Analysis

  • max time kernel
    62s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 04:38

General

  • Target

    Unconfirmed 966776.zip

  • Size

    52.5MB

  • MD5

    d87bb42f3118d44757ad0348a5013ae0

  • SHA1

    dfc365bb518cf0ac8d7802b63efb1485eb21c09d

  • SHA256

    5ec6b5659fc1fe2761ab4fcd4b44be5722294c3ea5dc8089b465bd95e3950684

  • SHA512

    6928989a2ecb2534011051aea028683dce171a5e3065e2f1607bcbfaa38f3e55011d122256f7bf3a7141d759b448756ba24b64b1d5fa1d779abd471b7d09576a

  • SSDEEP

    1572864:cyASP3JnHeLGGAWIFQmeO1Le4TTGDc2gxr:cyAi3BrG8FXJLyUxr

Malware Config

Signatures

  • Detect Vidar Stealer 4 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Unconfirmed 966776.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\7zO469D3C07\lnstaIIer.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO469D3C07\lnstaIIer.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c move Fight Fight.cmd & Fight.cmd
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2492
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2020
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2788
        • C:\Windows\SysWOW64\findstr.exe
          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2660
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 66354
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2608
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Clean
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2628
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "Uc" Ca
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1880
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Spies + ..\Roles + ..\Chain + ..\Pittsburgh + ..\Rl H
          4⤵
          • System Location Discovery: System Language Discovery
          PID:792
        • C:\Users\Admin\AppData\Local\Temp\66354\Imagination.com
          Imagination.com H
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\66354\Imagination.com" & rd /s /q "C:\ProgramData\X4OH4OHLXBIM" & exit
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1644
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              6⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:812
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abc2f9a3d9549dcdb1f5991d225c7025

    SHA1

    d6a2d9bfdf4c8fdb125aa7d07b034bf0be1ef072

    SHA256

    ba848888e1b7845f83afe4083a9740176c99701bda7fa563a48c228132f945cb

    SHA512

    61968495c217aacbe5a2a861809bc7b9d73a0981ba9fb38032a0930d07771b67dbff2d58e10b9c742c736e3c4aea55c6f0332056d3738033adcf98b8b5621036

  • C:\Users\Admin\AppData\Local\Temp\66354\H

    Filesize

    303KB

    MD5

    af7979a291b80377312f129e1029f27e

    SHA1

    cd786861635f10a62d2c71ef7ad7a1400d4f8291

    SHA256

    a9ee6bfeb13b7b95e55c68e590c9564d588e15a4b9905446b49423fcebe7c694

    SHA512

    17b1d2db5ae71d6ea2194325d2b3e456d6ce8a2fc6a0b1ff285390994e8a0c50ae114ffb7f0af9af5b09929c807aed8ccda2383e0e980637f838520ed78bdce2

  • C:\Users\Admin\AppData\Local\Temp\Allied

    Filesize

    70KB

    MD5

    1b0792f3de33854754b67a67c159055a

    SHA1

    d59734249cbc7827c7beb4d75bab01755a55af4b

    SHA256

    9e0782a13e9f2f8358bed4d31ae3ecbbce6b86114ec0f56cf58524b3a7ab1f9e

    SHA512

    3a373eef91f1eab7a7698fe7421714285823f53430ce541febdcbe4280351c3445b114019a309af488908fd3b1ce8869a3f9175cf8dad45eccc70aaee69c0c07

  • C:\Users\Admin\AppData\Local\Temp\Ca

    Filesize

    1KB

    MD5

    e9769b87769ca145c38ee1f369506794

    SHA1

    da2ca84de99558d6e2e0dd4583644e174abc9d38

    SHA256

    c8317550cad8ca09471094faf4b39e87d11373ec48f233d64c33fe8b29219a8d

    SHA512

    462de05bba62f5eaefc4a8df7cefa65f53c7cedc774a9f9a30f091159839d86777a6e0f3f3da6eff5bb993a6bd83cfba2c05d0e4a86c0d9ffe27326577526619

  • C:\Users\Admin\AppData\Local\Temp\Cab65F6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Cambodia

    Filesize

    65KB

    MD5

    094bf98f05e6d4ff346125273848172d

    SHA1

    e3bb92d41b4c5bcc7752e0eccba4a9158a13b8bf

    SHA256

    386cfb92657c9ab265baeee175b72bd027db73f080f6f622a05bfd100e793cd2

    SHA512

    01eeca6a7fdff97ce3942152d4236f89b1e3eda1d213b2b236e9a0ebc157ddfe7dc23eb0e1f4373fdcd871b476686f0daec686414fa5e50fa3ed62df55c435c7

  • C:\Users\Admin\AppData\Local\Temp\Chain

    Filesize

    85KB

    MD5

    8c002d019dfcb2ed7278d59236c51607

    SHA1

    15641b5b2b24d539a961bcbe7795e8bff9362c0f

    SHA256

    7df575f5275b70f772b4af38ea448474b7fd8c968b1f7598f10c1a194dd2054b

    SHA512

    64157d05739f16a85ee70deaa60da1347adfe74a0bdf21d932b7d5423a2c31657cefa919ecd67b8bbd968e03de013babba23b78554b087619d7b9c1665ddede8

  • C:\Users\Admin\AppData\Local\Temp\Clean

    Filesize

    478KB

    MD5

    3c24bc17efbcfbc7e480889d45bf6d73

    SHA1

    8c90341764d3ab083962b79adfe1fb9f31a7cac7

    SHA256

    ab4b3e6231d6dd81243c7aa4b5a584ccf69fb2471bf00853a9b694917c9de757

    SHA512

    ed1545ef6773fc5f4d068d8fde3d0088ac9767acdeef5c5daec178bb1fea57f367440f02376b7dee313557e2098b5685b229c7088bdf5668a663a1a250417fbb

  • C:\Users\Admin\AppData\Local\Temp\Contractors

    Filesize

    137KB

    MD5

    0c8a839e62c678a851f0e3d14f89c1df

    SHA1

    f7cf2a8584a5ff8f49125ba42b9d91aa5fd2f3c5

    SHA256

    168d318bd24715b065d4541c3737b2760d856740494381fe1cb18f96077e4c4b

    SHA512

    414a2dc57f28916e0905875a6b2255d819e7c120da58c020faaa6755065f17c2611d22107e2e07604e1d4ae502d43998f837388c033d1c7577f12244d3480272

  • C:\Users\Admin\AppData\Local\Temp\End

    Filesize

    144KB

    MD5

    d4fe0ff2eaaec017e6a28f81026c5e9b

    SHA1

    6df58def249ff288da6c12e3d5f480cd0fc321e3

    SHA256

    f12880defa46eba6c067821204ed1e9843dbc2151be72f2ec36661a4e1678c2f

    SHA512

    aa9afd2ab8a4070fbe1e40587540714db790b4fd66efc8541989d10479dcc6ed7ecdf9376370b54234e7b43cdc9e115c5bcaa921bc16d7ddd908e54610c8a4c2

  • C:\Users\Admin\AppData\Local\Temp\Fight

    Filesize

    16KB

    MD5

    b1684762b76f3e2a0256506b468cd631

    SHA1

    99e3f42966c64d9b16f862c8cb4ccad463a0b000

    SHA256

    b2bf90abb1be601c365e665ae566aa6770eec02e3cd5fa71afaf39f175669418

    SHA512

    c56af6a775a53532f937bfbc98f4dd0c68c2e905dfbb01df8726f27b5a46cc358b17759336969d46a59a813b1a1df7c41918d92d0f61f01fd7624fa8c9411e46

  • C:\Users\Admin\AppData\Local\Temp\Ground

    Filesize

    54KB

    MD5

    446527a8c2df952f491ffbf475a07435

    SHA1

    a5b0342963fa6737ca49a377c5423e3f64dd91b6

    SHA256

    c63817ab3b3dddcf4073ed8938331b929119a3b34545dff1d3c769f025de5502

    SHA512

    a43cbc81a5078aba915afba3d8b92b0b63c17deeed9f7a695f9ac4433f0bede5eeda8a9c150a8a31f2052a12842781933273dc1dcbed54ed2b5b998e4b8e8acc

  • C:\Users\Admin\AppData\Local\Temp\Interesting

    Filesize

    109KB

    MD5

    93be5ec4a24433e4ce2c02f9af313e68

    SHA1

    739f27c19cda6d1e26c073a7625cbd91ea6cfc9b

    SHA256

    5b4bf55929f733ce7c232922c5a06d4b30cb872dc503124e565cfb91381e1716

    SHA512

    a92a7d4e881c2db03eb8832151c08c6169ed7f6996dd2cf2799969c129b94ae069ac36573647266d772ae497e460f944b954553c09b225ec21c423da49ecc485

  • C:\Users\Admin\AppData\Local\Temp\Melissa

    Filesize

    77KB

    MD5

    c4a5c819faf0686a7bac1a2af730754b

    SHA1

    3f0822c7f455dfc0741313efdb240331ffff20a3

    SHA256

    d3ddbbcdba5d5c10fd1ac160eeb3c3b8504665f5b4d8244b531f1a3153d58a98

    SHA512

    01721eade349019f1391e10801eb9e4b153073e289d972ab5b56328e190a574bafe7537da09a3c03d69228cd1924f8e1cf094f293be88b721f53d5f16db753cb

  • C:\Users\Admin\AppData\Local\Temp\Pittsburgh

    Filesize

    59KB

    MD5

    a1fe29abc9bfca2fb71272fbc9a402d4

    SHA1

    35e1d982c11745fe649de08177525e31bc4e78f0

    SHA256

    b23c01c0562c7787fb9e43265a27002121e3c7f9b1509084bbeaa1b4105c67f4

    SHA512

    05d51618b3d21fc6ce60a8475d6ac2e3084b76732ee7a79755b1f402b2a8a785e8d6acc2231309e646dfb78b3e920f54aac33eaff040dd67804c9b003cdffd80

  • C:\Users\Admin\AppData\Local\Temp\Rl

    Filesize

    807B

    MD5

    4c6fda3c66e4e4c6679bbab02eb3df98

    SHA1

    99e9ee793e9c0a8e22b73a52910367dccf7f84cd

    SHA256

    92444170efb695237ebe772324c5ff9f3ae9c266d65e414e41a6b3b8a808c1d9

    SHA512

    1d432e1392469db3310d2a22d54311dc8b2c313205aa90d2794a157b0c8f1e576a56c57526c62fd2b94ff912e33d9ea9609208d48eca0bc4a307b2401565d23a

  • C:\Users\Admin\AppData\Local\Temp\Roles

    Filesize

    72KB

    MD5

    1121f279118656d438312afe15b517c8

    SHA1

    8a771b69b50ea83bea0b885d428be9362f8d135a

    SHA256

    bfd853327cb9e47900af293c72a3979d76a6fd8132cce82dc69fd61d5c3c99c9

    SHA512

    7f60a92fe30592b0130fb4619121a9d0b1b29d04e9e6a33ee851d44f46391ccc24a93f91c2c77f8f6292a212a02c3e6da7c19987296aaa13abeec1ffbc292830

  • C:\Users\Admin\AppData\Local\Temp\Spies

    Filesize

    87KB

    MD5

    4bc91ba8cde7323a7e129fcbcf77b707

    SHA1

    c24ccd650c73e843226798a14d8902462a0e7b61

    SHA256

    f41705f75a04ff4e95fe74ee10790694378e6e309a9ca0cd282d11058038320c

    SHA512

    3367c0279fbd353d19378ad2b1d1eef2cbb90c9f0be3f69e6275f726ab2d7bd0c1f4d1de8a838a8b4842286aad1650c2261b0033a211f81a281f3b58c8aa3f25

  • C:\Users\Admin\AppData\Local\Temp\Tar6618.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Themes

    Filesize

    105KB

    MD5

    7e44eeab8174e3c361178147280b45d2

    SHA1

    5e3f783e8ef34c594dd48ab089919ef1a5b060d8

    SHA256

    a0cd7ad6c658894dc7a10c5855b16cd05069e197f4f3ca9d07352a2bb6e6387e

    SHA512

    9989b863802b60942d21b7b3f6d116d42bbe9128762fd52fe8c35fc1ccfa83acbdf1dea2737cdad1d20d26d79b6c3d32ffb7b21a40bb6f402c2024a0a7d82973

  • C:\Users\Admin\AppData\Local\Temp\Vpn

    Filesize

    136KB

    MD5

    9089702147eab41e15e8900f297bd5c9

    SHA1

    00dec47573fcfe5a0731c1ec8eec0814715b2bbe

    SHA256

    e14bd93561afa89be0a8f4b5821dc4ada3da6f48344da8a4c9faa7cf64a211b7

    SHA512

    e91784b85568e59615a1cc2a5809ec107fea3cd24ff9fe584caf17e6be9d81def1bab0e63d851ae430065927aebb51d5fe41e909775ef26faa0ef4edcb0b862a

  • C:\Users\Admin\AppData\Local\Temp\Wrestling

    Filesize

    27KB

    MD5

    e1b30a6f48b1756d610d179ebc958923

    SHA1

    4afbb1fe918c7af68aadfe87c14e4d926e202a00

    SHA256

    7c0ee9ab3e4b4a1e34993d6be00ae0a5936e7043b1298af3bbc1318bd6b8d4be

    SHA512

    f94031de8ca1420d2325224659d083f92958b43eb82c91f23327e3fadbceb2391dcf46e5a80bdba413439df16278884557daa308dbc24f3daba818bdd8b39bae

  • \Users\Admin\AppData\Local\Temp\66354\Imagination.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2520-80-0x00000000058F0000-0x0000000005B29000-memory.dmp

    Filesize

    2.2MB

  • memory/2520-84-0x00000000058F0000-0x0000000005B29000-memory.dmp

    Filesize

    2.2MB

  • memory/2520-83-0x00000000058F0000-0x0000000005B29000-memory.dmp

    Filesize

    2.2MB

  • memory/2520-85-0x00000000058F0000-0x0000000005B29000-memory.dmp

    Filesize

    2.2MB

  • memory/2520-81-0x00000000058F0000-0x0000000005B29000-memory.dmp

    Filesize

    2.2MB

  • memory/2520-82-0x00000000058F0000-0x0000000005B29000-memory.dmp

    Filesize

    2.2MB

  • memory/2520-219-0x00000000058F0000-0x0000000005B29000-memory.dmp

    Filesize

    2.2MB

  • memory/2520-220-0x00000000058F0000-0x0000000005B29000-memory.dmp

    Filesize

    2.2MB