Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 18:28
Behavioral task
behavioral1
Sample
78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe
Resource
win10v2004-20241007-en
General
-
Target
78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe
-
Size
279KB
-
MD5
78656a9b1ffae68fa53e8bbcb00bf586
-
SHA1
033b0bd0c08167eb5c785a098d36ba55c05fc468
-
SHA256
78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50
-
SHA512
bcd41e5d8326e42e6b12312ce2d5cf2dbd94421c7f481037c4f3f42db6ef7aa935316f11af03a1698d56fc560d88f23aaf6dd65e415e67ef10f29ad8918b425e
-
SSDEEP
3072:lOBRrLUOPed9xOi756fJnhsRSK2C22/m4ESZo3XRYzXIkQfyyzdEpxSJ+LcEZbeD:A/rLVPW0nsP2Xy+TJfzzW7m0qW8VJV
Malware Config
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/4000-0-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4000-7-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Vidar family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2772 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4000 78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe 4000 78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2464 4000 78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe 82 PID 4000 wrote to memory of 2464 4000 78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe 82 PID 4000 wrote to memory of 2464 4000 78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe 82 PID 2464 wrote to memory of 2772 2464 cmd.exe 84 PID 2464 wrote to memory of 2772 2464 cmd.exe 84 PID 2464 wrote to memory of 2772 2464 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe"C:\Users\Admin\AppData\Local\Temp\78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe" & rd /s /q "C:\ProgramData\ZCTRQ9R1VKF3" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2772
-
-