Analysis

  • max time kernel
    202s
  • max time network
    508s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05-10-2024 18:11

General

  • Target

    Unlock_Tool.zip

  • Size

    43.6MB

  • MD5

    0a8d7bae2ecf1feda2e708843addc017

  • SHA1

    6c051d228351ea9e94e05f08f40e3ef13bb291c7

  • SHA256

    4dc1b446e571a032fd85293306f4142b29fdde874d29dd1cb29e278e75261347

  • SHA512

    9fb70dc761492973ae0a6ef6420f199fd68f78d09f4484a9899cc5a2a1f2173e3a4e6f05f0ef86f42035b5a9bd7884aef00d4194564081ac1c9913cf6b3e588b

  • SSDEEP

    786432:ewwzTXNNsEjvepzt/EBIgSG/RZhz7nIK7SdwtctWZ1VwEb/wzkXRr2jkzTE:+swUzt/KSGfxDuGiI/HkQzTE

Malware Config

Extracted

Family

vidar

Version

11

Botnet

962abdb0b49579401d25d63a1f697be6

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Signatures

  • Detect Vidar Stealer 18 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Unlock_Tool.zip
    1⤵
      PID:3612
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:660
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Unlock_Tool\" -ad -an -ai#7zMap6673:102:7zEvent31565
        2⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2228
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\" -ad -an -ai#7zMap31993:112:7zEvent30983
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:480
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2424
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2776
      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4524
      • C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\Unlock_Tool_1.9.exe
        "C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\Unlock_Tool_1.9.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:4312
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGIJEBGDAFHI" & exit
            3⤵
              PID:3392
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                4⤵
                • Delays execution with timeout.exe
                PID:852
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 248
            2⤵
            • Program crash
            PID:4248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 832 -ip 832
          1⤵
            PID:5104
          • C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\Unlock_Tool_1.9.exe
            "C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\Unlock_Tool_1.9.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3436
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              2⤵
                PID:3332
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 232
                2⤵
                • Program crash
                PID:4544
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3436 -ip 3436
              1⤵
                PID:3876

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\IDAEBGCAAECA\CAAAFC

                Filesize

                160KB

                MD5

                f310cf1ff562ae14449e0167a3e1fe46

                SHA1

                85c58afa9049467031c6c2b17f5c12ca73bb2788

                SHA256

                e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                SHA512

                1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

              • C:\ProgramData\mozglue.dll

                Filesize

                593KB

                MD5

                c8fd9be83bc728cc04beffafc2907fe9

                SHA1

                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                SHA256

                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                SHA512

                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

              • C:\ProgramData\nss3.dll

                Filesize

                2.0MB

                MD5

                1cc453cdf74f31e4d913ff9c10acdde2

                SHA1

                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                SHA256

                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                SHA512

                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                Filesize

                471B

                MD5

                0b6ac06c568d0a743dcf20ad3d86a9b5

                SHA1

                2eda48e503cc99c4d203f082c2a01681d5bebab7

                SHA256

                4161338d23c80d33e4c78af8a50a990e30e7bd8d983c3a7c6a8e4a8724ab9a8e

                SHA512

                7967aa9aea2de28508dfaae76bc5c4d4c9b28df183107d8c2910eb4d5d68227db6ef9fe98b313004114358334758f91d48604f52970ffd6d747c125563e88d64

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                Filesize

                400B

                MD5

                269e78e6d05f770a517f5d9530c91d3b

                SHA1

                feddff55157db4dffc9147d1c8f96c40caad4d65

                SHA256

                baf312ced36c769a004c8ddf331fdcfefa931201c00e3e43a07fa9d1ff62bc7b

                SHA512

                a7837bf038c2a5101196ac7fddc8a3f0ad1cd9f7ffd2566953bc4812c29275b565c2d72fd51cfbc23e21ee6ad39a8c60304c36728db9207196236dadbac0ac9d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZUGKZQQH\76561199780418869[1].htm

                Filesize

                34KB

                MD5

                038675332c506223d09e2250dfd2a2b9

                SHA1

                5b2157a945183ecdf4dfaae1edd1119f8ffc5bdb

                SHA256

                c2f47c0dd44b523b3afc2911f51d1f5214244e68a44da3b9740ff6c62ea17169

                SHA512

                8c1f287c7307a0a37ab60866b5b0acff6eaf596b5ef840c0197ddf4f09500e89ae589398a37c0040f15fff7741a7f047a27e6c4f92f1ebad3f27aae715961f4d

              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                Filesize

                10KB

                MD5

                06f54da138064bcb87a50ea5796be0bc

                SHA1

                149614dcc0cc8a15d12e042639d53d364b692f5a

                SHA256

                fd00cc98658581a6d166ce94e14f68079c4a2948db69e5ac60755ac8c50c1f50

                SHA512

                530073a003f19a93945cc2d663cd395744c98b3d8377ed6fbc237be0b42b7ec23544fe149435e3d5d47b8d385c2a9bd1e2605222bbe2df0d3233edf10550202d

              • C:\Users\Admin\Desktop\Unlock_Tool\Password.txt

                Filesize

                95B

                MD5

                f246bf2465b177d492506954be377c3f

                SHA1

                6feaf291a50c33203d6e98356d47758158bbaa1f

                SHA256

                5cb592843421ba6fda5fd5cc143b214b94d402c2d23a025dfb872e98a755278b

                SHA512

                3eed854638582c981ce746a5b68d7f81d2faee38942811486ca5bb228d649bef6c0fdb9d1524c3495d62748b13d17e652d82587282bb5be069bc5ac899851214

              • C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9.rar

                Filesize

                43.6MB

                MD5

                7efb8d6b9be4af3ca11fba092b827547

                SHA1

                b24402fb7b75bb49e59d252347a9ea56a58b1fbc

                SHA256

                63d0fbd84782af66e526fc913fe30444d9ae62cc3c0e6a47b6abab952cfadbf0

                SHA512

                6b4b5458a5d7aa8e155a13913c2827189820ef6b12760795aff465e9e3414f45599b659df92240612332efdd0d4c93ed2e4eda7e533f34bd7b12580fa55031cc

              • C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\Unlock_Tool_1.9.exe

                Filesize

                569KB

                MD5

                f8cb4da82ec4542402924057ee21760a

                SHA1

                84df82df3e30c1c5d8b98e06d4b266525b7b5b73

                SHA256

                f3f89f0de3d1da4f12c1a0abd75dc4db85dcd395e1f1b32c4d9174aa6dbc0130

                SHA512

                a8eddd1e217371f47ba20efdcb025967fad3a626a568a4db940d38f93e939e762209241837f82ea34f0c0d27e4aeaf542d4fa7c8ab04718e4413c7183392b23f

              • C:\Users\Admin\Desktop\Unlock_Tool\Unlock_Tool_1.9\locales\resources\Data\level4.resS

                Filesize

                128KB

                MD5

                64d183ad524dfcd10a7c816fbca3333d

                SHA1

                5a180d5c1f42a0deaf475b7390755b3c0ecc951c

                SHA256

                5a666340f42f0f985772024d90a83d15c9a241a68d58205cd4afbb1a31f1621a

                SHA512

                3cab59dff09981f49d1070fba06a781439bb1ea2dae0cfcb937d9875bbe9e866be2c951cfc6a3ca4a92aea79dd3e9c4792a765f5a06f230a57dabcab2f0b3c1e

              • memory/3332-753-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/3332-736-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/3332-737-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/3332-738-0x0000000022940000-0x0000000022B9F000-memory.dmp

                Filesize

                2.4MB

              • memory/3332-752-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-653-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-711-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-722-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-723-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-724-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-725-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-710-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-686-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-685-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-669-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-668-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-654-0x0000000024DD0000-0x000000002502F000-memory.dmp

                Filesize

                2.4MB

              • memory/4312-652-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-643-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB

              • memory/4312-642-0x0000000000400000-0x0000000000675000-memory.dmp

                Filesize

                2.5MB