Analysis
-
max time kernel
90s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 05:21
Behavioral task
behavioral1
Sample
S0FTWARE.exe
Resource
win7-20240903-en
General
-
Target
S0FTWARE.exe
-
Size
782.2MB
-
MD5
bd166012acef52ffce31789bafff6588
-
SHA1
e2968f7f62266d05b4628c6351a676d5d0e8e22f
-
SHA256
3aaa6bb7d6b82cc554bb14493af5afe184125089a9aa1c3759b82fbb7241c87a
-
SHA512
d8786f5ebc199c667924e697bce5b4185492161af351511145d91c47c06df56b1b50b6520f3b9ce6bc37a1bb1b9b9ba6fbe18f1f3f881d7dbe8cb28990e2c3c3
-
SSDEEP
98304:qD8PPKKvxZbk8aPZXMc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBc9cBck:m8PJk8ae
Malware Config
Extracted
vidar
11.5
58b6d099477b3b8d6d299990bbc1d5a6
https://t.me/gos90t
https://steamcommunity.com/profiles/76561199800374635
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 8 IoCs
resource yara_rule behavioral2/memory/3380-7-0x0000000000F10000-0x0000000001708000-memory.dmp family_vidar_v7 behavioral2/memory/3380-8-0x0000000000F10000-0x0000000001708000-memory.dmp family_vidar_v7 behavioral2/memory/3380-9-0x0000000000F10000-0x0000000001708000-memory.dmp family_vidar_v7 behavioral2/memory/3380-11-0x0000000000F10000-0x0000000001708000-memory.dmp family_vidar_v7 behavioral2/memory/3380-10-0x0000000000F10000-0x0000000001708000-memory.dmp family_vidar_v7 behavioral2/memory/3380-12-0x0000000000F10000-0x0000000001708000-memory.dmp family_vidar_v7 behavioral2/memory/3380-17-0x0000000000F10000-0x0000000001708000-memory.dmp family_vidar_v7 behavioral2/memory/3380-28-0x0000000000F10000-0x0000000001708000-memory.dmp family_vidar_v7 -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ S0FTWARE.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion S0FTWARE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion S0FTWARE.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation S0FTWARE.exe -
resource yara_rule behavioral2/memory/3380-0-0x0000000000F10000-0x0000000001708000-memory.dmp themida behavioral2/memory/3380-7-0x0000000000F10000-0x0000000001708000-memory.dmp themida behavioral2/memory/3380-8-0x0000000000F10000-0x0000000001708000-memory.dmp themida behavioral2/memory/3380-9-0x0000000000F10000-0x0000000001708000-memory.dmp themida behavioral2/memory/3380-11-0x0000000000F10000-0x0000000001708000-memory.dmp themida behavioral2/memory/3380-10-0x0000000000F10000-0x0000000001708000-memory.dmp themida behavioral2/memory/3380-12-0x0000000000F10000-0x0000000001708000-memory.dmp themida behavioral2/memory/3380-17-0x0000000000F10000-0x0000000001708000-memory.dmp themida behavioral2/memory/3380-28-0x0000000000F10000-0x0000000001708000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA S0FTWARE.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3380 S0FTWARE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString S0FTWARE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 S0FTWARE.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4972 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3380 S0FTWARE.exe 3380 S0FTWARE.exe 3380 S0FTWARE.exe 3380 S0FTWARE.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3380 wrote to memory of 1192 3380 S0FTWARE.exe 89 PID 3380 wrote to memory of 1192 3380 S0FTWARE.exe 89 PID 3380 wrote to memory of 1192 3380 S0FTWARE.exe 89 PID 1192 wrote to memory of 4972 1192 cmd.exe 91 PID 1192 wrote to memory of 4972 1192 cmd.exe 91 PID 1192 wrote to memory of 4972 1192 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\S0FTWARE.exe"C:\Users\Admin\AppData\Local\Temp\S0FTWARE.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\S0FTWARE.exe" & rd /s /q "C:\ProgramData\CBFBGCGIJKJJ" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4972
-
-