Analysis
-
max time kernel
94s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 21:34
Behavioral task
behavioral1
Sample
lyjdfjthawd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lyjdfjthawd.exe
Resource
win10v2004-20241007-en
General
-
Target
lyjdfjthawd.exe
-
Size
275KB
-
MD5
81a8c700d5bdd648c2848050da4edc4b
-
SHA1
61e9ee541aac8aea077daedd1f31497b0bec2ab4
-
SHA256
d7e8ecfbb9b6b70ac2314516226c94a32ccaba6c31aa4da4a52fa07c2cf22cd4
-
SHA512
473b51e3bf9bb2c787db00b574d28306f209e9f6828b8e36b67b0fea81ec5fe303a4298accff51ee058ea7542049aa33950e9951fa33f248ab3799b826050087
-
SSDEEP
6144:Ch0ZpFC4sffny7TuLBdZlT4DIJYdy3I8ioyrN:Ch0ZpFCfB3TGyYy3ziBZ
Malware Config
Extracted
vidar
11.8
0174ec9d0ab5d3dd4d0bbe7415cfa10c
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/1844-0-0x0000000000F30000-0x0000000001189000-memory.dmp family_vidar_v7 behavioral2/memory/1844-18-0x0000000000F30000-0x0000000001189000-memory.dmp family_vidar_v7 -
Stealc family
-
Vidar family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation lyjdfjthawd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lyjdfjthawd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString lyjdfjthawd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 lyjdfjthawd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1428 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1844 lyjdfjthawd.exe 1844 lyjdfjthawd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1844 wrote to memory of 3060 1844 lyjdfjthawd.exe 89 PID 1844 wrote to memory of 3060 1844 lyjdfjthawd.exe 89 PID 1844 wrote to memory of 3060 1844 lyjdfjthawd.exe 89 PID 3060 wrote to memory of 1428 3060 cmd.exe 91 PID 3060 wrote to memory of 1428 3060 cmd.exe 91 PID 3060 wrote to memory of 1428 3060 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\lyjdfjthawd.exe"C:\Users\Admin\AppData\Local\Temp\lyjdfjthawd.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\lyjdfjthawd.exe" & rd /s /q "C:\ProgramData\AFIDGDBGCAAF" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1428
-
-