Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4.exe
Resource
win7-20240903-en
General
-
Target
09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4.exe
-
Size
743KB
-
MD5
94cab93a2cbfcc9cc2dc717bfb3cdf65
-
SHA1
7574be21199394deab77af6372bcbeb1ff912b6c
-
SHA256
09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4
-
SHA512
22752fc814531f9529bef3713624a25ae5bbdd9d4ffc11a232ae485570e2b3fb2bd0ce92ed6c65431c22f231b3e38b113527abab47d2b3aae002fca995e56e21
-
SSDEEP
12288:cZaoSlqdoJwS32yxxKrkiJKzQ2aihPX8WQ4Bkpbk6rdZd+M/tYLoXMGp/hVBfqJx:cNvOf2CxK7J0QI5Q4epIEvTeYMGRopkE
Malware Config
Extracted
vidar
41.3
1008
https://mas.to/@oleg98
-
profile_id
1008
Signatures
-
Vidar family
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/2480-2-0x0000000001730000-0x0000000001806000-memory.dmp family_vidar behavioral1/memory/2480-3-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar behavioral1/memory/2480-18-0x0000000001730000-0x0000000001806000-memory.dmp family_vidar behavioral1/memory/2480-20-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar behavioral1/memory/2480-17-0x0000000000400000-0x000000000172D000-memory.dmp family_vidar -
Program crash 1 IoCs
pid pid_target Process procid_target 2804 2480 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2804 2480 09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4.exe 32 PID 2480 wrote to memory of 2804 2480 09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4.exe 32 PID 2480 wrote to memory of 2804 2480 09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4.exe 32 PID 2480 wrote to memory of 2804 2480 09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4.exe"C:\Users\Admin\AppData\Local\Temp\09362cad6ac71a2068e2603345a93960efd09ee21300b534029185f0255997b4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 12962⤵
- Program crash
PID:2804
-