Analysis
-
max time kernel
202s -
max time network
508s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-10-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
Unlock_Tool.zip
Resource
win11-20240802-en
General
-
Target
Unlock_Tool.zip
-
Size
43.6MB
-
MD5
0a8d7bae2ecf1feda2e708843addc017
-
SHA1
6c051d228351ea9e94e05f08f40e3ef13bb291c7
-
SHA256
4dc1b446e571a032fd85293306f4142b29fdde874d29dd1cb29e278e75261347
-
SHA512
9fb70dc761492973ae0a6ef6420f199fd68f78d09f4484a9899cc5a2a1f2173e3a4e6f05f0ef86f42035b5a9bd7884aef00d4194564081ac1c9913cf6b3e588b
-
SSDEEP
786432:ewwzTXNNsEjvepzt/EBIgSG/RZhz7nIK7SdwtctWZ1VwEb/wzkXRr2jkzTE:+swUzt/KSGfxDuGiI/HkQzTE
Malware Config
Extracted
vidar
11
962abdb0b49579401d25d63a1f697be6
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 18 IoCs
resource yara_rule behavioral1/memory/4312-642-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-643-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-652-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-653-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-668-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-669-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-685-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-686-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-710-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-711-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-722-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-723-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-724-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4312-725-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/3332-736-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/3332-737-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/3332-752-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/3332-753-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 832 Unlock_Tool_1.9.exe 3436 Unlock_Tool_1.9.exe -
Loads dropped DLL 2 IoCs
pid Process 4312 MSBuild.exe 4312 MSBuild.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 832 set thread context of 4312 832 Unlock_Tool_1.9.exe 92 PID 3436 set thread context of 3332 3436 Unlock_Tool_1.9.exe 98 -
Program crash 2 IoCs
pid pid_target Process procid_target 4248 832 WerFault.exe 91 4544 3436 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlock_Tool_1.9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlock_Tool_1.9.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 852 timeout.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zG.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zG.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4312 MSBuild.exe 4312 MSBuild.exe 4312 MSBuild.exe 4312 MSBuild.exe 4312 MSBuild.exe 4312 MSBuild.exe 4312 MSBuild.exe 4312 MSBuild.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 660 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeRestorePrivilege 660 7zFM.exe Token: 35 660 7zFM.exe Token: SeRestorePrivilege 2228 7zG.exe Token: 35 2228 7zG.exe Token: SeSecurityPrivilege 2228 7zG.exe Token: SeSecurityPrivilege 2228 7zG.exe Token: SeRestorePrivilege 480 7zG.exe Token: 35 480 7zG.exe Token: SeSecurityPrivilege 480 7zG.exe Token: SeSecurityPrivilege 480 7zG.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2228 7zG.exe 480 7zG.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2776 OpenWith.exe 2776 OpenWith.exe 2776 OpenWith.exe 4524 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 660 wrote to memory of 2228 660 7zFM.exe 83 PID 660 wrote to memory of 2228 660 7zFM.exe 83 PID 660 wrote to memory of 480 660 7zFM.exe 87 PID 660 wrote to memory of 480 660 7zFM.exe 87 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 832 wrote to memory of 4312 832 Unlock_Tool_1.9.exe 92 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98 PID 3436 wrote to memory of 3332 3436 Unlock_Tool_1.9.exe 98
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Unlock_Tool.zip1⤵PID:3612
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Unlock_Tool\" -ad -an -ai#7zMap6673:102:7zEvent315652⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2228
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\" -ad -an -ai#7zMap31993:112:7zEvent309832⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:480
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2424
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2776
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4524
-
C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\Unlock_Tool_1.9.exe"C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\Unlock_Tool_1.9.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGIJEBGDAFHI" & exit3⤵PID:3392
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:852
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 2482⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 832 -ip 8321⤵PID:5104
-
C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\Unlock_Tool_1.9.exe"C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\Unlock_Tool_1.9.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:3332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 2322⤵
- Program crash
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3436 -ip 34361⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD50b6ac06c568d0a743dcf20ad3d86a9b5
SHA12eda48e503cc99c4d203f082c2a01681d5bebab7
SHA2564161338d23c80d33e4c78af8a50a990e30e7bd8d983c3a7c6a8e4a8724ab9a8e
SHA5127967aa9aea2de28508dfaae76bc5c4d4c9b28df183107d8c2910eb4d5d68227db6ef9fe98b313004114358334758f91d48604f52970ffd6d747c125563e88d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5269e78e6d05f770a517f5d9530c91d3b
SHA1feddff55157db4dffc9147d1c8f96c40caad4d65
SHA256baf312ced36c769a004c8ddf331fdcfefa931201c00e3e43a07fa9d1ff62bc7b
SHA512a7837bf038c2a5101196ac7fddc8a3f0ad1cd9f7ffd2566953bc4812c29275b565c2d72fd51cfbc23e21ee6ad39a8c60304c36728db9207196236dadbac0ac9d
-
Filesize
34KB
MD5038675332c506223d09e2250dfd2a2b9
SHA15b2157a945183ecdf4dfaae1edd1119f8ffc5bdb
SHA256c2f47c0dd44b523b3afc2911f51d1f5214244e68a44da3b9740ff6c62ea17169
SHA5128c1f287c7307a0a37ab60866b5b0acff6eaf596b5ef840c0197ddf4f09500e89ae589398a37c0040f15fff7741a7f047a27e6c4f92f1ebad3f27aae715961f4d
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD506f54da138064bcb87a50ea5796be0bc
SHA1149614dcc0cc8a15d12e042639d53d364b692f5a
SHA256fd00cc98658581a6d166ce94e14f68079c4a2948db69e5ac60755ac8c50c1f50
SHA512530073a003f19a93945cc2d663cd395744c98b3d8377ed6fbc237be0b42b7ec23544fe149435e3d5d47b8d385c2a9bd1e2605222bbe2df0d3233edf10550202d
-
Filesize
95B
MD5f246bf2465b177d492506954be377c3f
SHA16feaf291a50c33203d6e98356d47758158bbaa1f
SHA2565cb592843421ba6fda5fd5cc143b214b94d402c2d23a025dfb872e98a755278b
SHA5123eed854638582c981ce746a5b68d7f81d2faee38942811486ca5bb228d649bef6c0fdb9d1524c3495d62748b13d17e652d82587282bb5be069bc5ac899851214
-
Filesize
43.6MB
MD57efb8d6b9be4af3ca11fba092b827547
SHA1b24402fb7b75bb49e59d252347a9ea56a58b1fbc
SHA25663d0fbd84782af66e526fc913fe30444d9ae62cc3c0e6a47b6abab952cfadbf0
SHA5126b4b5458a5d7aa8e155a13913c2827189820ef6b12760795aff465e9e3414f45599b659df92240612332efdd0d4c93ed2e4eda7e533f34bd7b12580fa55031cc
-
Filesize
569KB
MD5f8cb4da82ec4542402924057ee21760a
SHA184df82df3e30c1c5d8b98e06d4b266525b7b5b73
SHA256f3f89f0de3d1da4f12c1a0abd75dc4db85dcd395e1f1b32c4d9174aa6dbc0130
SHA512a8eddd1e217371f47ba20efdcb025967fad3a626a568a4db940d38f93e939e762209241837f82ea34f0c0d27e4aeaf542d4fa7c8ab04718e4413c7183392b23f
-
Filesize
128KB
MD564d183ad524dfcd10a7c816fbca3333d
SHA15a180d5c1f42a0deaf475b7390755b3c0ecc951c
SHA2565a666340f42f0f985772024d90a83d15c9a241a68d58205cd4afbb1a31f1621a
SHA5123cab59dff09981f49d1070fba06a781439bb1ea2dae0cfcb937d9875bbe9e866be2c951cfc6a3ca4a92aea79dd3e9c4792a765f5a06f230a57dabcab2f0b3c1e