Analysis
-
max time kernel
27s -
max time network
28s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-10-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
default.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
default.exe
Resource
win11-20241007-en
General
-
Target
default.exe
-
Size
4.2MB
-
MD5
589903101622ead17fb90da578086962
-
SHA1
8c0b3b771ac79959dc155166bf22495b3197b97d
-
SHA256
e85d5b53626307eb032ccfe4ba7e1441a88af81062e5afe8a69f1d283b4f3ea9
-
SHA512
49b74af8105878f6d7e491f6bb56d23ad8cb28e317a0c99a1ac36b7aa4948610e3d171a2b64a58fd3fab83ba48691f58bf033462a592fa61bbdd6cb9e49a47fd
-
SSDEEP
49152:UTgmiz2o3rioSPZQpAookqlq40imXDUZei3xRxwcCjg5835S2m:UcfbiV9U5/3HE58p
Malware Config
Extracted
vidar
10.2
6b8642176bdf6e69e18dcef863f92aad
https://t.me/g067n
https://steamcommunity.com/profiles/76561199707802586
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0
Signatures
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral2/memory/2412-72-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2412-71-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2412-69-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2412-81-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2412-82-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral2/memory/2412-84-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/4328-1-0x0000000000DD0000-0x000000000120C000-memory.dmp net_reactor -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4328 set thread context of 2412 4328 default.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3552 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe 2412 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4328 default.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4328 wrote to memory of 2412 4328 default.exe 78 PID 4328 wrote to memory of 2412 4328 default.exe 78 PID 4328 wrote to memory of 2412 4328 default.exe 78 PID 4328 wrote to memory of 2412 4328 default.exe 78 PID 4328 wrote to memory of 2412 4328 default.exe 78 PID 4328 wrote to memory of 2412 4328 default.exe 78 PID 4328 wrote to memory of 2412 4328 default.exe 78 PID 4328 wrote to memory of 2412 4328 default.exe 78 PID 4328 wrote to memory of 2412 4328 default.exe 78 PID 2412 wrote to memory of 1064 2412 MSBuild.exe 80 PID 2412 wrote to memory of 1064 2412 MSBuild.exe 80 PID 2412 wrote to memory of 1064 2412 MSBuild.exe 80 PID 1064 wrote to memory of 3552 1064 cmd.exe 82 PID 1064 wrote to memory of 3552 1064 cmd.exe 82 PID 1064 wrote to memory of 3552 1064 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\default.exe"C:\Users\Admin\AppData\Local\Temp\default.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" & rd /s /q "C:\ProgramData\HJDBFBKKJDHJ" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3552
-
-
-