Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 14:58

General

  • Target

    PpmSubscriptions.exe

  • Size

    1.5MB

  • MD5

    65d22eed9430388f478d259c13b91151

  • SHA1

    3fd6c1b050b7fda4c00b60960aafcaa1f2ac8199

  • SHA256

    a3a7d2d924f021a1c29dda0fbdf843d52ca294a0c0bf136e151002d34df92a18

  • SHA512

    0eeffbaf2ade4a66e9cd1a50eb954003693715bbeff76a2012d15930a164cc3f8176ba29163c13a95e52e4fbad0e9848e3bbd933e5519f803ce5277d7eee9d37

  • SSDEEP

    24576:tko+UVlXebkk9pmiKJr9Dn9bUAYAa2i+4yeLJDWuN1A5W+IdvNthwsph7u:5lO4k99E9Dn9bFTl4yuJDnV+Id1UqQ

Malware Config

Signatures

  • Detect Vidar Stealer 4 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PpmSubscriptions.exe
    "C:\Users\Admin\AppData\Local\Temp\PpmSubscriptions.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Calcium Calcium.cmd & Calcium.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2684
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2120
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1408
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2688
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 815951
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2544
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "artwork" Passed
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Reporting + ..\One + ..\Liable + ..\Code + ..\Cashiers + ..\Est W
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2400
      • C:\Users\Admin\AppData\Local\Temp\815951\Screenshot.com
        Screenshot.com W
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\815951\Screenshot.com" & rd /s /q "C:\ProgramData\00HDTR9ZC2VA" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 10
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:1184
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    229aa5f9b8ba9eb0febd228bb1e94038

    SHA1

    3cfdff357725a4c7dced468065672b9f38635ab0

    SHA256

    c65df0278026882fa21eb9729e78b24650c1515426402080931221bb98ca87e7

    SHA512

    606a676c57c1abdc0af5d1338d943c7e537b46cd3140609315cc4a70b625edd851e6ca86611ac3e1da7e47568ffcbc934dd74f8be88126efb74f7e7e064ee7ad

  • C:\Users\Admin\AppData\Local\Temp\815951\W

    Filesize

    396KB

    MD5

    6a7db8d85a7ed147975c0a76bc63a6b7

    SHA1

    34657091af5f691cf027c19aac172675776e7d03

    SHA256

    82ddacae764a16ff866e7da0bd3d7b432c1fd0eae0094e371526e95da8e1d7a3

    SHA512

    d5965c824779960d50b8a460dba6b4046472c98ea83774fa8a2b282ae3fdcfe2a19c84637897af5aebfb139a3d93c1f4713c0a994cbe37b0b8491f4367157e22

  • C:\Users\Admin\AppData\Local\Temp\Brighton

    Filesize

    69KB

    MD5

    800140c62a1caf6d4a5b5be20d691a4f

    SHA1

    29f90b42aa74869c7bd49080113b130607afdeac

    SHA256

    f62c6cc265289d67940bf1161e9995914f86a8ee946c58002950c14b93f601a8

    SHA512

    c4387cef40f37235d0b2838b54d699bd7d3af2695bfb762d060cb4798de74beb3ba947bf45e54b150b0a37f82bc73fd735a2c19ea83a2789505adc8831c8a975

  • C:\Users\Admin\AppData\Local\Temp\Cab1FB3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Calcium

    Filesize

    27KB

    MD5

    8587422c8aa5c693ab7cbe6aa164b417

    SHA1

    3bc48c54608184c6b339d1dfba60466bfa975c73

    SHA256

    fe0ee756f14547fbadef9670e7fd02e4c220be42747387cfea5a17775e83b592

    SHA512

    9c646fee69377c60fec82898fc1895709859a60002b942da2ec630b682fbbe884620c91e12a7e41816c2cb334ef76ce4288510a9ebf66cf252db205bf6c85fa8

  • C:\Users\Admin\AppData\Local\Temp\Cashiers

    Filesize

    83KB

    MD5

    5f44eb5c967657c9e86a134105238d6f

    SHA1

    2efbfb0a6b70319fe7269c336386f7f8f5060090

    SHA256

    1388116ae9de3e7a702d7651c741cc250c0d8bc513186f0238f901f5de0afa32

    SHA512

    55b5f4d6f36be14cb85008ac9ebd2d9ee43c7ca489b1424f9f6ec9c8984ac36681dc7926a80b0e284790f0bc6ac40f865bad577f52780d0fda9954348b224e97

  • C:\Users\Admin\AppData\Local\Temp\Code

    Filesize

    77KB

    MD5

    f50faed04bb66633f487ecbbf9882f1a

    SHA1

    33b5c854be7b257fe4778529af8252a36eae0783

    SHA256

    3c73c485a78f02f83ab20c574f9b7324403e2f73baf7196e620d80f833a09935

    SHA512

    a80ecf948acbb3cfb955b2867fd64b48753ef6f2d2cda1bbcc44f623386335d53a2e5e1139ca8862d8d622e8baed9edf765943f39885ba1e3f4679d7f753fe9d

  • C:\Users\Admin\AppData\Local\Temp\Creativity

    Filesize

    69KB

    MD5

    cf613611fa89066fd411ca0c4e1361d5

    SHA1

    0a5b25b7c43f642c40564151592899e3f177200f

    SHA256

    2c8683467184336a78826746c6bc94bbaf341e6f88333585f437814d341267ef

    SHA512

    62911f5985412766e7434f43e69e56d7a4001dbf38189632aef2b2fa241f5d86c6a58af7516c723bcd45ae55264898956f701aa5374665c85278fbbc380c489a

  • C:\Users\Admin\AppData\Local\Temp\Deserve

    Filesize

    95KB

    MD5

    c11fd721f9baeb3c3a65d1cdc06602a2

    SHA1

    d46fad5366ffb57f76813d66e29b69485b63cf99

    SHA256

    8b89ba3dba13b04cef436f293b6faad38f587df53d397da5819f1513c9eacf5c

    SHA512

    732ed874c7fd749e9a7dbfa3c09df7cac2b2ae1dd0479247e64c23286f04fba6af34ba571f17fe9b6d39385464c40353af06bd1bdf5205f294a75802d3954fab

  • C:\Users\Admin\AppData\Local\Temp\Discussions

    Filesize

    135KB

    MD5

    6d6e95f0dbbb9f66abddb10382efd635

    SHA1

    a587b9814f60f9ad623524611ba0440626f34b23

    SHA256

    10d1a00fe863cab334823510e60fa05effecdec9d86488b0bd2d35d0567f35cb

    SHA512

    0afedbbc9759738c43320b602a3ec279c75a160f108461449b91ecff1e07a9ef0d25da26d30656da8ccaad3270ef56bd86cd21f09db78698951e607d960fb62f

  • C:\Users\Admin\AppData\Local\Temp\Est

    Filesize

    191B

    MD5

    c6f5a3e8d97de9a6c09b3d12ff05e873

    SHA1

    587b7fc38e4757fc26c680809dd52a7faea7ef34

    SHA256

    b5419ec8ebc587f6a3f85bbfcf7ae6173f537d1dfb36bf13e27d75e9aec82ef8

    SHA512

    a936a2dd04bc4fab1943155fe14d948cac1189392ae58eda14b59f3f3751230a21f469e62dc43bb346a8eb12377539f6a342e6743e64a9469a21f9480d9a73de

  • C:\Users\Admin\AppData\Local\Temp\Home

    Filesize

    31KB

    MD5

    14c374994e755a90441f2acba7dad3ee

    SHA1

    947dc6e8ef6d2d4c6b9b465ae3b0767da6c744cc

    SHA256

    e8abbfefafc93f3ea0be9b89d7e5a3d51d4cb2c9b42141f57a195c71abdf1504

    SHA512

    63e2ec5caef1e188fba196e1cc6c3767e5f0dce2e3e9cea3e57917eee0407cf912f9514758949c97e7039979bae84d9b71c2782a6dec4a4929ac007cc86002a3

  • C:\Users\Admin\AppData\Local\Temp\Installing

    Filesize

    72KB

    MD5

    b82d000da85f5b875ec154d9f9359df6

    SHA1

    9da4547abd37417ba3b00d4374144f24e75d3c1e

    SHA256

    5137712b0bdaa8857b9d5862ef8f8d3375518600a1caedb5ddcb4565404f8150

    SHA512

    6f7f980ee8d74cef2dac9b742dc3607ff740a113252e8a423b6cced99f279d0ed382e3ce5d5fc01dc45f70ebe00704554f134bcab57700b83c6aab65e38f7197

  • C:\Users\Admin\AppData\Local\Temp\Liable

    Filesize

    63KB

    MD5

    3963c82707e90126e454a170693a7239

    SHA1

    edca4c7db2ecaea5e458b58f9ddbfd4d9340a442

    SHA256

    245ab548d12bac2b67a5925202bc690d5752ac65fb9b54f8d74cd8dc619babee

    SHA512

    6d1a2c31927f6741a0f04304e3d4cd20747e0b42c54818d7b7b77ae5749b439ec79e7266124e364ec7a835b6246214297325d6fea0bb565b9936cbb58cd554d1

  • C:\Users\Admin\AppData\Local\Temp\One

    Filesize

    99KB

    MD5

    178873173ce0a535a170b60e2739886e

    SHA1

    b3213cca7bee1d8a50b34664f56ac19c182884c6

    SHA256

    01e1c1069ef37e08995b4ed04ba634b1d110f8dc3cf51cb7c17dce10ec492f06

    SHA512

    bd424a53c440e090aedd536f82c9eb478ff04756a5cc2da6fc7c15aa981e413b8254d5a2e1d9b9969852aa35d214c18ec60a3d820f52d8c30e84dbd77f8173ec

  • C:\Users\Admin\AppData\Local\Temp\Pas

    Filesize

    87KB

    MD5

    f5cafb3ca1193320e8867439b6e80908

    SHA1

    41593b9ca73ff489415e2fa00cef36a8a2d63f58

    SHA256

    b800fabb812ea2dcaecaf176f80e94bcaf328eb42921616813a6e20fbca4173b

    SHA512

    c0183cf3f6b0f3f74382304507b66ef8c6539d2622d7c50d598ca51f7e580788c03385de764e60728c095d84c07cf5ca32f96215fdcbc1d23fb49c5536114587

  • C:\Users\Admin\AppData\Local\Temp\Passed

    Filesize

    109B

    MD5

    f63b2f6807453b1e0ad2a4ea71f1a3db

    SHA1

    af4b2dc8dafa90ce3ced9db36abf15fc7d0e028f

    SHA256

    88a19af86dd136e5b7af3f7e54089493d7b1d28c795cf87592ca81f7073ef0b3

    SHA512

    b8aa7550285d1141d8a13708d0130e5f26b257b03944e316a641f498c69dea7f1bc1e2164709d7e9ff7096663a36342cc74c9081ebdec3617575128233209036

  • C:\Users\Admin\AppData\Local\Temp\Reporting

    Filesize

    74KB

    MD5

    43437fcfcc247a530b3182d3569af041

    SHA1

    4fe39e9165b5f4cabee2c59fa77c445486945ff6

    SHA256

    131ea271c41ce04edcdcb1f43d3cc4ab73f89285666faf2ced1b55a196b95093

    SHA512

    df8cfe98f88df119e36e369c9ca2f2a77978d45ca5d4f723d28ab47126e8cd5545c09716a4f68dfff9830ec509f536836c41281fb0a30ec6ae2e43557ef782ce

  • C:\Users\Admin\AppData\Local\Temp\Shareholders

    Filesize

    141KB

    MD5

    65b2254d334faef1e0099c76f0834b9d

    SHA1

    fcf1a5a421461ef60d0d016d0142944b8fde3f6a

    SHA256

    1e4319ba9a0b61b658d704269d5d16549c4e539a7d3ed411dc7a11d90e2974c7

    SHA512

    33c4e33b61d3de75d0620171f9ab4d67776dea0118414c814b63484f3750564b73d55a9fe9e53c6035dd575b56d96285767c7846414c9cea4fd99ceec3b39428

  • C:\Users\Admin\AppData\Local\Temp\Some

    Filesize

    129KB

    MD5

    62065881c20070b99f076d38b592488f

    SHA1

    8f601093f9e0f6e8e4d109cecbeb0d8f01bea125

    SHA256

    7b896bd69d6476634adae5ce23383a7eaadb7722ea1f286e61b31c0ad0343a98

    SHA512

    6441c7bc74e6a6d4c901a8c510313753fccab57753334a37072789e5327ea00994a58913be9d816d418143e70b7c163d82a77816fbcbc3c38bcaeefad02d9ca0

  • C:\Users\Admin\AppData\Local\Temp\Tar1FD5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Terrorist

    Filesize

    96KB

    MD5

    463ac359dd04e261dbd8ac4c3158184a

    SHA1

    ebc1ba3bf2380173ff1c86a91f16449efdecceb9

    SHA256

    3f625e3de2e2a09729cfd8b98d27278d8dbb74ef4dd5337e912ac13ee324fb36

    SHA512

    b23abc19245477b7171f1b295caf8947aa3029e0aa2dce6d46e0301897e64413ebc5b1eb4da1e7f8082db85d0a3315dd389e33e640d9dc7b5a33ced6b8553202

  • \Users\Admin\AppData\Local\Temp\815951\Screenshot.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2760-46-0x00000000031E0000-0x0000000003419000-memory.dmp

    Filesize

    2.2MB

  • memory/2760-49-0x00000000031E0000-0x0000000003419000-memory.dmp

    Filesize

    2.2MB

  • memory/2760-51-0x00000000031E0000-0x0000000003419000-memory.dmp

    Filesize

    2.2MB

  • memory/2760-50-0x00000000031E0000-0x0000000003419000-memory.dmp

    Filesize

    2.2MB

  • memory/2760-47-0x00000000031E0000-0x0000000003419000-memory.dmp

    Filesize

    2.2MB

  • memory/2760-48-0x00000000031E0000-0x0000000003419000-memory.dmp

    Filesize

    2.2MB

  • memory/2760-185-0x00000000031E0000-0x0000000003419000-memory.dmp

    Filesize

    2.2MB

  • memory/2760-186-0x00000000031E0000-0x0000000003419000-memory.dmp

    Filesize

    2.2MB