Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe
Resource
win10v2004-20241007-en
General
-
Target
e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe
-
Size
617KB
-
MD5
b84c50c2ceb9b56069c7380e608319de
-
SHA1
ed35a4711f16abaf3f0d68223545c87a5482f30b
-
SHA256
e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1
-
SHA512
3bbebba957448e7f5a3a55dafd2ddfd503c507497b051b03db0af00bb986f63bd504e1575b7a653463e29f959664a3488198b0b83998f8d4a9564261b8e81d01
-
SSDEEP
12288:6DOzqXUCAB/DDDDDDKggISBALtfL1fOvU9K+t4p/oPyBYjKJcflr7v:6DNXUtoDBALtf99b4rWagr7v
Malware Config
Extracted
vidar
11.1
0b3bd69430b7d827b107ba2ed809207d
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/2168-1-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2168-3-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2168-23-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/2168-22-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2608 set thread context of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4736 2608 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4588 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2168 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 2168 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 2168 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 2168 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 2168 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 2168 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2608 wrote to memory of 2168 2608 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 87 PID 2168 wrote to memory of 3996 2168 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 94 PID 2168 wrote to memory of 3996 2168 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 94 PID 2168 wrote to memory of 3996 2168 e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe 94 PID 3996 wrote to memory of 4588 3996 cmd.exe 96 PID 3996 wrote to memory of 4588 3996 cmd.exe 96 PID 3996 wrote to memory of 4588 3996 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe"C:\Users\Admin\AppData\Local\Temp\e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe"C:\Users\Admin\AppData\Local\Temp\e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\e3617487e1b1b47f2fb532af4483c269108230307f02e9690c6ebc8ad037f6c1.exe" & rd /s /q "C:\ProgramData\AEHDAKFIJJKK" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4588
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 2522⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2608 -ip 26081⤵PID:3744