Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2024, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
TTDesktop18.exe
Resource
win7-20241023-en
General
-
Target
TTDesktop18.exe
-
Size
26.0MB
-
MD5
13eb2bb3303156d695ecf3f2b2c09eb7
-
SHA1
db1f2877681d02201c6c9d71d8c52a872c3612b9
-
SHA256
8680e9ff0246c2b7cd4a45a9c6262851ce8d12e4638e48cb1baec267c2b6ea6b
-
SHA512
6f44a7f1612f0eb4843c1e0de757a03f53d2b14e7aa8b7f983c2ca9baf0701d30f129edeab9c889655840782a1289fb4d0bf0699223e3c584afdaa4ee5172172
-
SSDEEP
192:0qgaiJUFTQcHVPtAXjJ9vT2O3yP8B50LOZdBcmCEJXVWwTnkVOvQu:57zFEcH769vT2OCkB50LknnVTnkVUQ
Malware Config
Extracted
vidar
11.8
41d35cbb974bc2d1287dcd4381b4a2a8
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b87-138.dat family_vidar_v7 behavioral2/memory/4168-142-0x0000000000A10000-0x0000000000C69000-memory.dmp family_vidar_v7 behavioral2/memory/4168-160-0x0000000000A10000-0x0000000000C69000-memory.dmp family_vidar_v7 -
Stealc family
-
Vidar family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3416 powershell.exe 4528 powershell.exe 1572 powershell.exe 2440 powershell.exe 1672 powershell.exe 4860 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation TTDesktop18.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation zxQdBDcDxA.exe -
Executes dropped EXE 1 IoCs
pid Process 4168 zxQdBDcDxA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 raw.githubusercontent.com 21 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TTDesktop18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxQdBDcDxA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 zxQdBDcDxA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString zxQdBDcDxA.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2848 timeout.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2440 powershell.exe 2440 powershell.exe 1672 powershell.exe 1672 powershell.exe 4860 powershell.exe 4860 powershell.exe 3416 powershell.exe 3416 powershell.exe 4528 powershell.exe 4528 powershell.exe 1572 powershell.exe 1572 powershell.exe 4168 zxQdBDcDxA.exe 4168 zxQdBDcDxA.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeDebugPrivilege 3416 powershell.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 1572 powershell.exe Token: SeDebugPrivilege 3644 TTDesktop18.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3644 wrote to memory of 2440 3644 TTDesktop18.exe 83 PID 3644 wrote to memory of 2440 3644 TTDesktop18.exe 83 PID 3644 wrote to memory of 2440 3644 TTDesktop18.exe 83 PID 2440 wrote to memory of 1672 2440 powershell.exe 85 PID 2440 wrote to memory of 1672 2440 powershell.exe 85 PID 2440 wrote to memory of 1672 2440 powershell.exe 85 PID 3644 wrote to memory of 4860 3644 TTDesktop18.exe 86 PID 3644 wrote to memory of 4860 3644 TTDesktop18.exe 86 PID 3644 wrote to memory of 4860 3644 TTDesktop18.exe 86 PID 4860 wrote to memory of 3416 4860 powershell.exe 88 PID 4860 wrote to memory of 3416 4860 powershell.exe 88 PID 4860 wrote to memory of 3416 4860 powershell.exe 88 PID 3644 wrote to memory of 4528 3644 TTDesktop18.exe 89 PID 3644 wrote to memory of 4528 3644 TTDesktop18.exe 89 PID 3644 wrote to memory of 4528 3644 TTDesktop18.exe 89 PID 4528 wrote to memory of 1572 4528 powershell.exe 91 PID 4528 wrote to memory of 1572 4528 powershell.exe 91 PID 4528 wrote to memory of 1572 4528 powershell.exe 91 PID 3644 wrote to memory of 4168 3644 TTDesktop18.exe 97 PID 3644 wrote to memory of 4168 3644 TTDesktop18.exe 97 PID 3644 wrote to memory of 4168 3644 TTDesktop18.exe 97 PID 4168 wrote to memory of 3028 4168 zxQdBDcDxA.exe 102 PID 4168 wrote to memory of 3028 4168 zxQdBDcDxA.exe 102 PID 4168 wrote to memory of 3028 4168 zxQdBDcDxA.exe 102 PID 3028 wrote to memory of 2848 3028 cmd.exe 104 PID 3028 wrote to memory of 2848 3028 cmd.exe 104 PID 3028 wrote to memory of 2848 3028 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\TTDesktop18.exe"C:\Users\Admin\AppData\Local\Temp\TTDesktop18.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\HsQoDvna'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\HsQoDvna3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Users3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Windows3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
C:\HsQoDvna\zxQdBDcDxA.exe"C:\HsQoDvna\zxQdBDcDxA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\HsQoDvna\zxQdBDcDxA.exe" & rd /s /q "C:\ProgramData\BGCFBGDHJKFI" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD50a7b3454fdad8431bd3523648c915665
SHA1800a97a7c1a92a92cac76afc1fe5349895ee5287
SHA256baf217d7bb8f3a86856def6891638318a94ed5d7082149d4dd4cb755d90d86ce
SHA512020e45eaeee083d6739155d9a821ab54dd07f1320b8efb73871ee5d29188122fdbb7d39b34a8b3694a8b0c08ae1801ec370e40ff8d837c9190a72905f26baff9
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
11KB
MD5249652c80056c84943a9f1f134667dc9
SHA171d82e89d7268cb037676c49a4028866325a5630
SHA256f0a441298ed176066e66e37279586d14357ccd8af633f14f7f216fa63f699de7
SHA512ef0f83521969ee872d119f83725d22d807f25fdf3df011c3ccc5e3ccc9483137e8bdc5b690bb9544fab902697eaa8223cea30a397544a2b977975ea4f4cac38f
-
Filesize
11KB
MD528c90f050f27eac75f63a7c77a132383
SHA1b156de3a9c38f919a25d13a39e49527da0133dcb
SHA2569fffb58299b653a7a8f2a3cf6ac3e31b45ca08117591040180b6545651989486
SHA5120e9a1d0b068f2daa762887b4ce413c2ec73952db06c74ae5408b28c6264bee61df0a46142fdf7597c67b5e8cd6516237eb10de23eaccec4333b6e7f193e4cfd3
-
Filesize
11KB
MD545a88aeb083ddf4471010c6da84ad48e
SHA1780d3cb8742a6f37e6fc250e4a059e1ac52f1aef
SHA256598f0f07e4d345be079ac8ab2a6a1ae70634c36ec2e1b713580e3f48abccf8fa
SHA51208d31ae5dad2ed90f80c780ae2801b68e1e28ff6e693a9ff119831124d21522e25cdab48a6d6d741f5195d1f8cd868eda3977a344f68ddd4e759661fdc53a8bf
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82