Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe
Resource
win7-20241010-en
General
-
Target
9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe
-
Size
687.1MB
-
MD5
afa3ab248ae8ffea5f1a013de4489f92
-
SHA1
23f7b778ffce856f6b34911beca40b8a1af5ab0e
-
SHA256
9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d
-
SHA512
fe6a0d485e9ee08214d5da06d86d7d70471239cc962856d3db2eba1f731ab885db32bd2bbc1765dd671adb192e71fe69c87f207b5cbd10dda147e5f38e55f71b
-
SSDEEP
12288:r2NOhN0MUF7G2s7yM8vsbaSo6Ip0UHdu3NA1J:iNy4+yMMsboZp0UHr
Malware Config
Extracted
vidar
1.7
713
https://t.me/robloxblackl
https://steamcommunity.com/profiles/76561199458928097
http://135.181.204.67:80
-
profile_id
713
Signatures
-
Vidar family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4572 set thread context of 4516 4572 9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 32 4572 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4516 4572 9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe 84 PID 4572 wrote to memory of 4516 4572 9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe 84 PID 4572 wrote to memory of 4516 4572 9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe 84 PID 4572 wrote to memory of 4516 4572 9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe 84 PID 4572 wrote to memory of 4516 4572 9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe"C:\Users\Admin\AppData\Local\Temp\9533e949f03a7b8524d4878816519f0e8f3224841974275145d0eec9eb3d462d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 2402⤵
- Program crash
PID:32
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4572 -ip 45721⤵PID:116