Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9a81c39e295232f87c93e35106646293d7b0e24d23021fb5dfc75240e0bd3257.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_9a81c39e295232f87c93e35106646293d7b0e24d23021fb5dfc75240e0bd3257.exe
-
Size
406KB
-
MD5
5578e6e62c21c4efb27a490f96b3021d
-
SHA1
b274063f380e62142c071b0a562bc1286611c1e5
-
SHA256
9a81c39e295232f87c93e35106646293d7b0e24d23021fb5dfc75240e0bd3257
-
SHA512
e7e771fcb7c9836952640ea79b2f916f688ddfaa19edd08971d4aaa8835e6df661dd330605cdf333bc3c136319882a8ae45a8f2c86219907d18bc4a768ad005d
-
SSDEEP
12288:3x30YI5yikEydaz8WavBYFTqaWSjV6eQN:B3s0Lava64afnQ
Malware Config
Extracted
vidar
51.9
1163
https://t.me/btc20220425
https://ieji.de/@ronxik213
-
profile_id
1163
Signatures
-
Vidar family
-
Vidar Stealer 6 IoCs
resource yara_rule behavioral1/memory/2340-2-0x00000000004B0000-0x00000000004FD000-memory.dmp family_vidar behavioral1/memory/2340-3-0x0000000000400000-0x0000000000451000-memory.dmp family_vidar behavioral1/memory/2340-5-0x00000000004B0000-0x00000000004FD000-memory.dmp family_vidar behavioral1/memory/2340-6-0x0000000000400000-0x00000000004A6000-memory.dmp family_vidar behavioral1/memory/2340-7-0x0000000000400000-0x0000000000451000-memory.dmp family_vidar behavioral1/memory/2340-8-0x0000000000400000-0x00000000004A6000-memory.dmp family_vidar -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9a81c39e295232f87c93e35106646293d7b0e24d23021fb5dfc75240e0bd3257.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a81c39e295232f87c93e35106646293d7b0e24d23021fb5dfc75240e0bd3257.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a81c39e295232f87c93e35106646293d7b0e24d23021fb5dfc75240e0bd3257.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2340