Analysis
-
max time kernel
35s -
max time network
35s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17-01-2025 20:53
Static task
static1
Behavioral task
behavioral1
Sample
537067C176C5E36AE81938A38045B520.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
537067C176C5E36AE81938A38045B520.exe
-
Size
617KB
-
MD5
537067c176c5e36ae81938a38045b520
-
SHA1
e0666c4acb6df096639dd73e1de2bc6c83f6bb92
-
SHA256
2bb01e5626c002242375d09553c52c5c009cb98525170cacca10c3cb72b779d0
-
SHA512
1b1a22bec953d1dd50e7317ee97b7df62fff5c1bf2509d8ba3a0ac0b454d30265d3be0959c052634a8895207e9f466efce1d713123dccbddc6b232df7bbd9ac7
-
SSDEEP
12288:xCh5qnPSABfUFgwm1EM9ThAtQ9s+yg5suVcU2bU7fFbJcslr7v:xCSnP9JU6jEAtPYgsEFGU7dtxr7v
Malware Config
Extracted
vidar
11.1
0b3bd69430b7d827b107ba2ed809207d
https://steamcommunity.com/profiles/76561199786602107
https://t.me/lpnjoke
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral1/memory/3180-1-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3180-3-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3180-22-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/3180-23-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Vidar family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463531801-1484541064-3495084620-1000\Control Panel\International\Geo\Nation 537067C176C5E36AE81938A38045B520.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3424 1584 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 537067C176C5E36AE81938A38045B520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 537067C176C5E36AE81938A38045B520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 537067C176C5E36AE81938A38045B520.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 537067C176C5E36AE81938A38045B520.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3780 timeout.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3180 537067C176C5E36AE81938A38045B520.exe 3180 537067C176C5E36AE81938A38045B520.exe 3180 537067C176C5E36AE81938A38045B520.exe 3180 537067C176C5E36AE81938A38045B520.exe 3180 537067C176C5E36AE81938A38045B520.exe 3180 537067C176C5E36AE81938A38045B520.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1976 taskmgr.exe Token: SeSystemProfilePrivilege 1976 taskmgr.exe Token: SeCreateGlobalPrivilege 1976 taskmgr.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe 1976 taskmgr.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1584 wrote to memory of 236 1584 537067C176C5E36AE81938A38045B520.exe 82 PID 1584 wrote to memory of 236 1584 537067C176C5E36AE81938A38045B520.exe 82 PID 1584 wrote to memory of 236 1584 537067C176C5E36AE81938A38045B520.exe 82 PID 1584 wrote to memory of 3704 1584 537067C176C5E36AE81938A38045B520.exe 83 PID 1584 wrote to memory of 3704 1584 537067C176C5E36AE81938A38045B520.exe 83 PID 1584 wrote to memory of 3704 1584 537067C176C5E36AE81938A38045B520.exe 83 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 1584 wrote to memory of 3180 1584 537067C176C5E36AE81938A38045B520.exe 84 PID 3180 wrote to memory of 4320 3180 537067C176C5E36AE81938A38045B520.exe 89 PID 3180 wrote to memory of 4320 3180 537067C176C5E36AE81938A38045B520.exe 89 PID 3180 wrote to memory of 4320 3180 537067C176C5E36AE81938A38045B520.exe 89 PID 4320 wrote to memory of 3780 4320 cmd.exe 91 PID 4320 wrote to memory of 3780 4320 cmd.exe 91 PID 4320 wrote to memory of 3780 4320 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\537067C176C5E36AE81938A38045B520.exe"C:\Users\Admin\AppData\Local\Temp\537067C176C5E36AE81938A38045B520.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\537067C176C5E36AE81938A38045B520.exe"C:\Users\Admin\AppData\Local\Temp\537067C176C5E36AE81938A38045B520.exe"2⤵PID:236
-
-
C:\Users\Admin\AppData\Local\Temp\537067C176C5E36AE81938A38045B520.exe"C:\Users\Admin\AppData\Local\Temp\537067C176C5E36AE81938A38045B520.exe"2⤵PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\537067C176C5E36AE81938A38045B520.exe"C:\Users\Admin\AppData\Local\Temp\537067C176C5E36AE81938A38045B520.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\537067C176C5E36AE81938A38045B520.exe" & rd /s /q "C:\ProgramData\AAFIJKKEHJDH" & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3780
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 3162⤵
- Program crash
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1584 -ip 15841⤵PID:332
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1976