Analysis
-
max time kernel
90s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 18:24
Static task
static1
Behavioral task
behavioral1
Sample
f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
Resource
win7-20240903-en
General
-
Target
f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe
-
Size
975KB
-
MD5
9cde35700dfe9eb8d7cd5a245c885fea
-
SHA1
dd7f90313fdc11981b85b701c4c2935cb8d0b392
-
SHA256
f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad
-
SHA512
86f425c785905108676427bed397d8ddafb51bbb1fe1e36fce022e6aaea050227c0ed992eea559ac68954ae7014709d22fa406d9a38c86b62e43ca985a69c77c
-
SSDEEP
6144:jfkvdAoVGhIIcnSXX04aVhg0SEAAVl/YpKYM463rgqq/tipAxCT:ovd1ghIfnSXE4aWEllgpPJ6b+1s
Malware Config
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Extracted
lumma
https://winnyhelplejsu.shop/api
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/1236-67-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1236-69-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Lumma family
-
Vidar family
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2124 set thread context of 4724 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 86 PID 2124 set thread context of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 4724 set thread context of 2384 4724 AddInProcess32.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 4724 AddInProcess32.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 4724 AddInProcess32.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe Token: SeDebugPrivilege 916 taskmgr.exe Token: SeSystemProfilePrivilege 916 taskmgr.exe Token: SeCreateGlobalPrivilege 916 taskmgr.exe Token: SeDebugPrivilege 4724 AddInProcess32.exe Token: SeDebugPrivilege 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe -
Suspicious use of SendNotifyMessage 58 IoCs
pid Process 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe 916 taskmgr.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2124 wrote to memory of 4724 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 86 PID 2124 wrote to memory of 4724 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 86 PID 2124 wrote to memory of 4724 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 86 PID 2124 wrote to memory of 4724 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 86 PID 2124 wrote to memory of 4724 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 86 PID 2124 wrote to memory of 4724 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 86 PID 2124 wrote to memory of 4724 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 86 PID 2124 wrote to memory of 4724 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 86 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 2124 wrote to memory of 1236 2124 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 94 PID 4724 wrote to memory of 2384 4724 AddInProcess32.exe 95 PID 4724 wrote to memory of 2384 4724 AddInProcess32.exe 95 PID 4724 wrote to memory of 2384 4724 AddInProcess32.exe 95 PID 4724 wrote to memory of 2384 4724 AddInProcess32.exe 95 PID 4724 wrote to memory of 2384 4724 AddInProcess32.exe 95 PID 4724 wrote to memory of 2384 4724 AddInProcess32.exe 95 PID 4724 wrote to memory of 2384 4724 AddInProcess32.exe 95 PID 4724 wrote to memory of 2384 4724 AddInProcess32.exe 95 PID 4724 wrote to memory of 2384 4724 AddInProcess32.exe 95 PID 4396 wrote to memory of 3444 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 98 PID 4396 wrote to memory of 3444 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 98 PID 4396 wrote to memory of 3444 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 98 PID 4396 wrote to memory of 3444 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 98 PID 4396 wrote to memory of 3444 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 98 PID 4396 wrote to memory of 3444 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 98 PID 4396 wrote to memory of 3444 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 98 PID 4396 wrote to memory of 3444 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 98 PID 4396 wrote to memory of 4644 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 99 PID 4396 wrote to memory of 4644 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 99 PID 4396 wrote to memory of 4644 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 99 PID 4396 wrote to memory of 4644 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 99 PID 4396 wrote to memory of 4644 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 99 PID 4396 wrote to memory of 4644 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 99 PID 4396 wrote to memory of 4644 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 99 PID 4396 wrote to memory of 4644 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 99 PID 4396 wrote to memory of 324 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 100 PID 4396 wrote to memory of 324 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 100 PID 4396 wrote to memory of 324 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 100 PID 4396 wrote to memory of 324 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 100 PID 4396 wrote to memory of 324 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 100 PID 4396 wrote to memory of 324 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 100 PID 4396 wrote to memory of 324 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 100 PID 4396 wrote to memory of 324 4396 f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe"C:\Users\Admin\AppData\Local\Temp\f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1236
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2668
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:916
-
C:\Users\Admin\AppData\Local\Temp\f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe"C:\Users\Admin\AppData\Local\Temp\f170f34825d857e3f0bac835dd2385d074aa8f1b7fd1887fb26e847059179dad.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:3444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:324
-