Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/01/2025, 18:41

250121-xb31baxlem 10

21/01/2025, 18:28

250121-w4chdsxjfp 10

14/01/2025, 17:55

250114-whtvjsvlaz 10

14/01/2025, 17:51

250114-wfg3zavkb1 10

14/01/2025, 16:15

250114-tqfa1ssncw 10

13/01/2025, 10:33

250113-mlhf9aymaz 10

11/01/2025, 23:03

250111-21xbaatmgz 7

11/01/2025, 22:53

250111-2vd8hswjdn 10

05/01/2025, 19:04

250105-xqxrvavngm 10

05/01/2025, 18:50

250105-xhbveaspat 10

Analysis

  • max time kernel
    163s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/01/2025, 16:15

General

  • Target

    66bddfcb52736_vidar.exe

  • Size

    190KB

  • MD5

    fedb687ed23f77925b35623027f799bb

  • SHA1

    7f27d0290ecc2c81bf2b2d0fa1026f54fd687c81

  • SHA256

    325396d5ffca8546730b9a56c2d0ed99238d48b5e1c3c49e7d027505ea13b8d1

  • SHA512

    6d1fa39560f4d7ca57905bc57d615acf96b1ef69ca2a4d7c0353278e8d4466298ed87f514463c49d671cb0e3b6a269a78636a10a1e463dba5c83fe067dc5df18

  • SSDEEP

    3072:XqsEJybpRHuJKKBardRei4UGvI96/ZO6RAkeOCeP9sZy28se:XqsMyNRHuKikUi42KZO6PffmZy2d

Malware Config

Extracted

Family

vidar

Version

10.7

Botnet

877956da9963e0825aa43a159a358f24

C2

https://steamcommunity.com/profiles/76561199751190313

https://t.me/pech0nk

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Signatures

  • Detect Vidar Stealer 11 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe
    "C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\AAKKKEBFCGDB" & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 10
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:3532
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1592
    • C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe
      "C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:4184
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4996
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\JJKFBFIJJECG" & exit
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4248
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              4⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:1324
      • C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe
        "C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"
        1⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3500
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
            PID:3636
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\BGDHDAFIDGDB" & exit
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:648
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                4⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:2636
        • C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe
          "C:\Users\Admin\AppData\Local\Temp\66bddfcb52736_vidar.exe"
          1⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4232
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1996
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & rd /s /q "C:\ProgramData\CGDGHCBGDHJJ" & exit
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4260
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                4⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:2956

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\66bddfcb52736_vidar.exe.log

          Filesize

          42B

          MD5

          84cfdb4b995b1dbf543b26b86c863adc

          SHA1

          d2f47764908bf30036cf8248b9ff5541e2711fa2

          SHA256

          d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

          SHA512

          485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GPUS7TYC\76561199751190313[1].htm

          Filesize

          34KB

          MD5

          ae05679c7a67f891d13b0857b4521c45

          SHA1

          e9a7812325f3327fa22e9ec1de9f0bd7580b7e08

          SHA256

          3b2ce046e29e4d25c12fb3c8c4b73abb28edc5c2cc336d7de0c89931fb4703e7

          SHA512

          b5ef55995cd68702f687b559680cebab43b8701f760c9b57c5d8bbbe46bd7ce241aa35df7c97ad7d99204baa9a8cc9e56f01ddc87e621739caf35bb0adbf39c4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P2UT3MS5\76561199751190313[1].htm

          Filesize

          34KB

          MD5

          051b5586ed22b064299e8432e5d9fafd

          SHA1

          613cd4865b4503322e0dc9aaa01af9a25576ef0f

          SHA256

          a02af4cc94c9302d6bc55560588b7eb8953ec9d0294a41bbdc123aa5056018b3

          SHA512

          05c443236caa36f9193680ebd48fa31908ad46551287cbb0067c234e80b4089ca773fb0f4c0361903f3127d6e649e6fbf30843abdbe37027ea83f333facc4457

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P2UT3MS5\76561199751190313[1].htm

          Filesize

          34KB

          MD5

          8e9b21d835b346560fad5f786ec89b38

          SHA1

          7ef15215f09f14e03ed8f80013dc06749ba87740

          SHA256

          d75a8cee7bf2c135e55c6be167a6459199d5919939aba2338301ea45ab051c40

          SHA512

          a41f1790471a9078ea127d034e4841bcddbaec1218fa89a6adfa1a23f129b803c55ddcfac8d37f982e325abf4dd9f11d035e5d4bf7526b562dff59a393bf536b

        • memory/1644-1-0x0000000000BC0000-0x0000000000BF6000-memory.dmp

          Filesize

          216KB

        • memory/1644-0-0x00000000749DE000-0x00000000749DF000-memory.dmp

          Filesize

          4KB

        • memory/1644-11-0x00000000749D0000-0x0000000075180000-memory.dmp

          Filesize

          7.7MB

        • memory/1644-15-0x00000000749D0000-0x0000000075180000-memory.dmp

          Filesize

          7.7MB

        • memory/1996-61-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/1996-60-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2144-50-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/2144-49-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/4484-4-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/4484-14-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/4484-13-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/4484-8-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/4484-10-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/4996-26-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB

        • memory/4996-27-0x0000000000400000-0x0000000000643000-memory.dmp

          Filesize

          2.3MB