Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
21/01/2025, 18:41
250121-xb31baxlem 1021/01/2025, 18:28
250121-w4chdsxjfp 1014/01/2025, 17:55
250114-whtvjsvlaz 1014/01/2025, 17:51
250114-wfg3zavkb1 1014/01/2025, 16:15
250114-tqfa1ssncw 1013/01/2025, 10:33
250113-mlhf9aymaz 1011/01/2025, 23:03
250111-21xbaatmgz 711/01/2025, 22:53
250111-2vd8hswjdn 1005/01/2025, 19:04
250105-xqxrvavngm 1005/01/2025, 18:50
250105-xhbveaspat 10Analysis
-
max time kernel
163s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2025, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
66bddfcb52736_vidar.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
66bddfcb52736_vidar.exe
Resource
win10v2004-20241007-en
General
-
Target
66bddfcb52736_vidar.exe
-
Size
190KB
-
MD5
fedb687ed23f77925b35623027f799bb
-
SHA1
7f27d0290ecc2c81bf2b2d0fa1026f54fd687c81
-
SHA256
325396d5ffca8546730b9a56c2d0ed99238d48b5e1c3c49e7d027505ea13b8d1
-
SHA512
6d1fa39560f4d7ca57905bc57d615acf96b1ef69ca2a4d7c0353278e8d4466298ed87f514463c49d671cb0e3b6a269a78636a10a1e463dba5c83fe067dc5df18
-
SSDEEP
3072:XqsEJybpRHuJKKBardRei4UGvI96/ZO6RAkeOCeP9sZy28se:XqsMyNRHuKikUi42KZO6PffmZy2d
Malware Config
Extracted
vidar
10.7
877956da9963e0825aa43a159a358f24
https://steamcommunity.com/profiles/76561199751190313
https://t.me/pech0nk
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Signatures
-
Detect Vidar Stealer 11 IoCs
resource yara_rule behavioral2/memory/4484-10-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4484-8-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4484-4-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4484-13-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4484-14-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4996-27-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/4996-26-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/2144-49-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/2144-50-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/1996-60-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/1996-61-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Vidar family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1644 set thread context of 4484 1644 66bddfcb52736_vidar.exe 82 PID 4648 set thread context of 4996 4648 66bddfcb52736_vidar.exe 111 PID 3500 set thread context of 2144 3500 66bddfcb52736_vidar.exe 118 PID 4232 set thread context of 1996 4232 66bddfcb52736_vidar.exe 123 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66bddfcb52736_vidar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66bddfcb52736_vidar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66bddfcb52736_vidar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66bddfcb52736_vidar.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 2956 timeout.exe 3532 timeout.exe 1324 timeout.exe 2636 timeout.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4484 RegAsm.exe 4484 RegAsm.exe 4484 RegAsm.exe 4484 RegAsm.exe 4484 RegAsm.exe 4484 RegAsm.exe 4996 RegAsm.exe 4996 RegAsm.exe 4996 RegAsm.exe 4996 RegAsm.exe 4996 RegAsm.exe 4996 RegAsm.exe 2144 RegAsm.exe 2144 RegAsm.exe 2144 RegAsm.exe 2144 RegAsm.exe 2144 RegAsm.exe 2144 RegAsm.exe 1996 RegAsm.exe 1996 RegAsm.exe 1996 RegAsm.exe 1996 RegAsm.exe 1996 RegAsm.exe 1996 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 1644 wrote to memory of 4484 1644 66bddfcb52736_vidar.exe 82 PID 4484 wrote to memory of 2448 4484 RegAsm.exe 84 PID 4484 wrote to memory of 2448 4484 RegAsm.exe 84 PID 4484 wrote to memory of 2448 4484 RegAsm.exe 84 PID 2448 wrote to memory of 3532 2448 cmd.exe 86 PID 2448 wrote to memory of 3532 2448 cmd.exe 86 PID 2448 wrote to memory of 3532 2448 cmd.exe 86 PID 4648 wrote to memory of 4184 4648 66bddfcb52736_vidar.exe 110 PID 4648 wrote to memory of 4184 4648 66bddfcb52736_vidar.exe 110 PID 4648 wrote to memory of 4184 4648 66bddfcb52736_vidar.exe 110 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4648 wrote to memory of 4996 4648 66bddfcb52736_vidar.exe 111 PID 4996 wrote to memory of 4248 4996 RegAsm.exe 113 PID 4996 wrote to memory of 4248 4996 RegAsm.exe 113 PID 4996 wrote to memory of 4248 4996 RegAsm.exe 113 PID 4248 wrote to memory of 1324 4248 cmd.exe 115 PID 4248 wrote to memory of 1324 4248 cmd.exe 115 PID 4248 wrote to memory of 1324 4248 cmd.exe 115 PID 3500 wrote to memory of 3636 3500 66bddfcb52736_vidar.exe 117 PID 3500 wrote to memory of 3636 3500 66bddfcb52736_vidar.exe 117 PID 3500 wrote to memory of 3636 3500 66bddfcb52736_vidar.exe 117 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 3500 wrote to memory of 2144 3500 66bddfcb52736_vidar.exe 118 PID 2144 wrote to memory of 648 2144 RegAsm.exe 119 PID 2144 wrote to memory of 648 2144 RegAsm.exe 119 PID 2144 wrote to memory of 648 2144 RegAsm.exe 119 PID 648 wrote to memory of 2636 648 cmd.exe 121 PID 648 wrote to memory of 2636 648 cmd.exe 121 PID 648 wrote to memory of 2636 648 cmd.exe 121 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123 PID 4232 wrote to memory of 1996 4232 66bddfcb52736_vidar.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\AAKKKEBFCGDB" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3532
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4184
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\JJKFBFIJJECG" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\BGDHDAFIDGDB" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\CGDGHCBGDHJJ" & exit3⤵
- System Location Discovery: System Language Discovery
PID:4260 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
34KB
MD5ae05679c7a67f891d13b0857b4521c45
SHA1e9a7812325f3327fa22e9ec1de9f0bd7580b7e08
SHA2563b2ce046e29e4d25c12fb3c8c4b73abb28edc5c2cc336d7de0c89931fb4703e7
SHA512b5ef55995cd68702f687b559680cebab43b8701f760c9b57c5d8bbbe46bd7ce241aa35df7c97ad7d99204baa9a8cc9e56f01ddc87e621739caf35bb0adbf39c4
-
Filesize
34KB
MD5051b5586ed22b064299e8432e5d9fafd
SHA1613cd4865b4503322e0dc9aaa01af9a25576ef0f
SHA256a02af4cc94c9302d6bc55560588b7eb8953ec9d0294a41bbdc123aa5056018b3
SHA51205c443236caa36f9193680ebd48fa31908ad46551287cbb0067c234e80b4089ca773fb0f4c0361903f3127d6e649e6fbf30843abdbe37027ea83f333facc4457
-
Filesize
34KB
MD58e9b21d835b346560fad5f786ec89b38
SHA17ef15215f09f14e03ed8f80013dc06749ba87740
SHA256d75a8cee7bf2c135e55c6be167a6459199d5919939aba2338301ea45ab051c40
SHA512a41f1790471a9078ea127d034e4841bcddbaec1218fa89a6adfa1a23f129b803c55ddcfac8d37f982e325abf4dd9f11d035e5d4bf7526b562dff59a393bf536b