Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe
Resource
win7-20240903-en
General
-
Target
56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe
-
Size
1.4MB
-
MD5
117d1f1ebb967009a74000cf6be1127b
-
SHA1
37b3cea9c5166058751a784f45bcdc55dadea533
-
SHA256
56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad
-
SHA512
105b4c1170b09c5f134637c0c1cd476635247aff62b9df30915d839075a5b5b981707356854e8b9adea20695077000e0a14a562f6bbd2928dd84aecbb2610af8
-
SSDEEP
24576:AF3iok5nCcAT5Aw/pkPpbUAEQQi+HrFZ390w28KSaVBXecD4fvPVlFegzHLYwFvc:AFSouMByUswrXKFSxBI0W9
Malware Config
Extracted
vidar
48.4
869
https://koyu.space/@qmashton
-
profile_id
869
Signatures
-
Vidar family
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/3088-3-0x00000000029C0000-0x0000000002A97000-memory.dmp family_vidar behavioral2/memory/3088-4-0x0000000000400000-0x00000000004D8000-memory.dmp family_vidar behavioral2/memory/3088-8-0x0000000000400000-0x0000000000578000-memory.dmp family_vidar behavioral2/memory/3088-9-0x0000000000400000-0x00000000004D8000-memory.dmp family_vidar -
Program crash 13 IoCs
pid pid_target Process procid_target 3616 3088 WerFault.exe 82 4672 3088 WerFault.exe 82 1372 3088 WerFault.exe 82 4396 3088 WerFault.exe 82 4140 3088 WerFault.exe 82 4056 3088 WerFault.exe 82 1004 3088 WerFault.exe 82 4560 3088 WerFault.exe 82 868 3088 WerFault.exe 82 724 3088 WerFault.exe 82 2660 3088 WerFault.exe 82 3608 3088 WerFault.exe 82 4860 3088 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe"C:\Users\Admin\AppData\Local\Temp\56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 7522⤵
- Program crash
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 7962⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 8962⤵
- Program crash
PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 9162⤵
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 9162⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 9802⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 15602⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 16162⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 18362⤵
- Program crash
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 18442⤵
- Program crash
PID:724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 16082⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 16122⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 11042⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3088 -ip 30881⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3088 -ip 30881⤵PID:1308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3088 -ip 30881⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3088 -ip 30881⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3088 -ip 30881⤵PID:912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3088 -ip 30881⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3088 -ip 30881⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3088 -ip 30881⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3088 -ip 30881⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3088 -ip 30881⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3088 -ip 30881⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3088 -ip 30881⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3088 -ip 30881⤵PID:4584