Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe
-
Size
21.1MB
-
MD5
6d6bbf1e873fb791141ea7fe2c166dcf
-
SHA1
bb43a4a6bcf531617ba95c4a9a18807322196f6f
-
SHA256
168ae0f09a9376003d735b592b46125da5cc43d7e13ce7d9007328f76fb4ae8a
-
SHA512
b10059c3696fa4cc216cb54dcb2893453bc85f496372aa0f369a081abe6632dfc2a1e8fb8bf37db867fb8f71e0467b6e467b8a9a79a253ddb550491e22d7a2fc
-
SSDEEP
49152:OZN6W2fQrQOVlMmtSUmUCAI/sysIDuEjj6fk2UucKP9dQb:c6WDRKLUCZ2UucKFm
Malware Config
Signatures
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral2/memory/2136-1-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/2136-2-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/2136-3-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/2136-10-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/2136-11-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/2136-12-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Vidar family
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4064 set thread context of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2908 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2136 BitLockerToGo.exe 2136 BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 4064 wrote to memory of 2136 4064 2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe 96 PID 2136 wrote to memory of 2400 2136 BitLockerToGo.exe 100 PID 2136 wrote to memory of 2400 2136 BitLockerToGo.exe 100 PID 2136 wrote to memory of 2400 2136 BitLockerToGo.exe 100 PID 2400 wrote to memory of 2908 2400 cmd.exe 102 PID 2400 wrote to memory of 2908 2400 cmd.exe 102 PID 2400 wrote to memory of 2908 2400 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-25_6d6bbf1e873fb791141ea7fe2c166dcf_frostygoop_poet-rat_snatch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" & rd /s /q "C:\ProgramData\89R1NGVKNGVA" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2908
-
-
-