Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
resource/RedistList/Columm/whipsKnarredFilles/data.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
resource/RedistList/Columm/whipsKnarredFilles/data.dll
Resource
win10v2004-20241007-en
General
-
Target
Setup.exe
-
Size
464.6MB
-
MD5
350a2e8a8fd1cc46f25ff822b5fef864
-
SHA1
6ced61594dbe240d0dbaa548eba526790b6e27f5
-
SHA256
83b096c9efd0c9c855b9b8a7d70ebfb7f50e0449a824c52bf18a81b75a6037bd
-
SHA512
27d75283812c73fe5e9d0bdfbf590ae00d2f2ae024c1dcc83c16e186ff65f2ceb3b939cef828e1bab7005356ba39d5dd96cca06a7d6fcfd37533aa48e68c2f15
-
SSDEEP
24576:Lum9BtnqcmZV0mNzVLjFD23pWVKgnJC2Tld/wCyKkgJe/lgTbSUobuLA4ibic:L3qrZBLfY3pWVrJdf/wPKI/qRob2A4iH
Malware Config
Extracted
vidar
2.4
839
https://t.me/gurutist
https://steamcommunity.com/profiles/76561199476091435
http://95.216.164.28:80
-
profile_id
839
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
Signatures
-
Vidar family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 924 set thread context of 772 924 Setup.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 924 Setup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 924 wrote to memory of 772 924 Setup.exe 90 PID 924 wrote to memory of 772 924 Setup.exe 90 PID 924 wrote to memory of 772 924 Setup.exe 90 PID 924 wrote to memory of 772 924 Setup.exe 90 PID 924 wrote to memory of 772 924 Setup.exe 90 PID 924 wrote to memory of 772 924 Setup.exe 90 PID 924 wrote to memory of 772 924 Setup.exe 90 PID 924 wrote to memory of 772 924 Setup.exe 90 PID 924 wrote to memory of 772 924 Setup.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- System Location Discovery: System Language Discovery
PID:772
-