Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
default.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
default.exe
Resource
win11-20241007-en
General
-
Target
default.exe
-
Size
4.2MB
-
MD5
589903101622ead17fb90da578086962
-
SHA1
8c0b3b771ac79959dc155166bf22495b3197b97d
-
SHA256
e85d5b53626307eb032ccfe4ba7e1441a88af81062e5afe8a69f1d283b4f3ea9
-
SHA512
49b74af8105878f6d7e491f6bb56d23ad8cb28e317a0c99a1ac36b7aa4948610e3d171a2b64a58fd3fab83ba48691f58bf033462a592fa61bbdd6cb9e49a47fd
-
SSDEEP
49152:UTgmiz2o3rioSPZQpAookqlq40imXDUZei3xRxwcCjg5835S2m:UcfbiV9U5/3HE58p
Malware Config
Extracted
vidar
10.2
6b8642176bdf6e69e18dcef863f92aad
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Signatures
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral1/memory/4264-70-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral1/memory/4264-68-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral1/memory/4264-74-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral1/memory/4264-86-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral1/memory/4264-87-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral1/memory/4264-89-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/60-1-0x0000000000890000-0x0000000000CCC000-memory.dmp net_reactor -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 60 set thread context of 4264 60 default.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4436 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 60 default.exe 60 default.exe 4264 MSBuild.exe 4264 MSBuild.exe 4264 MSBuild.exe 4264 MSBuild.exe 4264 MSBuild.exe 4264 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 60 default.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 60 wrote to memory of 1664 60 default.exe 87 PID 60 wrote to memory of 1664 60 default.exe 87 PID 60 wrote to memory of 1664 60 default.exe 87 PID 60 wrote to memory of 4264 60 default.exe 88 PID 60 wrote to memory of 4264 60 default.exe 88 PID 60 wrote to memory of 4264 60 default.exe 88 PID 60 wrote to memory of 4264 60 default.exe 88 PID 60 wrote to memory of 4264 60 default.exe 88 PID 60 wrote to memory of 4264 60 default.exe 88 PID 60 wrote to memory of 4264 60 default.exe 88 PID 60 wrote to memory of 4264 60 default.exe 88 PID 60 wrote to memory of 4264 60 default.exe 88 PID 4264 wrote to memory of 4788 4264 MSBuild.exe 90 PID 4264 wrote to memory of 4788 4264 MSBuild.exe 90 PID 4264 wrote to memory of 4788 4264 MSBuild.exe 90 PID 4788 wrote to memory of 4436 4788 cmd.exe 92 PID 4788 wrote to memory of 4436 4788 cmd.exe 92 PID 4788 wrote to memory of 4436 4788 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\default.exe"C:\Users\Admin\AppData\Local\Temp\default.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:1664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & rd /s /q "C:\ProgramData\FCGCFCAFIIEB" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4436
-
-
-