Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 18:12
Behavioral task
behavioral1
Sample
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe
Resource
win7-20240903-en
General
-
Target
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe
-
Size
275KB
-
MD5
0abcf5f274cf19c6f9c75954e9b6a182
-
SHA1
e39e1cecaffce08ffd9388ded9e13132e1eb6d51
-
SHA256
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156
-
SHA512
c61dc07371b03d9a959ff7caac8265eea345fa78e4939d0a4d9491ef879287046ec6e0847b4067c3043fb97f4c1f94c2ac0f5bbc9ba18716ef6e02a4268f02fd
-
SSDEEP
6144:dh0ZpFC4sffny7TuLBdZlT4DIJYdy3F8ioyrN:dh0ZpFCfB3TGyYy3uiBZ
Malware Config
Extracted
vidar
11.8
fc02efe1cfb2a62f36f33fff0274fb41
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4020-0-0x0000000000730000-0x0000000000989000-memory.dmp family_vidar_v7 behavioral2/memory/4020-20-0x0000000000730000-0x0000000000989000-memory.dmp family_vidar_v7 -
Stealc family
-
Vidar family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.execmd.exetimeout.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 348 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exepid Process 4020 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 4020 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 4020 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 4020 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.execmd.exedescription pid Process procid_target PID 4020 wrote to memory of 1552 4020 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 86 PID 4020 wrote to memory of 1552 4020 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 86 PID 4020 wrote to memory of 1552 4020 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe 86 PID 1552 wrote to memory of 348 1552 cmd.exe 88 PID 1552 wrote to memory of 348 1552 cmd.exe 88 PID 1552 wrote to memory of 348 1552 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe"C:\Users\Admin\AppData\Local\Temp\54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JEGHDAFIDGDA" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:348
-
-