Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
25f5bb6b3ac38fe55b9e09e198ec3a65.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25f5bb6b3ac38fe55b9e09e198ec3a65.exe
Resource
win10v2004-20241007-en
General
-
Target
25f5bb6b3ac38fe55b9e09e198ec3a65.exe
-
Size
598KB
-
MD5
25f5bb6b3ac38fe55b9e09e198ec3a65
-
SHA1
f60a23765859b7b1add8124c74d382b50484925d
-
SHA256
ae4652c4433d845665b44f36ba2e4188ca5e33a1df4ea3183af5f3cfbc0d3614
-
SHA512
c7f28ecaf9e9bcbd96b06beb7164f6d8374bec856e0064fadc42ea68491530dd0462949ad5ed78ed1b9a89c73b4bfd1e6bd3b7a7bd8218dcf6557db362d6c35e
-
SSDEEP
12288:E8yf0yrFNqkBdKYN3+xAAgZsltw5bTOt4g0sht8Gj64fPsETEO:E8EfrF7xF+xZwf00shp+dmt
Malware Config
Extracted
vidar
8ecc9c7eaebfdf2a8cc0586d7419d6ea
https://t.me/maslengdsa
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral2/memory/3936-1-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/3936-3-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/3936-6-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/3936-18-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/3936-19-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/3936-29-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/3936-30-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4356 set thread context of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3768 4356 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25f5bb6b3ac38fe55b9e09e198ec3a65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3936 MSBuild.exe 3936 MSBuild.exe 3936 MSBuild.exe 3936 MSBuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83 PID 4356 wrote to memory of 3936 4356 25f5bb6b3ac38fe55b9e09e198ec3a65.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\25f5bb6b3ac38fe55b9e09e198ec3a65.exe"C:\Users\Admin\AppData\Local\Temp\25f5bb6b3ac38fe55b9e09e198ec3a65.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 2922⤵
- Program crash
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4356 -ip 43561⤵PID:908