Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 18:19
Static task
static1
Behavioral task
behavioral1
Sample
YnSBCqZ.exe
Resource
win7-20240903-en
General
-
Target
YnSBCqZ.exe
-
Size
8.1MB
-
MD5
7a58b56b7f6c48e110f9ed84d25f0286
-
SHA1
73bbfca9d18b9eeb933f36fc2ba37bf48dfcddb4
-
SHA256
610405206f96bddcd27807b4bd21b14307bba9edd0fecd9cb70e947f10f83b05
-
SHA512
5ffd74a253854e8c8e6254f79eb123aa7b730631aea846389261d00faadc2a66dadf037d26902bedb1f0449e6955c38ff4911d850e13e3f68117459cd3247e9b
-
SSDEEP
98304:dhFvAJyeCllfUonZRljtdRHDhbNhVvF8Dtg5t+7bxQ9AH:HmjoZRlRHTP9x9AH
Malware Config
Extracted
vidar
fc0stn
https://t.me/w0ctzn
https://steamcommunity.com/profiles/76561199817305251
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0
Signatures
-
Vidar family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3228 set thread context of 2512 3228 YnSBCqZ.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YnSBCqZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90 PID 3228 wrote to memory of 2512 3228 YnSBCqZ.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\YnSBCqZ.exe"C:\Users\Admin\AppData\Local\Temp\YnSBCqZ.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2512
-