Analysis
-
max time kernel
93s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 18:18
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
General
-
Target
random.exe
-
Size
8.1MB
-
MD5
7a58b56b7f6c48e110f9ed84d25f0286
-
SHA1
73bbfca9d18b9eeb933f36fc2ba37bf48dfcddb4
-
SHA256
610405206f96bddcd27807b4bd21b14307bba9edd0fecd9cb70e947f10f83b05
-
SHA512
5ffd74a253854e8c8e6254f79eb123aa7b730631aea846389261d00faadc2a66dadf037d26902bedb1f0449e6955c38ff4911d850e13e3f68117459cd3247e9b
-
SSDEEP
98304:dhFvAJyeCllfUonZRljtdRHDhbNhVvF8Dtg5t+7bxQ9AH:HmjoZRlRHTP9x9AH
Malware Config
Extracted
vidar
fc0stn
https://t.me/w0ctzn
https://steamcommunity.com/profiles/76561199817305251
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0
Signatures
-
Vidar family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4028 set thread context of 4680 4028 random.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89 PID 4028 wrote to memory of 4680 4028 random.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4680
-