Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 09:05
Static task
static1
Behavioral task
behavioral1
Sample
32441b27ad49e5a9c83b7674147078244fc089121d3b564a088b5c342379daf2.exe
Resource
win7-20240708-en
General
-
Target
32441b27ad49e5a9c83b7674147078244fc089121d3b564a088b5c342379daf2.exe
-
Size
1.2MB
-
MD5
a8f61218ef388853e4f96095848677cd
-
SHA1
2455889d25aa50ad1d390fe310c4707ef20c7e47
-
SHA256
32441b27ad49e5a9c83b7674147078244fc089121d3b564a088b5c342379daf2
-
SHA512
6762d3eda832b19c5eaaa360e9446bfbf63f191e0f6ddf0aafd950320a7d53c60cd22518fde3ac5b95f6201bac6d4b915c66dfd9287dfb952ea79e1bb758f135
-
SSDEEP
24576:deeuI73ROoGgF9Wu6lqlJ39o16PFViLxmaJ9spcGHcd3fV2ZpGw1bBm:dpuI73T59Pwk9xPDcNGIPV2Hr1m
Malware Config
Signatures
-
Vidar family
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2596-3-0x000000001BC10000-0x000000001BCEC000-memory.dmp family_vidar behavioral1/files/0x000a000000012255-8.dat family_vidar -
Executes dropped EXE 1 IoCs
pid Process 2756 build.exe -
Loads dropped DLL 4 IoCs
pid Process 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2552 2756 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2756 2596 32441b27ad49e5a9c83b7674147078244fc089121d3b564a088b5c342379daf2.exe 30 PID 2596 wrote to memory of 2756 2596 32441b27ad49e5a9c83b7674147078244fc089121d3b564a088b5c342379daf2.exe 30 PID 2596 wrote to memory of 2756 2596 32441b27ad49e5a9c83b7674147078244fc089121d3b564a088b5c342379daf2.exe 30 PID 2596 wrote to memory of 2756 2596 32441b27ad49e5a9c83b7674147078244fc089121d3b564a088b5c342379daf2.exe 30 PID 2756 wrote to memory of 2552 2756 build.exe 31 PID 2756 wrote to memory of 2552 2756 build.exe 31 PID 2756 wrote to memory of 2552 2756 build.exe 31 PID 2756 wrote to memory of 2552 2756 build.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\32441b27ad49e5a9c83b7674147078244fc089121d3b564a088b5c342379daf2.exe"C:\Users\Admin\AppData\Local\Temp\32441b27ad49e5a9c83b7674147078244fc089121d3b564a088b5c342379daf2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 13123⤵
- Loads dropped DLL
- Program crash
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
848KB
MD5eafba1017e94765780d8a5b182d4c325
SHA17968d32aa44d2c66dc670841d86ef8dba376128f
SHA2560d50080d7267c71894ccfd698c1ef6369cf2b1b182f903c6b8cbab8e1fb524e3
SHA51231ff0f70cafc20e71cbe4e574b4c1460dbb77e85815339bbe191b41c771da1faa201f5fc95ab10a9b8e707df590431060e7c9d7cb8c15bd275523e1d78be2aaa