Analysis

  • max time kernel
    28s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 18:27

General

  • Target

    ChoForgot.exe

  • Size

    1.1MB

  • MD5

    06342512b7bcdfdda8d6ea8e2d5a24e4

  • SHA1

    5a656ac27d5a03ee63f08dd499bacd01e0a12c3f

  • SHA256

    89b55665c76315777e1f2a9a5be784fd2590b917388f657c6f5c2caa055e87c2

  • SHA512

    5824c39a30b7acacd949812bafcf99afcdc95361b2196567aae4e1f2445803c37971a572537c132a01b930e204745ccf7f082386147ea3b611c745eef2ea3eb4

  • SSDEEP

    24576:StmrKn0UVWKbcO1wZ8Baw0QD4Iv2kSen/rhSjJVC6h2Lg2np2uGVemv+Gl9o:8O6rIO1k8L0QcIv7nThSjeuKzDAemu

Malware Config

Signatures

  • Detect Vidar Stealer 4 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ChoForgot.exe
    "C:\Users\Admin\AppData\Local\Temp\ChoForgot.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Forth Forth.cmd & Forth.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:320
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2968
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2588
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 623615
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2544
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Distances
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2552
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Duck" Ix
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2640
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Loud + ..\Kenny + ..\Advisor + ..\Promotes f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3000
      • C:\Users\Admin\AppData\Local\Temp\623615\Wb.com
        Wb.com f
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\623615\Wb.com" & rd /s /q "C:\ProgramData\HVKNYUK6F37Y" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3044
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:280
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c11f6798d83dca64838d17d3c87f8c0

    SHA1

    c7d744db916a0e0ce128913edf0978d809c70ca8

    SHA256

    c04052d88d6c0e67e6f930220c8b8fed1099f62331667e29ec967225f485c97f

    SHA512

    659d9cfed879005db24e7aac978957e76e054b13a824feaaf33c4800b92b8a4afa9e9b9f096af735ad7c4d1f7428547086a61ebc645af3f3550205c8b4bca59c

  • C:\Users\Admin\AppData\Local\Temp\623615\f

    Filesize

    290KB

    MD5

    44bb200868649a063953cf0bb7528502

    SHA1

    7db0b074ddb4f52eaf6ecbfbf41ce67a44b0daee

    SHA256

    7d2d6b8d47b9ee4ade15bd0c992190554268f235c18b27ea8c213d474ad6f7d8

    SHA512

    5592078c4aa02737000942fe204111c72c547b0732a26cb776c572441dbe8bcb9dcbe2443ede3fee47899e88e998f2a3b610ced103e834fa34673f28b55e5ba8

  • C:\Users\Admin\AppData\Local\Temp\Advisor

    Filesize

    96KB

    MD5

    cf44a9847f3fb78e1b20e0f6058e073a

    SHA1

    47517215a4145d9dcddb3306c0fb931c71ddfe9d

    SHA256

    d2e7128b474ac99272c683aaeee8a8f8bdc8638a28d7b5e769c2b894ebc45b31

    SHA512

    eaa9141b5c4bc8fcad07bf71a6dc14990b83b472bb8fbc156aaf694bc4a9fd984793f4bcd4058b6fb3d6fe88ad828bce2a8d44f556d3f67870ac484021510fe4

  • C:\Users\Admin\AppData\Local\Temp\Belt

    Filesize

    61KB

    MD5

    bbe29e56ffe75996e8ca9090d7d77f90

    SHA1

    d9aa67c8d72e772a80a5fe91b5fa2055abd7f703

    SHA256

    09ef3302b1439ce599d2aba0d63131a3c4dcbcba50a37abf97d700f120e5fcc1

    SHA512

    f0270133761b242495f079a91625ee365d2e9b127de3ecc773f0228fdf6e874b53ecfc09ab81ee7c5b0b8c5edba99ca74017692d032c0ba520951b92d267cf3e

  • C:\Users\Admin\AppData\Local\Temp\Cab8DE0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Convergence

    Filesize

    64KB

    MD5

    ee05be18d113eb275f51315fb037f70d

    SHA1

    7869c95e14b3b7f62dcff7f1f2466176af343cd5

    SHA256

    0f914bbe769aa4e7b0e26e0fa78714a7213050ef3907ccfa4a1488ce3b20df45

    SHA512

    0c857df0f87b7b4b53492aa743064c11335d1d99ae82d4ea252048d3b7550174224212dc9ee15b075be371b84fd17a5ee3cf1c7094fd0586d90e9f88b2a46045

  • C:\Users\Admin\AppData\Local\Temp\Distances

    Filesize

    476KB

    MD5

    c83a25d37c14b33c8c977950706e4087

    SHA1

    6116cf0a57be99402db4c76f72751e33d45b055f

    SHA256

    d84347b22e026490edb739141cd5aee2e1a97ee6050e07b93df005a61ec29f6f

    SHA512

    78ec95011f8ba59a734bc2706cb311201da0014863b374bb9431394d716095887cd1a923dd39442da8d5d0ba9fa6976e1eadf4eaa836e9c6583d322f9dd55c8f

  • C:\Users\Admin\AppData\Local\Temp\Ensures

    Filesize

    82KB

    MD5

    9055cd07ebc236d6a9ed59a00976303f

    SHA1

    b55ef932607c144e36b6729f59a0df49af31c546

    SHA256

    d08694349bc677e90fe0d2e398d84022057b042c386d861273e6b7339f532249

    SHA512

    9344045948b93c8305703e9e5e2ed6bb58535028ad58881e06727ae88b058e19e25fd7e790739383b1a3e1b2f11f73afac7fd9dca7bb677cc90da426d3996abe

  • C:\Users\Admin\AppData\Local\Temp\Fitting

    Filesize

    86KB

    MD5

    ad99fa74f69f99f32fa2d01579bf7080

    SHA1

    0b94621b4c8d976de408e736811af2a2b231dd85

    SHA256

    50d7f8da31679bb21dd88a973c03ea2d5da501f7b241a740bc1fa98c5b53ccbb

    SHA512

    77ae1948f088abd47ab53d8c228dff2b0479f73a455cc33a4f2ad3bf8f855579fc07a1d6e962c4d822de63fe3e0b01973b7d1608f12bd6893a04ec9619b9c10b

  • C:\Users\Admin\AppData\Local\Temp\Forth

    Filesize

    25KB

    MD5

    2cbba7ba80508761f55ffd4beb853102

    SHA1

    fe71788dca26e77f22548ffc39f01bc8f55d2823

    SHA256

    b5f643db2b4dfc24718865707806f6dd22d9a54eae16a603c7feffe9d98b49ce

    SHA512

    14ab42b3b60d7e7032b0836d0a53670a2d231200121da5618b06962a401903720a736df28d049f7cb3fe21e8da09acc6dafae5b86bb6afbd79307d99b80c6c09

  • C:\Users\Admin\AppData\Local\Temp\Gradually

    Filesize

    125KB

    MD5

    b472c3173839488298c86f463853d522

    SHA1

    4ea19e681d58dbd02318522523117290e5c34f64

    SHA256

    0ff238b71b54c5f33f282ca1e5c3d448bdc37ad8e67ef818766eaf965ee39b8d

    SHA512

    6b1a0b419229c0e101624d293640e12ca15de1063ea1ed8f1223072c5071cd952d57e2d7fe88e7f68b295e52b899b3773545b6e7e4fc127d0742814eb2a645e8

  • C:\Users\Admin\AppData\Local\Temp\Improve

    Filesize

    7KB

    MD5

    9748ff1c8dd58352459f2451049af2a2

    SHA1

    c0a19f1e749fa58bc03b7207d1be88d054c6c16d

    SHA256

    f6d4c8ebb3c24d734f4888df2ceca12f2836bb999f58e78dcd05cff4b27c135b

    SHA512

    3eb9d6beac6ea2c1fd8ecfcbcf159459b0b236b2c997191e84da058d5162cc9a77d132ebc42fde26891e13959ddc2a81bc8cc47c97111e42c7e5ba4e6e33ee9f

  • C:\Users\Admin\AppData\Local\Temp\Ix

    Filesize

    1KB

    MD5

    9adb0ca1567f35d30c412cbe89a53027

    SHA1

    a32e1d9eb580ce408943b1d91372091967b18be9

    SHA256

    29b99f845b00ea87a7da8b57001bf0561d5c87ebdda8caefaa3248edd7c87dca

    SHA512

    986234c956d90c732656dd16de58b528af17040364311f89f8d98a45736a7dd9c6394d4c36028b73575ded030654a84512711fa14153f079284508e964f40da6

  • C:\Users\Admin\AppData\Local\Temp\Kenny

    Filesize

    75KB

    MD5

    4f00e7d3c58ab52d2c6e8b6935b14e0d

    SHA1

    634aaef4c09cc4f8be78c7a8d1b7cb72f184c073

    SHA256

    1629fda7c2acc6e2c91b128fcd713efc4282fe6ac169d3804f639c16957efff0

    SHA512

    64873a21e2c0a581f9ab4ff6933fabcf117860998e73227340d0666d2c0e7017de8f57db8216dd643f9daf8c11ce73eef41e986e55ee7b64aad30435a6d5bde1

  • C:\Users\Admin\AppData\Local\Temp\Loud

    Filesize

    56KB

    MD5

    8daac6f10e63c4e0b8dddecaf6b8e0ef

    SHA1

    39441368910496dc889fe74ae20963e53f08a459

    SHA256

    3a479c5821fce8189ca2d04b48f7078f2266e8fd80e57ca4b6f4b9b2b724b26f

    SHA512

    7064cd9bbac4f9b792528b98b1f86bb9a283481f16c85a792d34c0d2f30a9bc4200cdf12eadfffc6720ef64b2df4187828dc7df0e836aeb7bb2ab6ccd022c93c

  • C:\Users\Admin\AppData\Local\Temp\Malawi

    Filesize

    136KB

    MD5

    6567d0c4aca999258d881932a4a6925a

    SHA1

    c82d413aa3d63f8b540f5ec85cb6993323c80a39

    SHA256

    b54a2ab660d285af9f9e829d97a7550b1640803c1bea965e747e92cb29a54ca3

    SHA512

    4cb7fa0c47009134d29523cfa005541eeb4f755bb884117a25983f3c92bd69a7d4f6499429074f5f9ff0597e4abc1c08cd804f78bcbb694d84f1bb522efc5dba

  • C:\Users\Admin\AppData\Local\Temp\Promotes

    Filesize

    63KB

    MD5

    d46df033b2afd716f44e8e9482b0c3f1

    SHA1

    058928cf46326c10f4f11bc817c387f4a3ad1a49

    SHA256

    d96c4cc9b7c57e3999b16a9ce661208b6d7782c6d12d9b7054cf737a18765d11

    SHA512

    2436c4733b94a8b8ec58d321fa4533af7ad1cae69bd4b5e7cb4e7d50b00fb369fd421664f0f1851f7634cba86e6ed81622c3099974ced2d81a9279616bab4f46

  • C:\Users\Admin\AppData\Local\Temp\Publicity

    Filesize

    86KB

    MD5

    ff2ceec537d5b6f00e079f35a28eca2f

    SHA1

    02e6b54bf4bb40e8aa2e633331f1a6fcb8e4fd43

    SHA256

    a42a43439f637db2cd812fcf086388808bbf5dd103e7e7d20590707d0c38597e

    SHA512

    26bfa8b19d875d41601f538a99d4eaa0fc04388f6d0689e2b4d22607aac5261e03e42d2e2804690ce1d6fc3a9317a969b1d0d94568cbd6a73843e7fdefc1989b

  • C:\Users\Admin\AppData\Local\Temp\Tar8DF2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Trademarks

    Filesize

    87KB

    MD5

    0d9676b0ace617d2f4b1e3d382fff695

    SHA1

    5b60c826a38c70430bab8017b76a27d945fbdbe3

    SHA256

    738d4b9e1c15109b85d7f0a06748dcf4ec018a0ef4abe917552f59a84ae6c03d

    SHA512

    b81d208d807634b9be1fc42f036fd4da41e50f84edd232b736f8588b22c5a4cf7534196ce6c873f2e9bab264ad4a11a9f5cbd3e6037e85dae58e766e81369188

  • C:\Users\Admin\AppData\Local\Temp\Wal

    Filesize

    119KB

    MD5

    19046e554a09e864445f82438d104a1a

    SHA1

    0706e729f7a4e535050dff2b2830781afc47d38e

    SHA256

    05f50ab0792f99e7d107ec120f436a093d94d97b75bcde861e19fa29f842c8f1

    SHA512

    2c9c9385bcec66ba5dd11dff14e383f72fc67e3be3f3529cbae8b2a4741f13b1b931a692c4b6f7ba2a5a0a9958141f7e6100d0ea631feee887fa6d279ad2e24a

  • C:\Users\Admin\AppData\Local\Temp\Wordpress

    Filesize

    70KB

    MD5

    de0be63d4a9cd3b9d4137ec3c72d0951

    SHA1

    19f744279539dd41f4e591c5efe35101f3a7f5bc

    SHA256

    6f2d36e5713cd1a319a8ce22171b16c95c9d0c3d7f75ff6a93e1ebdf19dc8977

    SHA512

    3ab18e5de48ad1aff696855a7925d32f2e3fa3682f9cd421d7337caa9b35c9f3070b75c20711be9e016959fa8ed17176cc3fccf5af8bb2304edc57fbf37b4b82

  • \Users\Admin\AppData\Local\Temp\623615\Wb.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2420-72-0x0000000003690000-0x00000000038C9000-memory.dmp

    Filesize

    2.2MB

  • memory/2420-74-0x0000000003690000-0x00000000038C9000-memory.dmp

    Filesize

    2.2MB

  • memory/2420-75-0x0000000003690000-0x00000000038C9000-memory.dmp

    Filesize

    2.2MB

  • memory/2420-73-0x0000000003690000-0x00000000038C9000-memory.dmp

    Filesize

    2.2MB

  • memory/2420-71-0x0000000003690000-0x00000000038C9000-memory.dmp

    Filesize

    2.2MB

  • memory/2420-70-0x0000000003690000-0x00000000038C9000-memory.dmp

    Filesize

    2.2MB

  • memory/2420-209-0x0000000003690000-0x00000000038C9000-memory.dmp

    Filesize

    2.2MB

  • memory/2420-210-0x0000000003690000-0x00000000038C9000-memory.dmp

    Filesize

    2.2MB