Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 07:56

General

  • Target

    PodcastsTries.exe

  • Size

    1.2MB

  • MD5

    20bef33e4a0add922ae043e2aed13ea2

  • SHA1

    4d0353be8234f56862b7ea7ece4ded3eeef91cbb

  • SHA256

    847c28adfa050608203f206d31cce27f1f27e89ab138908473c8c69ccf388ca2

  • SHA512

    7a387b96497c0026d01820e586e4d0a9686b9927c3270a18170a1e5c138dc8bbee759bed63058fdc865a613956ca7258f7058a6fff78a156f85d6d9a8421c469

  • SSDEEP

    24576:Fx9yUoL9cVIpol/OQy1HvVrQaygJy/LilXabJUbsVF1M2/y:X9loLhpWIHtUvgyz4KbJYsVzy

Malware Config

Signatures

  • Detect Vidar Stealer 4 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PodcastsTries.exe
    "C:\Users\Admin\AppData\Local\Temp\PodcastsTries.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Assessing Assessing.cmd & Assessing.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2820
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2652
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1904
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2544
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 680662
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2596
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Memo
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2620
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "OBTAINING" Compensation
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2052
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Honey + ..\Biotechnology + ..\Enzyme + ..\Harvard T
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2040
      • C:\Users\Admin\AppData\Local\Temp\680662\Billion.com
        Billion.com T
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\680662\Billion.com" & rd /s /q "C:\ProgramData\HVAI5F3EKF37" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2652
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3905f470d6ef94436e2bef23fe2b1741

    SHA1

    961054114c0ad6d6986a8af95c285d530f8d154a

    SHA256

    1442ebaaa6899a88699cc58d61512c973b2f1b203dd937d6f178c5683e0ad508

    SHA512

    b66b69226ac2f9074482f48cec38bd90ba2f8aabd5724497456b126abbf2542620fe5f065ff7a7aa6d1def2e9e72f0df4ae13e26951672caae457ad283dd602c

  • C:\Users\Admin\AppData\Local\Temp\680662\T

    Filesize

    283KB

    MD5

    aee70d72706e4448cd9bb63916c2fb70

    SHA1

    b1b973d61b3e8fb6e8c15a5096f3189307d436c9

    SHA256

    6fef118ae00bc96cd5d4e47c831a683342bd838c2cde5ca6a70c907a88f25e0f

    SHA512

    e74f1bcd95823a94a80f90624b98c57f1ac6d5ca7fe2f1fa2e62936882c66b19e804c5b93f040b15beb82a0a8c8de6125c7a4201838127b0a475778121ccb8df

  • C:\Users\Admin\AppData\Local\Temp\Alarm

    Filesize

    132KB

    MD5

    13a2635497f70d3d361cb002e767d98f

    SHA1

    1e87e1a3dce0f80f70f6cb94f0825c7a6a707325

    SHA256

    733d061aafb568c70df42cb730fd2077192ae87386d0a15cc029616f4e3bdc55

    SHA512

    27d9f84646b7ba6ac5c3323339b6cfc3a5798e01a9ea69de0d0048b1b06562de27a6e85568b26bdb059ef5c1bdc8ab287152b5b8355872a0ac90d1c2521654b5

  • C:\Users\Admin\AppData\Local\Temp\Ana

    Filesize

    81KB

    MD5

    e1172435d03594f9679fe60a14e30199

    SHA1

    20029de30935943707446474f606dde5f4cc49c7

    SHA256

    b4c00d09a27d96bf3f0963c09299a6c3b5839c151d2e49291299a749c189b95a

    SHA512

    ebff9ce05eb9cc7bab03ffcdf8f6f44b5df83849e53a93ef5f6843eda2bc1a38e651dfdbe14d1d9103b06fb77857b08958145c62413ad9ccacb96ea652c68961

  • C:\Users\Admin\AppData\Local\Temp\Assessing

    Filesize

    8KB

    MD5

    1a3d71246d4efca4aa005e013b7680cf

    SHA1

    a171887269f1f331eba1eb0084f3d5526aa89a52

    SHA256

    ca033ef4c6bae09e2b6492b881454409c962b89e1b5e7b8a59914eaa72daec45

    SHA512

    d413b8f9891a95b8483ad10ee7e20317db2d286b3806fcb407f9e1c592cd67e411d78f82b3efc8fd875a66276cf6c5d405425b3d7897ae59ae1c34e6ea88e052

  • C:\Users\Admin\AppData\Local\Temp\Biotechnology

    Filesize

    68KB

    MD5

    f0cf3a7260c8d6f7fed49ed8a8e2db62

    SHA1

    a526b2247d3ca5e94327f0e790a8b1c402604d15

    SHA256

    31c1246a4cfb9667f9c36ceac2b5060dc12eb871215a2452ffba709c783122bc

    SHA512

    dca64511b80d3c1d508b9a22bf92e8f07b209b867c55343e095423d59a90ca0a5a36fcdcd98c300e997850b64bec8046be1e8e150ca47809c951e1c0c032c5d4

  • C:\Users\Admin\AppData\Local\Temp\Cab3B2E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Compensation

    Filesize

    528B

    MD5

    8e1bfd84abbd93e396b7eb834370563f

    SHA1

    3f08086eb5c5c56202606cf98f3337c39c4fca63

    SHA256

    8a91ee541db819325e37068db7ec112d6713f1bdbbfb6599cc5f93409aafa8af

    SHA512

    add592639ae154dd30e3bd10149def542e15ed1644afe0228af2488e7aa0233adcd06aaae48e92741c383b23b8026d1c8be2b32687e65e07bd99b262296f07a8

  • C:\Users\Admin\AppData\Local\Temp\Enzyme

    Filesize

    89KB

    MD5

    e55e49c9c9654822ebcf66f646aa1807

    SHA1

    b43d0b12490073e8006c41019311c2bce71faf3a

    SHA256

    e3e47c5af4df600b306067ea0fb0edbde366da0adafbc4846259f0b8e193c868

    SHA512

    33e308d477bd5d99905cbc6dff527c360dd87a85d9854e992cb7779e27f4278c0cfe72cbd1068fe256ccb628f40e4c8918bb5199baea24408920cea3f6113a10

  • C:\Users\Admin\AppData\Local\Temp\Harvard

    Filesize

    70KB

    MD5

    cdd966e83ca5f20e6307375facf3d8df

    SHA1

    bff4dde0c3f4ddbea78f4c7046200f492c75b49f

    SHA256

    ab1f5070e1d6e92c6e6bf653119546f90abd9e91cffd248d2394e86588a8ffad

    SHA512

    cfccf7ff1e7b1fb4d3f7578ea4b21be0c07ac7a9d35e78feead9fe5bbdaad02285979fa999260c0ae9e694b0b36029f85f797c40ff0f5c190f8cd31818033f18

  • C:\Users\Admin\AppData\Local\Temp\Honey

    Filesize

    56KB

    MD5

    207bb64422a97810f4f806ba44b76725

    SHA1

    b9cce4855f79c9bafd56cb9025af4e12451ff1ae

    SHA256

    1f3f9acf2ef4473687e1e986406bb44fbdeffcff76ced7a034ecd3d2763187b0

    SHA512

    c6f1a4a20caca09f0249b8157897b3b8123129ceaee9c015f6fb3f2b39a57260510ad313cc8e4c01b458df512a223af8664cc40aed7788a20f3d5cd16e615e2f

  • C:\Users\Admin\AppData\Local\Temp\Hotels

    Filesize

    59KB

    MD5

    ffb68ff89889e9965e528019d1e976f1

    SHA1

    7d285b29e9dc3c954a64479efdc3b554c89ec988

    SHA256

    9a55913d254693465e5013c2cb36c4e09b04cf00a3c39c14e5e21a61abe311a9

    SHA512

    d10a74acd3dcd99312213cb7d167dc3f0dfaaae0cf66cabd721762411d2901d181de9558677621be173cfe7e0827de936b9ee9e618cb6cdd7d6f70fed1b3e782

  • C:\Users\Admin\AppData\Local\Temp\Imported

    Filesize

    110KB

    MD5

    e31c33dbe20b6a1dd992687a23959a12

    SHA1

    03f272995cb57cf0189367cb60ba718daf6310e5

    SHA256

    a238084b94293c59a4dbf0b8748b3241d859355269ef7b4daafc6cd26f8033e9

    SHA512

    5240e18828a76991d1946330bf40a8306cc3db8a11736f3d380c2855acc16537e27571172c9e8b03d13fedc9b7da3289f414a040398b7d10344286e1f7c32973

  • C:\Users\Admin\AppData\Local\Temp\Inside

    Filesize

    101KB

    MD5

    d8f5eaf8f6342d4f4d85503ca4d301ef

    SHA1

    3ba8b23cab4afb7558dae86e36cd99e34302a96b

    SHA256

    aa9cd7a25b03d039a8cd442097b57815e3325bf581bb5061fe8d97f1151b825f

    SHA512

    6ee44a9776030d0e5c63b124cca4e06b5c04fd32fdd6ba9537d59a9cd8159a846897679683c91e24d62e59bb50225267e9084c6144a5e4ce54b2f38462595352

  • C:\Users\Admin\AppData\Local\Temp\Investigations

    Filesize

    67KB

    MD5

    af0ab424e8eedebaad067b7858fea8e8

    SHA1

    60ba0052cdadc2466a1749f97db3dbab5e9251c4

    SHA256

    9e06aecf3d87ebe1db7cced2e5ba280c90d474146a439ef5f2ddb9bee70d56ad

    SHA512

    b2455143eec881ffbdfe29ecba5c26634c3d5dabdb02018c4d4ece6060ebf56a6facb1280a349577af51b7fe85199d33a922a24eff321106fd9dd308c2349a8f

  • C:\Users\Admin\AppData\Local\Temp\Managed

    Filesize

    91KB

    MD5

    9e321dfcce426649c3d616e4e2b75c1d

    SHA1

    02734ebec30a12bfd88bdd050e9ecaa61afee74c

    SHA256

    df97aff410243492a1699143e47d56dcac03f6d75a8ef1b260230da19c43cc52

    SHA512

    9ef758a2a5cec9d0d546a4926b05c99a0ee092ac5dcd8dd1642e5ecf1368ff7197c67cf057d0df0c22ced8be19863be9e3bbc09cb6d54b3dfe636948938acaad

  • C:\Users\Admin\AppData\Local\Temp\Memo

    Filesize

    478KB

    MD5

    6366e6809399935ddf2c3b586966a6ad

    SHA1

    9e4ba3de989dbd0320e9fa1ad58e2dd1f4054e39

    SHA256

    cf8c686a8b0f8c2e5f0df3f21285eafb5967099b0bc7e3656d9cee0ba121014f

    SHA512

    5c7b1373ceb3b2431f26881174f123bfbaf4b97cefed5dcc2c9f891ddf55b27d5280aa7663ee2603bd5a3d2c0240589c11aff4eae8cae731ddedbaef711d4049

  • C:\Users\Admin\AppData\Local\Temp\Modules

    Filesize

    50KB

    MD5

    4ed0758aab64693c1223b86f38e29881

    SHA1

    b0e66408119fa1e9445cd1d96e3bf24f2143640e

    SHA256

    20475df0585b1246382ee087041588a7bc19b50f0215918cc6e75a0490080358

    SHA512

    9d56b1ee3ee441a5e26983e000f93d8f494ae75fac42c1802578f3b101d35a969974a181c2fec22e7ca222d62c2ff2a3283ca4c2e792f0c878894fb663962fa2

  • C:\Users\Admin\AppData\Local\Temp\Pursuit

    Filesize

    56KB

    MD5

    0327acd88e3da1b11d3762f0af700392

    SHA1

    c8528d2ab7016a043212dc77c734683e9e261c34

    SHA256

    a1525c0bb5dfb6e70f0fa5f5dd46ee4caf1b9705699c41802337b5967e57a352

    SHA512

    8639ce459611fc817b4897ea92586c4d57ebcada4efd577dce2048a2f59e3683715f04d75ef4a802b2f40c02eeb7144548cccfa33cc61aed27c75b5776dd8994

  • C:\Users\Admin\AppData\Local\Temp\Seats

    Filesize

    100KB

    MD5

    56a58cde1e92c2fb8573d592c7d02589

    SHA1

    08e057abf8985d0a68a358b38148c5c553021670

    SHA256

    80efd8cf4bdf20ba34e33607019ac6886e11b6a7ee23497808fe4800ca1eff6c

    SHA512

    dd2d469fc86e6ffddde67d093d9673b2a2cc685e95bfe52c0bce73c93ab63d4dadce55110faedd4e09a3a01678a3317c2f0982a871617ac9cb0ded8b79b7ea92

  • C:\Users\Admin\AppData\Local\Temp\Shipping

    Filesize

    77KB

    MD5

    8f98428de673ad45cda24eec4fbae1ef

    SHA1

    89d66ef54b642cc8a4f11f25b803869771c22ad3

    SHA256

    5e29a9d0e92213d14820e4ea8c1b7b62ee1fc8d2221886c73af71f741122694a

    SHA512

    9dd83124240fa66eadcab214a14c43946cfa392171708ca199fcd5378e860252ea9076c175c855b6b0db3c628338e5e0e8c5fb9fca30e42197b9ebd3cefc526c

  • C:\Users\Admin\AppData\Local\Temp\Tar3B41.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\680662\Billion.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/1172-74-0x00000000035E0000-0x0000000003819000-memory.dmp

    Filesize

    2.2MB

  • memory/1172-75-0x00000000035E0000-0x0000000003819000-memory.dmp

    Filesize

    2.2MB

  • memory/1172-73-0x00000000035E0000-0x0000000003819000-memory.dmp

    Filesize

    2.2MB

  • memory/1172-70-0x00000000035E0000-0x0000000003819000-memory.dmp

    Filesize

    2.2MB

  • memory/1172-71-0x00000000035E0000-0x0000000003819000-memory.dmp

    Filesize

    2.2MB

  • memory/1172-72-0x00000000035E0000-0x0000000003819000-memory.dmp

    Filesize

    2.2MB

  • memory/1172-209-0x00000000035E0000-0x0000000003819000-memory.dmp

    Filesize

    2.2MB

  • memory/1172-210-0x00000000035E0000-0x0000000003819000-memory.dmp

    Filesize

    2.2MB