Analysis
-
max time kernel
95s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-fr -
resource tags
arch:x64arch:x86image:win10v2004-20241007-frlocale:fr-fros:windows10-2004-x64systemwindows -
submitted
25-11-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
Roblox Cheat Free/Roblox.exe
Resource
win10v2004-20241007-fr
Behavioral task
behavioral2
Sample
Roblox Cheat Free/UI.cfg
Resource
win10v2004-20241007-fr
Behavioral task
behavioral3
Sample
Roblox Cheat Free/config.dll
Resource
win10v2004-20241007-fr
Behavioral task
behavioral4
Sample
Roblox Cheat Free/lib.dll
Resource
win10v2004-20241007-fr
General
-
Target
Roblox Cheat Free/Roblox.exe
-
Size
4.3MB
-
MD5
0348fffafb59ece4aa4e5304ee89488d
-
SHA1
6c1a2c3cb6e7a4b81e7c5011ff5b98e87d6740df
-
SHA256
679a1ccf565bc8e97f67637df2dfda231a2d5a4ea5d83cefa2fb2c6b390ed082
-
SHA512
0a37d386ff0924790706692503f1e18036f67d5841ed26b913249eddf336382d29fdb4e8d20d3b4a3d1cd31f57b7bf3a661e5f961b4054f84923c413423a7210
-
SSDEEP
49152:h/EsnrGL+AJ047LhE7z6UJflrOQy7BDfXMzs+EIdL7j4VyKcEtYAVttcYzGUX6lQ:h8srjg7lE7KXMzS5CV9o
Malware Config
Extracted
vidar
11.7
a17f83dafa130de24986f1ad305270d5
https://t.me/m07mbk
https://steamcommunity.com/profiles/76561199801589826
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral1/memory/1168-1-0x0000000000400000-0x0000000000659000-memory.dmp family_vidar_v7 behavioral1/memory/1168-2-0x0000000000400000-0x0000000000659000-memory.dmp family_vidar_v7 behavioral1/memory/1168-3-0x0000000000400000-0x0000000000659000-memory.dmp family_vidar_v7 behavioral1/memory/1168-19-0x0000000000400000-0x0000000000659000-memory.dmp family_vidar_v7 behavioral1/memory/1168-20-0x0000000000400000-0x0000000000659000-memory.dmp family_vidar_v7 behavioral1/memory/1168-21-0x0000000000400000-0x0000000000659000-memory.dmp family_vidar_v7 behavioral1/memory/1168-22-0x0000000000400000-0x0000000000659000-memory.dmp family_vidar_v7 -
Stealc family
-
Vidar family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4388 set thread context of 1168 4388 Roblox.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2832 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 BitLockerToGo.exe 1168 BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 4388 wrote to memory of 1168 4388 Roblox.exe 101 PID 1168 wrote to memory of 4368 1168 BitLockerToGo.exe 104 PID 1168 wrote to memory of 4368 1168 BitLockerToGo.exe 104 PID 1168 wrote to memory of 4368 1168 BitLockerToGo.exe 104 PID 4368 wrote to memory of 2832 4368 cmd.exe 106 PID 4368 wrote to memory of 2832 4368 cmd.exe 106 PID 4368 wrote to memory of 2832 4368 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roblox Cheat Free\Roblox.exe"C:\Users\Admin\AppData\Local\Temp\Roblox Cheat Free\Roblox.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" & rd /s /q "C:\ProgramData\JKKEHJDHJKFI" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2832
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:728