Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe
Resource
win7-20240903-en
General
-
Target
56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe
-
Size
1.4MB
-
MD5
117d1f1ebb967009a74000cf6be1127b
-
SHA1
37b3cea9c5166058751a784f45bcdc55dadea533
-
SHA256
56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad
-
SHA512
105b4c1170b09c5f134637c0c1cd476635247aff62b9df30915d839075a5b5b981707356854e8b9adea20695077000e0a14a562f6bbd2928dd84aecbb2610af8
-
SSDEEP
24576:AF3iok5nCcAT5Aw/pkPpbUAEQQi+HrFZ390w28KSaVBXecD4fvPVlFegzHLYwFvc:AFSouMByUswrXKFSxBI0W9
Malware Config
Extracted
vidar
48.4
869
https://koyu.space/@qmashton
-
profile_id
869
Signatures
-
Vidar family
-
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4564-1-0x0000000002A70000-0x0000000002B47000-memory.dmp family_vidar behavioral2/memory/4564-3-0x0000000000400000-0x00000000004D8000-memory.dmp family_vidar behavioral2/memory/4564-4-0x0000000000400000-0x0000000000578000-memory.dmp family_vidar behavioral2/memory/4564-9-0x0000000000400000-0x00000000004D8000-memory.dmp family_vidar -
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3112 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 3220 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 4064 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 3024 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 1288 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 1060 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 2608 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 3772 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 4088 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 4140 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 672 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 3264 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe 644 4564 WerFault.exe 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe"C:\Users\Admin\AppData\Local\Temp\56ab17b3b38ef7edc85bb29eb0dc7f2e3cdfa01f36643b6e5f5f80532a75baad.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 7762⤵
- Program crash
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 7962⤵
- Program crash
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 8962⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 9042⤵
- Program crash
PID:3024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 9042⤵
- Program crash
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 9202⤵
- Program crash
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 11402⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 15682⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 16202⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 18242⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 16602⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 16162⤵
- Program crash
PID:3264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 10842⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4564 -ip 45641⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4564 -ip 45641⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4564 -ip 45641⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4564 -ip 45641⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4564 -ip 45641⤵PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4564 -ip 45641⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4564 -ip 45641⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4564 -ip 45641⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4564 -ip 45641⤵PID:2636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4564 -ip 45641⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4564 -ip 45641⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4564 -ip 45641⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4564 -ip 45641⤵PID:4424