Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 16:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
es7ulkrqlav0wdvdv6kpru02.exe
Resource
win7-20241010-en
General
-
Target
es7ulkrqlav0wdvdv6kpru02.exe
-
Size
9.8MB
-
MD5
2a7ec240fa5e25c92b2b78c4f1002ea0
-
SHA1
bca1465b8bafa5fe58d96d4289356d40c3d44155
-
SHA256
2c973057cbbe0d9836f477281a06b51c6ce009c5ac7683f4255743e7d01ca9ca
-
SHA512
dba36379cd0532301193b25ffc4c9b74406efc08ca2d2ce0fec06c115abdde2ab0409bfda1f8bf85ce50764a59503ab0d5b1efbbd641b4caec1dde910d220df3
-
SSDEEP
98304:D2FemCZvjc2SdS7Q+6qfx0Suals9I/f0E7zs/Ym6lQCpR2RJncpl2:6FeppPfxLsQf/7zLzVpWnQ2
Malware Config
Extracted
vidar
fc0stn
https://t.me/w0ctzn
https://steamcommunity.com/profiles/76561199817305251
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0
Signatures
-
Vidar family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3480 set thread context of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language es7ulkrqlav0wdvdv6kpru02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96 PID 3480 wrote to memory of 4156 3480 es7ulkrqlav0wdvdv6kpru02.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\es7ulkrqlav0wdvdv6kpru02.exe"C:\Users\Admin\AppData\Local\Temp\es7ulkrqlav0wdvdv6kpru02.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4156
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.153.16.2.in-addr.arpaIN PTRResponse8.153.16.2.in-addr.arpaIN PTRa2-16-153-8deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request71.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request167.173.78.104.in-addr.arpaIN PTRResponse167.173.78.104.in-addr.arpaIN PTRa104-78-173-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestt.meIN AResponset.meIN A149.154.167.99
-
Remote address:149.154.167.99:443RequestGET /w0ctzn HTTP/1.1
Host: t.me
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Mon, 20 Jan 2025 16:43:43 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 12309
Connection: keep-alive
Set-Cookie: stel_ssid=854f85fed62275335c_11763161823606929277; expires=Tue, 21 Jan 2025 16:43:43 GMT; path=/; samesite=None; secure; HttpOnly
Pragma: no-cache
Cache-control: no-store
X-Frame-Options: ALLOW-FROM https://web.telegram.org
Content-Security-Policy: frame-ancestors https://web.telegram.org
Strict-Transport-Security: max-age=35768000
-
Remote address:8.8.8.8:53Request99.167.154.149.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestlfissrtg.restIN AResponselfissrtg.restIN A116.203.164.230
-
Remote address:116.203.164.230:443RequestGET / HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0
Host: lfissrtg.rest
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Mon, 20 Jan 2025 16:43:44 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:116.203.164.230:443RequestPOST / HTTP/1.1
Content-Type: multipart/form-data; boundary=----gv3ozusj5fkxba1nyua1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0
Host: lfissrtg.rest
Content-Length: 256
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Mon, 20 Jan 2025 16:43:45 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:8.8.8.8:53Request85.49.80.91.in-addr.arpaIN PTRResponse
-
Remote address:116.203.164.230:443RequestPOST / HTTP/1.1
Content-Type: multipart/form-data; boundary=----16xlfu3wl6pzu3wbsjeu
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0
Host: lfissrtg.rest
Content-Length: 299
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Mon, 20 Jan 2025 16:43:46 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:8.8.8.8:53Requeste5.o.lencr.orgIN AResponsee5.o.lencr.orgIN CNAMEo.lencr.edgesuite.neto.lencr.edgesuite.netIN CNAMEa1887.dscq.akamai.neta1887.dscq.akamai.netIN A88.221.135.105a1887.dscq.akamai.netIN A88.221.134.89
-
GEThttp://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgTjmxTzChcwOI3c94LVQrrRBw%3D%3DBitLockerToGo.exeRemote address:88.221.135.105:80RequestGET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgTjmxTzChcwOI3c94LVQrrRBw%3D%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: e5.o.lencr.org
ResponseHTTP/1.1 200 OK
Content-Type: application/ocsp-response
Content-Length: 344
ETag: "D19928671A68A83AC985D5881AA45BEA0CD35789ADC8103580A4D10D67028F3E"
Last-Modified: Mon, 20 Jan 2025 10:43:00 UTC
Cache-Control: public, no-transform, must-revalidate, max-age=19469
Expires: Mon, 20 Jan 2025 22:08:14 GMT
Date: Mon, 20 Jan 2025 16:43:45 GMT
Connection: keep-alive
-
Remote address:8.8.8.8:53Request230.164.203.116.in-addr.arpaIN PTRResponse230.164.203.116.in-addr.arpaIN PTRstatic230164203116clientsyour-serverde
-
Remote address:8.8.8.8:53Request168.245.100.95.in-addr.arpaIN PTRResponse168.245.100.95.in-addr.arpaIN PTRa95-100-245-168deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request105.135.221.88.in-addr.arpaIN PTRResponse105.135.221.88.in-addr.arpaIN PTRa88-221-135-105deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request60.153.16.2.in-addr.arpaIN PTRResponse60.153.16.2.in-addr.arpaIN PTRa2-16-153-60deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request182.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request182.129.81.91.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request182.129.81.91.in-addr.arpaIN PTR
-
1.5kB 19.5kB 24 21
HTTP Request
GET https://t.me/w0ctznHTTP Response
200 -
982 B 3.0kB 11 8
HTTP Request
GET https://lfissrtg.rest/HTTP Response
200 -
1.4kB 525 B 8 5
HTTP Request
POST https://lfissrtg.rest/HTTP Response
200 -
1.4kB 558 B 8 6
HTTP Request
POST https://lfissrtg.rest/HTTP Response
200 -
88.221.135.105:80http://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgTjmxTzChcwOI3c94LVQrrRBw%3D%3DhttpBitLockerToGo.exe467 B 862 B 5 3
HTTP Request
GET http://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgTjmxTzChcwOI3c94LVQrrRBw%3D%3DHTTP Response
200
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
8.153.16.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
71.31.126.40.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
167.173.78.104.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
50 B 66 B 1 1
DNS Request
t.me
DNS Response
149.154.167.99
-
73 B 166 B 1 1
DNS Request
99.167.154.149.in-addr.arpa
-
59 B 75 B 1 1
DNS Request
lfissrtg.rest
DNS Response
116.203.164.230
-
70 B 145 B 1 1
DNS Request
85.49.80.91.in-addr.arpa
-
60 B 159 B 1 1
DNS Request
e5.o.lencr.org
DNS Response
88.221.135.10588.221.134.89
-
74 B 133 B 1 1
DNS Request
230.164.203.116.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
168.245.100.95.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
105.135.221.88.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
60.153.16.2.in-addr.arpa
-
216 B 147 B 3 1
DNS Request
182.129.81.91.in-addr.arpa
DNS Request
182.129.81.91.in-addr.arpa
DNS Request
182.129.81.91.in-addr.arpa