec9947f0e9fcc557bbc55253cb2f36ec47fbd4013301b1d40f1e51a9b0bb5ccda34ecf5c282dc3

          • memory/512-53-0x00000000731E0000-0x00000000738CE000-memory.dmp

            Filesize

            6.9MB

          • memory/512-14-0x00000000731E0000-0x00000000738CE000-memory.dmp

            Filesize

            6.9MB

          • memory/512-17-0x00000000731E0000-0x00000000738CE000-memory.dmp

            Filesize

            6.9MB

          • memory/512-50-0x00000000731E0000-0x00000000738CE000-memory.dmp

            Filesize

            6.9MB

          • memory/1456-196-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/1456-206-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/1456-194-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/1456-220-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/1456-217-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/1456-210-0x000000001D3D0000-0x000000001D62F000-memory.dmp

            Filesize

            2.4MB

          • memory/1456-205-0x0000000000400000-0x0000000000676000-memory.dmp

            Filesize

            2.5MB

          • memory/3832-161-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/3832-162-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/3832-44-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/3832-45-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/3832-184-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/3832-188-0x0000000000400000-0x00000000005E0000-memory.dmp

            Filesize

            1.9MB

          • memory/4240-13-0x00000000731E0000-0x00000000738CE000-memory.dmp

            Filesize

            6.9MB

          • memory/4240-0-0x00000000731EE000-0x00000000731EF000-memory.dmp

            Filesize

            4KB

          • memory/4240-4-0x00000000731E0000-0x00000000738CE000-memory.dmp

            Filesize

            6.9MB

          • memory/4240-1-0x0000000000A90000-0x0000000000A9C000-memory.dmp

            Filesize

            48KB

          • memory/4264-191-0x0000000000400000-0x0000000000661000-memory.dmp

            Filesize

            2.4MB

          • memory/4264-192-0x0000000000400000-0x0000000000661000-memory.dmp

            Filesize

            2.4MB