Analysis

  • max time kernel
    35s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2024, 19:17 UTC

General

  • Target

    a945644533a405a16423fbf5b9a37069_JaffaCakes118.exe

  • Size

    544KB

  • MD5

    a945644533a405a16423fbf5b9a37069

  • SHA1

    30b820799eb4e5e5421ef14cd3f2a87f8288fe46

  • SHA256

    a5483d1124967a58176f75409270ba071fe0f2f337ffd3b106659852565502f0

  • SHA512

    40f82c67d52b1b960d1097cdbc6801d2f5ba3dd20ac62d8dd3055aaf55392744c9e4a4b595fb62d37f69ca7a833158e2c15e36e1c3a53e3576a4a6326ead18ed

  • SSDEEP

    12288:V2VRggveXe6UvZRLGkWVx30BwQTvwAW8aLlcCO1Xnmi:V2VygmZYZRL8xiwQzW8TXmi

Malware Config

Extracted

Family

vidar

Version

40

Botnet

916

C2

https://lenak513.tumblr.com/

Attributes
  • profile_id

    916

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Vidar Stealer 5 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a945644533a405a16423fbf5b9a37069_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a945644533a405a16423fbf5b9a37069_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 888
      2⤵
      • Program crash
      PID:2684

Network

  • flag-us
    DNS
    lenak513.tumblr.com
    a945644533a405a16423fbf5b9a37069_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    lenak513.tumblr.com
    IN A
    Response
    lenak513.tumblr.com
    IN A
    74.114.154.22
    lenak513.tumblr.com
    IN A
    74.114.154.18
  • flag-us
    GET
    https://lenak513.tumblr.com/
    a945644533a405a16423fbf5b9a37069_JaffaCakes118.exe
    Remote address:
    74.114.154.22:443
    Request
    GET / HTTP/1.1
    Host: lenak513.tumblr.com
    Response
    HTTP/1.1 404 Not Found
    Server: nginx
    Date: Wed, 27 Nov 2024 19:17:56 GMT
    Content-Type: text/html
    Content-Length: 4306
    Connection: keep-alive
    Vary: Accept-Encoding
    ETag: "67166be3-10d2"
  • flag-us
    DNS
    www.microsoft.com
    Remote address:
    8.8.8.8:53
    Request
    www.microsoft.com
    IN A
    Response
    www.microsoft.com
    IN CNAME
    www.microsoft.com-c-3.edgekey.net
    www.microsoft.com-c-3.edgekey.net
    IN CNAME
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    IN CNAME
    e13678.dscb.akamaiedge.net
    e13678.dscb.akamaiedge.net
    IN A
    173.222.13.219
  • flag-gb
    GET
    http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
    Remote address:
    173.222.13.219:80
    Request
    GET /pkiops/crl/MicCodSigPCA2011_2011-07-08.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    If-Modified-Since: Sun, 18 Aug 2024 00:23:49 GMT
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: www.microsoft.com
    Response
    HTTP/1.1 200 OK
    Content-Length: 1078
    Content-Type: application/octet-stream
    Content-MD5: PjrtHAukbJio72s77Ag5mA==
    Last-Modified: Thu, 31 Oct 2024 23:26:09 GMT
    ETag: 0x8DCFA0366D6C4CA
    x-ms-request-id: 6b64e012-e01e-0050-2e21-2c95ba000000
    x-ms-version: 2009-09-19
    x-ms-lease-status: unlocked
    x-ms-blob-type: BlockBlob
    Date: Wed, 27 Nov 2024 19:18:26 GMT
    Connection: keep-alive
    TLS_version: UNKNOWN
    ms-cv: CASMicrosoftCV37cb658e.0
    ms-cv-esi: CASMicrosoftCV37cb658e.0
    X-RTag: RT
  • 74.114.154.22:443
    https://lenak513.tumblr.com/
    tls, http
    a945644533a405a16423fbf5b9a37069_JaffaCakes118.exe
    864 B
    8.4kB
    11
    12

    HTTP Request

    GET https://lenak513.tumblr.com/

    HTTP Response

    404
  • 173.222.13.219:80
    http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
    http
    393 B
    1.7kB
    4
    4

    HTTP Request

    GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl

    HTTP Response

    200
  • 8.8.8.8:53
    lenak513.tumblr.com
    dns
    a945644533a405a16423fbf5b9a37069_JaffaCakes118.exe
    65 B
    97 B
    1
    1

    DNS Request

    lenak513.tumblr.com

    DNS Response

    74.114.154.22
    74.114.154.18

  • 8.8.8.8:53
    www.microsoft.com
    dns
    63 B
    230 B
    1
    1

    DNS Request

    www.microsoft.com

    DNS Response

    173.222.13.219

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab63D4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6415.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1656-1-0x0000000002E80000-0x0000000002F80000-memory.dmp

    Filesize

    1024KB

  • memory/1656-2-0x0000000004510000-0x00000000045AD000-memory.dmp

    Filesize

    628KB

  • memory/1656-3-0x0000000000400000-0x00000000004A1000-memory.dmp

    Filesize

    644KB

  • memory/1656-59-0x0000000004510000-0x00000000045AD000-memory.dmp

    Filesize

    628KB

  • memory/1656-58-0x0000000002E80000-0x0000000002F80000-memory.dmp

    Filesize

    1024KB

  • memory/1656-60-0x0000000000400000-0x00000000004A1000-memory.dmp

    Filesize

    644KB

  • memory/1656-57-0x0000000000400000-0x0000000002CBE000-memory.dmp

    Filesize

    40.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.