Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2024 13:49

General

  • Target

    down.exe

  • Size

    1.3MB

  • MD5

    13476835b5465cf91e4dd7e60e110e56

  • SHA1

    38af4e6440237a3f0f7eb8378a9f82ea473fc9a4

  • SHA256

    e84f3f36aa22f8b7f7399ce57c68014ea23140e88755516db02b5e056d18dad6

  • SHA512

    90635bef1cfd86608c757270f45658b9aacf582afa249a58b046f533c00925851dc9e6cbd04cf54b7ae55965cc25dd94eac90a7b78b7a4a6da32ad5bbc74f74b

  • SSDEEP

    24576:CMF7WKYDIOMJRvFadXXUfTwrlWB4Zsasxb3+PcRmJDh/:evDIOMJG9kil7bsxZIJDh/

Malware Config

Extracted

Family

vidar

Version

11

Botnet

744fd163d6d4e0ac37e4032bcbfbb6af

C2

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Signatures

  • Detect Vidar Stealer 11 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\down.exe
        "C:\Users\Admin\AppData\Local\Temp\down.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move Devil Devil.bat & Devil.bat
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2908
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2620
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2836
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2852
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2784
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 285204
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2624
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "AugQualificationDepthWidth" Course
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2632
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Hb + ..\Rapid + ..\London + ..\Royal + ..\Charter + ..\Deck + ..\Pichunter + ..\Killing N
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2736
          • C:\Users\Admin\AppData\Local\Temp\285204\Kim.pif
            Kim.pif N
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1052
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JDAKJDAAFBKF" & exit
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1752
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                6⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:2856
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2924
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Practices" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DataWave Sphere Co\SyncWave.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Practices" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DataWave Sphere Co\SyncWave.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1264
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyncWave.url" & echo URL="C:\Users\Admin\AppData\Local\DataWave Sphere Co\SyncWave.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyncWave.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:2528

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\285204\N

      Filesize

      570KB

      MD5

      2fa0ad6b54cc96a82097293820a6c8f8

      SHA1

      cc691ac7cb82d6ef144c59b6ad0944bd57813c38

      SHA256

      62834a6dad4f88b12d055896e14ed6638acdc2399a35b96a5df66c6f7ed72fef

      SHA512

      c1d6dedfc71aba9d84832f2b4235d5ce2ddb4b79cce6991c1416ba0b6ebf4227010ea71cc9e846a6d3a8d445a1ff1b03af0f8b7143fa767fe73f4b9074c38539

    • C:\Users\Admin\AppData\Local\Temp\Cab60B8.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Charter

      Filesize

      89KB

      MD5

      ec287f03de31d75d7b65333ad856d57d

      SHA1

      65b43b521b8afba6d9d3c325f71ef104ba1212f8

      SHA256

      4781b721205bcc4a912534f0f006acc8f49f220909b45c82e5d70ca718e80b84

      SHA512

      7e560fd33df0f4d8a1c9f954447dd29a8311a9dad6ef3ca3984c102b9a01952028ba146729e080f0de8bf3287f05d510af684000d3f6bfdfe921ee9b6b2629d0

    • C:\Users\Admin\AppData\Local\Temp\Course

      Filesize

      6KB

      MD5

      6da24f141475e1c94d0baa534671730e

      SHA1

      699de571854c9eab964ddde0c12f07818259017e

      SHA256

      71ac8f4534eb924876822260553e2c5fdfee7fc9a50790ffd3842339d8a33e35

      SHA512

      49cd5899f209632ac7ef1fd89b5190afa7cccbd78bf87036de2fa8c384d33e9296e9a66476c14c18f9a4ed4cf14cbba8942ddc5c4af90396a494c581195df95f

    • C:\Users\Admin\AppData\Local\Temp\Deck

      Filesize

      95KB

      MD5

      5bdef9e70fa8aac0118e96d47f1e1dbc

      SHA1

      0989482c6280bf460219d35a1824d760cd9ed3e0

      SHA256

      75f00c8c8a5841c48d383384ed01d0d9fea056fc8bb6b7e275e3a29edf37fa7b

      SHA512

      83c8fb674878a41fb47ceaa999672910e02e1be6c1c0cdfbd89cb0252a7758b3f7c9620d85e749b57ff7589b5d4d5a8fb4a7f9830add8d4406f65aa4ea0cbd17

    • C:\Users\Admin\AppData\Local\Temp\Devil

      Filesize

      24KB

      MD5

      97d7d087cf461ff97c4a4438102c1016

      SHA1

      8b06c86ad5643e7f2a7300a0823711e9ba436963

      SHA256

      d97e4faaa2b3f23b147a2a626634794e9e853a3e661472502d6d786edb1c6c7a

      SHA512

      16c2ae7de0fbba2b2b6f0e5073d4bccd998cc972052f85fbfa70f448aa43634d51b50bffcfdd155bfad0111035067385414b7f94722eb3ae0c5939f934e864f0

    • C:\Users\Admin\AppData\Local\Temp\Hb

      Filesize

      69KB

      MD5

      ef5519b0e3d69ac10317974081e12222

      SHA1

      49ed090bb19c951090b1633e2fd843c949951f07

      SHA256

      3c4f40140a71ecfde55326f84ca878e5c1a101d457107da13017f5670c6a5bb4

      SHA512

      0cb1cde599e6a93fe2ff68309086fd82c5ccd6cac966504ade451026a8da2f0442ee80fd873fbffdaecf18d8ab729317bdc017dd3744fbd744fa5b892b70951c

    • C:\Users\Admin\AppData\Local\Temp\Herself

      Filesize

      866KB

      MD5

      352d59010c3a1ad07c6cc631429c3898

      SHA1

      d84012a103d428bda710012a40b5acd5aa2e8f05

      SHA256

      f9d2fe0dff05d8485cc1104e64940673055bd2ee3ff90297dad183fb6356eae3

      SHA512

      cfa507f35ab27e942e756c1d60599926706730bf207b5ebeb46702e52ce67428f16a22c4e7565d66992b69b26f76f651dda2bf17b6ef36592aff57e0587e343d

    • C:\Users\Admin\AppData\Local\Temp\Killing

      Filesize

      13KB

      MD5

      a3dbd9ae326c770abcc54b0fdd7a22eb

      SHA1

      97d0e17dc71226a7816e1cbb3e070fa8a4872ff6

      SHA256

      f63d2eb292cab30f8e1ab7d9e2ed7b3b19b2be588da4fed455265ea9a6264a11

      SHA512

      5adda01b4500af1f5c09f0a78db320cf7611e6b595d2d9ebc907b5f70dcd4277d11d0056e4ac66fc72f3347088f14650635ba6a7ab8c8438772a52e3966fca71

    • C:\Users\Admin\AppData\Local\Temp\London

      Filesize

      75KB

      MD5

      463606075e8bc9b04f96c6f893469f91

      SHA1

      4fe270343a5a65b1357a0ff96f1d474cfd97bbea

      SHA256

      af8444e8ee47f86fb80bcca4b65c0e2db813240a6479a44ed7c0d4ad310d43e2

      SHA512

      0a440cc3052460b32ff289a897eb641568811572376d466cbdba786c02c585e25c2699aef7860ffcb460933f62d120255bbdfe6926135a5c5fe56b3a910e550d

    • C:\Users\Admin\AppData\Local\Temp\Pichunter

      Filesize

      91KB

      MD5

      9b7919ea2318bec3ef9666c982b77119

      SHA1

      55e2940fc3dc8f377b16ee06c58ee066e7e766f0

      SHA256

      02f813b83cd0126e876f387ac82b51289a9888e7b142fe41a543aaf57e91d225

      SHA512

      e5619ba41d1380d853fcb519dd7acaea1d9946a5f336241a0f396c75c20499a8da72487b6fb0713edf923ba79580425211d0f00e1ff650486d43f16c2e18c2af

    • C:\Users\Admin\AppData\Local\Temp\Rapid

      Filesize

      68KB

      MD5

      78a2388d3143b203f0d68eda1962fd9c

      SHA1

      743bc34a72ed75189c491f5c14dcfe3ce3f4f434

      SHA256

      3739a2c7bf513612f2d616bb10b0221512fa4cce0222441d7ba96ffdfb553387

      SHA512

      e9dc06b5bdef912d33b129fad85561083ee8e56052929e5fe4dde9ed02d65fa6d2c3218ff045abbe7770a662959af00dff6a56b84f684cc0f00451b77e764255

    • C:\Users\Admin\AppData\Local\Temp\Royal

      Filesize

      70KB

      MD5

      f81ed71b4707976f2074491adb2e4f3c

      SHA1

      3bc06f946916884ddc04bf534deb823ac94e34e8

      SHA256

      207eb1026caac4ee644f3b7e1be0d455ac93298b07e329371e1bbd81cc6dc50e

      SHA512

      28eb57f3a5bbb52a865744c999a11345360a2332d1e5a52b70db58b410944f387c4ba3d5a0bcded792909848d7693f898cb66900d0e94c74994bf1a1d71648e2

    • C:\Users\Admin\AppData\Local\Temp\Tar6109.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \ProgramData\mozglue.dll

      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • \ProgramData\nss3.dll

      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • \Users\Admin\AppData\Local\Temp\285204\Kim.pif

      Filesize

      872KB

      MD5

      18ce19b57f43ce0a5af149c96aecc685

      SHA1

      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

      SHA256

      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

      SHA512

      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

    • memory/1052-40-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-42-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-41-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-39-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-183-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-202-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-222-0x000000000F4A0000-0x000000000F6FF000-memory.dmp

      Filesize

      2.4MB

    • memory/1052-235-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-261-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-38-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-37-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-385-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-406-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-447-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB

    • memory/1052-466-0x0000000005FF0000-0x0000000006266000-memory.dmp

      Filesize

      2.5MB