Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
598KB
-
MD5
062240f907bf9b20680ed17e27d54199
-
SHA1
2194bd84d7b0974dba98771e6129588c75ff10ab
-
SHA256
0354299279d74bf20ea88cf017002360c397b50462a9ec4e23594eb344545b87
-
SHA512
ff4ab62c45156745680cd8bcc4e48d204376ee470ffb2ae62cf6f7a43ff9b9b3978257ac6537499cc73d1bb4d641ac14ecf76ea851d606e78558c3f615ec55ca
-
SSDEEP
12288:JUqvMSDFMqAI/mhe5g0pmHsyJzcD8z1CBU1IXaYsnViMrEjYYd64fLETEO:JU8HDF9QYKsgcAmU1QaYsnViCEEY8+mt
Malware Config
Extracted
vidar
8ecc9c7eaebfdf2a8cc0586d7419d6ea
https://t.me/maslengdsa
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral2/memory/2156-1-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2156-3-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2156-6-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2156-7-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2156-8-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2156-18-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2156-19-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3788 set thread context of 2156 3788 file.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 1960 3788 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2156 MSBuild.exe 2156 MSBuild.exe 2156 MSBuild.exe 2156 MSBuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3788 wrote to memory of 2156 3788 file.exe 81 PID 3788 wrote to memory of 2156 3788 file.exe 81 PID 3788 wrote to memory of 2156 3788 file.exe 81 PID 3788 wrote to memory of 2156 3788 file.exe 81 PID 3788 wrote to memory of 2156 3788 file.exe 81 PID 3788 wrote to memory of 2156 3788 file.exe 81 PID 3788 wrote to memory of 2156 3788 file.exe 81 PID 3788 wrote to memory of 2156 3788 file.exe 81 PID 3788 wrote to memory of 2156 3788 file.exe 81 PID 3788 wrote to memory of 2156 3788 file.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 2922⤵
- Program crash
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3788 -ip 37881⤵PID:2772