Analysis
-
max time kernel
92s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe
-
Size
19.8MB
-
MD5
7864deaa9953329b0a490dbab14fb98f
-
SHA1
2264b7e1bd13754089844b82a363a243e9b2219e
-
SHA256
1d4999768c08d43e6bb91df7d1e2d9903c23d06020b1f24dbe8d6b516a29b393
-
SHA512
8dbf600e86ff2e19c685e040b6120b227f8726c1f38a31e1100f4cb27b8b58b711379838a9f63436a3921e97567f8e393ac0993b14e874af74d9ea2f27ba625d
-
SSDEEP
49152:uALO5Ug0R4rbJv9iveDrquwzSN4lj3Gn2UQflFUUWxgRgPW2OVN3Pf4pJkKx6G6v:uAa5UPRI7ive/w8nZST/koD
Malware Config
Signatures
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral2/memory/4028-1-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4028-2-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4028-3-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4028-10-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4028-11-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4028-12-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Vidar family
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2824 set thread context of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5064 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4028 BitLockerToGo.exe 4028 BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 2824 wrote to memory of 4028 2824 2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe 97 PID 4028 wrote to memory of 4680 4028 BitLockerToGo.exe 101 PID 4028 wrote to memory of 4680 4028 BitLockerToGo.exe 101 PID 4028 wrote to memory of 4680 4028 BitLockerToGo.exe 101 PID 4680 wrote to memory of 5064 4680 cmd.exe 103 PID 4680 wrote to memory of 5064 4680 cmd.exe 103 PID 4680 wrote to memory of 5064 4680 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-20_7864deaa9953329b0a490dbab14fb98f_frostygoop_poet-rat_snatch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" & rd /s /q "C:\ProgramData\8YMYM7YUK6FU" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5064
-
-
-