Analysis
-
max time kernel
95s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 02:30
Behavioral task
behavioral1
Sample
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe
Resource
win7-20240903-en
General
-
Target
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe
-
Size
275KB
-
MD5
0abcf5f274cf19c6f9c75954e9b6a182
-
SHA1
e39e1cecaffce08ffd9388ded9e13132e1eb6d51
-
SHA256
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156
-
SHA512
c61dc07371b03d9a959ff7caac8265eea345fa78e4939d0a4d9491ef879287046ec6e0847b4067c3043fb97f4c1f94c2ac0f5bbc9ba18716ef6e02a4268f02fd
-
SSDEEP
6144:dh0ZpFC4sffny7TuLBdZlT4DIJYdy3F8ioyrN:dh0ZpFCfB3TGyYy3uiBZ
Malware Config
Extracted
vidar
11.8
fc02efe1cfb2a62f36f33fff0274fb41
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/3552-0-0x0000000000850000-0x0000000000AA9000-memory.dmp family_vidar_v7 behavioral2/memory/3552-20-0x0000000000850000-0x0000000000AA9000-memory.dmp family_vidar_v7 -
Stealc family
-
Vidar family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4956 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3552 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 3552 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 3552 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 3552 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3552 wrote to memory of 4528 3552 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 92 PID 3552 wrote to memory of 4528 3552 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 92 PID 3552 wrote to memory of 4528 3552 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 92 PID 4528 wrote to memory of 4956 4528 cmd.exe 94 PID 4528 wrote to memory of 4956 4528 cmd.exe 94 PID 4528 wrote to memory of 4956 4528 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe"C:\Users\Admin\AppData\Local\Temp\54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JEGDGIIJJECF" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4956
-
-