Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 21:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe
-
Size
13.0MB
-
MD5
b9f9c8e89f6b320ea6902a9134c2e08b
-
SHA1
8e826bb7842def06b4882f904529e651ce2163e3
-
SHA256
516d15f9154a2c096effe0797ddef98d44bc1b7e8469880cfbada34ca812acd9
-
SHA512
e96addc4e7197e43119c4dc3fb79831ab4440a69cdca260b372304957082e080e71763e56aed638e8ce20115ae80c43ec2456fe3b4fe00a971417f433155fc1e
-
SSDEEP
49152:OZN6W2fQrQOVlMmtSUmUCAI/sysIDuEjj6fk2UucKP9dQb:c6WDRKLUCZ2UucKFm
Malware Config
Signatures
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral2/memory/4684-1-0x0000000000880000-0x0000000000AB9000-memory.dmp family_vidar_v7 behavioral2/memory/4684-5-0x0000000000880000-0x0000000000AB9000-memory.dmp family_vidar_v7 behavioral2/memory/4684-7-0x0000000000880000-0x0000000000AB9000-memory.dmp family_vidar_v7 behavioral2/memory/4684-8-0x0000000000880000-0x0000000000AB9000-memory.dmp family_vidar_v7 behavioral2/memory/4684-15-0x0000000000880000-0x0000000000AB9000-memory.dmp family_vidar_v7 behavioral2/memory/4684-16-0x0000000000880000-0x0000000000AB9000-memory.dmp family_vidar_v7 behavioral2/memory/4684-17-0x0000000000880000-0x0000000000AB9000-memory.dmp family_vidar_v7 -
Vidar family
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4144 set thread context of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3920 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4684 BitLockerToGo.exe 4684 BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4144 wrote to memory of 4684 4144 2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe 82 PID 4684 wrote to memory of 4636 4684 BitLockerToGo.exe 91 PID 4684 wrote to memory of 4636 4684 BitLockerToGo.exe 91 PID 4684 wrote to memory of 4636 4684 BitLockerToGo.exe 91 PID 4636 wrote to memory of 3920 4636 cmd.exe 93 PID 4636 wrote to memory of 3920 4636 cmd.exe 93 PID 4636 wrote to memory of 3920 4636 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-25_b9f9c8e89f6b320ea6902a9134c2e08b_frostygoop_poet-rat_snatch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" & rd /s /q "C:\ProgramData\G4WBIWT2NGVA" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3920
-
-
-