Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe
Resource
win10v2004-20241007-en
General
-
Target
e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe
-
Size
6.2MB
-
MD5
584cf4a4f9cb958539ac091b3a79fd3a
-
SHA1
83cf9bfe5747e7155ca816c752658ad3aaa0d9fa
-
SHA256
e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7
-
SHA512
6acd009c4ab0f0e548669af6e1b68f13a5c60bca36a6ccc2095796b415dde47dd0f1d5c2ae587a4735fbecaf3b73046389c291ebac45dd131682e2b9407f4249
-
SSDEEP
12288:yQuJMMD+15Kx4I3y41UyKvXVr4D2P8wMxmAQvOwLALDOQyQWDs0H:IyM0IZTyZVEakxmdVALDONPjH
Malware Config
Extracted
vidar
11.8
8ff0797948d4b39f051a704ea27bdbde
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral2/memory/4100-4-0x0000000000400000-0x0000000000659000-memory.dmp family_vidar_v7 -
Stealc family
-
Vidar family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4308 set thread context of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4924 4100 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83 PID 4308 wrote to memory of 4100 4308 e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe"C:\Users\Admin\AppData\Local\Temp\e302bc75ac48569ac8f9ab3dbd31302b9ccb8858305a83698dca10e047aaeaa7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 123⤵
- Program crash
PID:4924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4100 -ip 41001⤵PID:4996