Analysis
-
max time kernel
52s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
Unlock_App_v1.4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Unlock_App_v1.4.exe
Resource
win10v2004-20241007-en
General
-
Target
Unlock_App_v1.4.exe
-
Size
323KB
-
MD5
34f45d20fef7dd9c8e8d7f5b9d5fa6a7
-
SHA1
4270a1cf22a0183d772bf143bec8a81b8b4ac51e
-
SHA256
42226b9f119843f7ff26e7d50895564d59fe8bf8db1830047c86298d8bc22d74
-
SHA512
11a4e65e08a6f948336971e612f859429c4c58c6443ba85fc3b7a5165040bde57555c596a8c0322cd71b8e1fa3758dd7f6a247de5197b32212d9a90c37fe2410
-
SSDEEP
6144:bspY93m4ezZF197TvhhFUJi7AuRQ1zkIFZQRhtinsoCiiEI+:bWym4ezxLhKAkuRQtkIjQRGns2iEz
Malware Config
Signatures
-
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/5088-1-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/5088-2-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/5088-3-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/5088-11-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/5088-12-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Vidar family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Unlock_App_v1.4.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1988 set thread context of 5088 1988 Unlock_App_v1.4.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlock_App_v1.4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unlock_App_v1.4.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Unlock_App_v1.4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Unlock_App_v1.4.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3032 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5088 Unlock_App_v1.4.exe 5088 Unlock_App_v1.4.exe 1056 msedge.exe 1056 msedge.exe 2864 msedge.exe 2864 msedge.exe 4184 identity_helper.exe 4184 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 1988 wrote to memory of 5088 1988 Unlock_App_v1.4.exe 83 PID 5088 wrote to memory of 3964 5088 Unlock_App_v1.4.exe 84 PID 5088 wrote to memory of 3964 5088 Unlock_App_v1.4.exe 84 PID 5088 wrote to memory of 3964 5088 Unlock_App_v1.4.exe 84 PID 3964 wrote to memory of 3032 3964 cmd.exe 86 PID 3964 wrote to memory of 3032 3964 cmd.exe 86 PID 3964 wrote to memory of 3032 3964 cmd.exe 86 PID 2864 wrote to memory of 3572 2864 msedge.exe 102 PID 2864 wrote to memory of 3572 2864 msedge.exe 102 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 460 2864 msedge.exe 103 PID 2864 wrote to memory of 1056 2864 msedge.exe 104 PID 2864 wrote to memory of 1056 2864 msedge.exe 104 PID 2864 wrote to memory of 1060 2864 msedge.exe 105 PID 2864 wrote to memory of 1060 2864 msedge.exe 105 PID 2864 wrote to memory of 1060 2864 msedge.exe 105 PID 2864 wrote to memory of 1060 2864 msedge.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\Unlock_App_v1.4.exe"C:\Users\Admin\AppData\Local\Temp\Unlock_App_v1.4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unlock_App_v1.4.exe"C:\Users\Admin\AppData\Local\Temp\Unlock_App_v1.4.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Unlock_App_v1.4.exe" & rd /s /q "C:\ProgramData\LXBAIMOPZ58Y" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3032
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdf08a46f8,0x7ffdf08a4708,0x7ffdf08a47182⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3121909823883287078,13929126726271433420,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3121909823883287078,13929126726271433420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3121909823883287078,13929126726271433420,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3121909823883287078,13929126726271433420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3121909823883287078,13929126726271433420,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3121909823883287078,13929126726271433420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3121909823883287078,13929126726271433420,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3121909823883287078,13929126726271433420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3121909823883287078,13929126726271433420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
6KB
MD5bdaaf68d1cde70612bc991f78e423aa4
SHA15b5b7c3bf1275c038ecfe7aef48e869dcbe5b105
SHA256b192e8909041a3a79ce32bc1504e2edb8976470b2ce4ba70922a22738b31dd59
SHA51222da575b4cd19f5635ab221c93e947a3cbb8603a5b80ea5d414a27b57eddca8202e6ed9bff8f76a37d36ce717ddc11f14e9516b295b094fd26d07baa077c1461
-
Filesize
5KB
MD565d6e0fd8eb8466ec7430031ff0f7104
SHA1a6753afa84cca3b259579b9efacd27cfd69cc881
SHA256f6e80a6fe24e4b7a43248ced4972bafc7521bf9d417d2cb93d863d7001e1995e
SHA51297592cf0f5afd313fd43eb653fbfa406bb2926a28ff3c899c783a8ea0f5805fa4be4417ad1d847b93d0677b0d1816af59690780376c42bd4a1deff163fdad262
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5a03ad5e796e55eb5adeb6a0bba9015f7
SHA1e9143ebd1f877d5fc862bbfa2fd2047e71c3d117
SHA2563f522666537b2e0012ce235a2e10e962a2c336b4e15503af1cca3d527c1889c7
SHA512b9acfb5048224cb9be12e63f9ad64b85c6bc00c0eaa1b703282f23633c0d4f9b0de8e25a742c79a1d76b69b5191a63ccbd48d85ad47e61004d9630fd0935ae0e