Analysis
-
max time kernel
64s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 20:51
Static task
static1
Behavioral task
behavioral1
Sample
Setuper_25.01.exe
Resource
win7-20240708-en
General
-
Target
Setuper_25.01.exe
-
Size
67.7MB
-
MD5
626f51544f775502a39adc747c31032c
-
SHA1
b4b66766714ab53be82143ab81424b98a8cbac64
-
SHA256
35d601f9d756bcc17a3b1311306eac3bf859c891feca5a218fdf220dcdc643ff
-
SHA512
6871ee61a12d692bd535125cdb101f1b8265e7707083070e29c189c69cdccc238c8659deb3995e4245bd1000bf9995caa783443102ffd7bc2754d8c70f5313e0
-
SSDEEP
393216:87eLd/nhouIETpkFh8KbodSLFBJbHRlLieEY9qIjAgOWT2ZR0HYaqz1T67bGjeBm:LLd/WbbMWlLi6TjD4FeBgriZApI/Bi
Malware Config
Extracted
vidar
https://t.me/sc1phell
https://steamcommunity.com/profiles/76561199819539662
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/3688-371-0x00000000004A0000-0x00000000004C2000-memory.dmp family_vidar_v7 behavioral2/memory/3688-372-0x00000000004A0000-0x00000000004C2000-memory.dmp family_vidar_v7 behavioral2/memory/3688-373-0x00000000004A0000-0x00000000004C2000-memory.dmp family_vidar_v7 -
Vidar family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4824 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 14 396 Setuper_25.01.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation lem.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Setuper_25.01.exe -
Executes dropped EXE 2 IoCs
pid Process 3184 lem.exe 3688 Conservation.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1052 tasklist.exe 2660 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\PosBdsm lem.exe File opened for modification C:\Windows\CemeteryAcknowledged lem.exe File opened for modification C:\Windows\DisplaysHumanitarian lem.exe File opened for modification C:\Windows\LimeSamsung lem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Conservation.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4824 powershell.exe 4824 powershell.exe 3688 Conservation.com 3688 Conservation.com 3688 Conservation.com 3688 Conservation.com 3688 Conservation.com 3688 Conservation.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4824 powershell.exe Token: SeDebugPrivilege 1052 tasklist.exe Token: SeDebugPrivilege 2660 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3688 Conservation.com 3688 Conservation.com 3688 Conservation.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3688 Conservation.com 3688 Conservation.com 3688 Conservation.com -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 396 wrote to memory of 4824 396 Setuper_25.01.exe 83 PID 396 wrote to memory of 4824 396 Setuper_25.01.exe 83 PID 396 wrote to memory of 3184 396 Setuper_25.01.exe 87 PID 396 wrote to memory of 3184 396 Setuper_25.01.exe 87 PID 396 wrote to memory of 3184 396 Setuper_25.01.exe 87 PID 3184 wrote to memory of 4040 3184 lem.exe 88 PID 3184 wrote to memory of 4040 3184 lem.exe 88 PID 3184 wrote to memory of 4040 3184 lem.exe 88 PID 4040 wrote to memory of 1052 4040 cmd.exe 90 PID 4040 wrote to memory of 1052 4040 cmd.exe 90 PID 4040 wrote to memory of 1052 4040 cmd.exe 90 PID 4040 wrote to memory of 2184 4040 cmd.exe 91 PID 4040 wrote to memory of 2184 4040 cmd.exe 91 PID 4040 wrote to memory of 2184 4040 cmd.exe 91 PID 4040 wrote to memory of 2660 4040 cmd.exe 94 PID 4040 wrote to memory of 2660 4040 cmd.exe 94 PID 4040 wrote to memory of 2660 4040 cmd.exe 94 PID 4040 wrote to memory of 5076 4040 cmd.exe 95 PID 4040 wrote to memory of 5076 4040 cmd.exe 95 PID 4040 wrote to memory of 5076 4040 cmd.exe 95 PID 4040 wrote to memory of 1104 4040 cmd.exe 96 PID 4040 wrote to memory of 1104 4040 cmd.exe 96 PID 4040 wrote to memory of 1104 4040 cmd.exe 96 PID 4040 wrote to memory of 2580 4040 cmd.exe 97 PID 4040 wrote to memory of 2580 4040 cmd.exe 97 PID 4040 wrote to memory of 2580 4040 cmd.exe 97 PID 4040 wrote to memory of 2328 4040 cmd.exe 98 PID 4040 wrote to memory of 2328 4040 cmd.exe 98 PID 4040 wrote to memory of 2328 4040 cmd.exe 98 PID 4040 wrote to memory of 4560 4040 cmd.exe 99 PID 4040 wrote to memory of 4560 4040 cmd.exe 99 PID 4040 wrote to memory of 4560 4040 cmd.exe 99 PID 4040 wrote to memory of 3680 4040 cmd.exe 100 PID 4040 wrote to memory of 3680 4040 cmd.exe 100 PID 4040 wrote to memory of 3680 4040 cmd.exe 100 PID 4040 wrote to memory of 3688 4040 cmd.exe 101 PID 4040 wrote to memory of 3688 4040 cmd.exe 101 PID 4040 wrote to memory of 3688 4040 cmd.exe 101 PID 4040 wrote to memory of 2804 4040 cmd.exe 102 PID 4040 wrote to memory of 2804 4040 cmd.exe 102 PID 4040 wrote to memory of 2804 4040 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setuper_25.01.exe"C:\Users\Admin\AppData\Local\Temp\Setuper_25.01.exe"1⤵
- Downloads MZ/PE file
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath 'C:\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\lem.exe"C:\Users\Admin\AppData\Local\Temp\lem.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Petition Petition.cmd & Petition.cmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"4⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"4⤵
- System Location Discovery: System Language Discovery
PID:5076
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7834694⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Virtue4⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "valuable" Essentials4⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 783469\Conservation.com + Sonic + Mails + Wool + Required + Ge + Lenders + Nearly + Wires + Nut + Peaceful 783469\Conservation.com4⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Ecological + ..\Hour + ..\Centres + ..\Chairman R4⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\783469\Conservation.comConservation.com R4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3688
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350B
MD5d46a89972080df654ffe25fb70528ae0
SHA10027e2f4fa24ebec5727da30db8fecde14a87604
SHA2561c417ea59956eff8c5aee79bb517356794629c6ae0b9b732fb92cdede79302a1
SHA51294eb23b4e9a20cfcfda60912e46804f5eabff6c4677c533ce2a1f35420f29ba7159f5178883c0c1edcd53b98b13a2953730fd1e9474472620900fa4ca94af4f8
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
255KB
MD58a64e658d19ea3dc9bf80cdcc864972a
SHA1ea0c7ceeb361204b9036a82bed40e97c61288394
SHA256c3b5a68164b18e32d6e8c1e51c3ea070dfc288a3910e747f9d93b2647be5e7c3
SHA512ea92d511fc457021c4899e05f2ed2e17b704289bcef078464d4f50d788822c2362d1e1dcab31103eb6fd35b03d80b064680dc8d3d8a65b3e92bb57f6ab6f68ef
-
Filesize
87KB
MD55e828bc1bbef4e2c13a811838b1692e0
SHA1775b0ea6d2188b2aa2be9d2d9ea7f860193ba690
SHA2564b08481824e13638d115a9de0ea1ff1719830afa384148b437951dcf59494637
SHA5120761df75b34e5ca26ebebfcd4ddde0ffbd0321548abffa570c9da2c41292d291434c3325d2fe9d78f5ee77566309aca4e9f570a96848f29f0d748a8784a08b9a
-
Filesize
22KB
MD5b0cb29f7294d79b824ce3e534d7a423b
SHA1caf7b1c887efa070f4f2b16793477f6a645c122f
SHA2561fad01f2f9ea15426b4b4326b2881910457c552c4e94e487965c4b195e0eda4b
SHA512552ae4ac4cc9104c5feec6f65ca2a06e05349c5b335db8e0de2f5c9fea5a5809844484ef425fd234d4c0c1e372aa491942796acdbf62c7da52a64bfa072ba4ba
-
Filesize
86KB
MD5d934eccb0198d5ab9f93ffeb46a8ce7d
SHA17d91992e152891c9995c58b290c9f54808955d71
SHA2560bc1959a7d9c96348954cb358353717ca97c997afc646b4c06b2132bb9ab98a9
SHA512cae1819ae1d2bc1e64f8615d67dd4b745a45e167a67ed36954482aaefe7e6da830900474e4aabf205e4476d117d7a3ac3e706e341a4f67f51f5ec817f56f8179
-
Filesize
358B
MD55a44e4ddf3c44f3eaf21d04a4ec6c643
SHA150e6311b726a8ddc4df7c6ab81381d98ae02ec1f
SHA2567c899b76e4d97d45b3f295dee7155666f4bc4e87f428177f7824daa18ff1a4c3
SHA51207442aad51ea8ea25160c06ad358f2e4a972d988209b5f22b7cf1cf53f3c0b91e0d4ef31af19f22b0cb66a9dbd0cd73072a07376ae37a3b7c718bbbadace6cc7
-
Filesize
63KB
MD5090166997fd0d381fa80dc73911e597f
SHA1f64b01878905c077ce69311f609a63770bec15d6
SHA256bf785fbb7106b4e937f0367849aafb7b70ed3169bfcc15d706f5397bbe045f24
SHA512849d51aa48f391b3dfc81a406af0c08da55b4d9184cc3c11d67d55beaceff9c98bdd7214b6770814bed574e08a90d18c500aef1a092a255084c84c712fc1310a
-
Filesize
60KB
MD532fec74db697f0c37390f9f4149a6b03
SHA13035eaa44d2bfbc64c7d31800709ac582808cf1b
SHA256b914c7e55e135d60aabe7b65a78e4102f449fb3074dbea2677592c618189dc69
SHA5121d5c0fac2be6fc8db7b07c0a1ff769592b296013a0e0f29cf73b32cb3f197fcde636b52dd9fe4b591b15f34ed3c15782e6c6a7a3fde2d3efc23bd61326584166
-
Filesize
133KB
MD53aeebd18ec137a855306b216c96ae737
SHA1031dd4a37bcbecc9067b2063533596314cece50d
SHA256d99df8d51ad3c570201d09fb9fe7e50309ce404242e715178d7870d5a79b63f3
SHA512e584129a61015bbd7ce1f9f7de75ee9e008808f46178d1a79ad8ce9facfaa4385ac0eaf5687fe80e9935eb2d5ab8a587920e99bf17ca730a48ccbdfb79fe85d6
-
Filesize
88KB
MD58aa8c75e2cd937853222c919aae7b61b
SHA10aeddb158527ab7abe80c054e4ce9e2941b34ee6
SHA256020b68ea9a935f644f1018f3940523909183f9c40c236762a7ff2211c61c55ab
SHA512032eac3885d5de955c1a1b2194d832e83f96d0127f22efea395fe05ce6489c7f3bead47dd96f79b5ef55b7f7e514d48c6a46d77410095fe9f13296f09ce0f3ba
-
Filesize
89KB
MD531e7d940c03cf59d32d7f76f83343f3b
SHA1ec7eec71e1893e004ea901b8b39a456cee9fdeb2
SHA25608894d3ffb329df8f28fff01cb9dadbc3ab8e73bca4ead2f62e1c48d49ded546
SHA5128a72257ee7672f1c87005fa7a54fb07f77f5f07df59fe74c89e7326c5b2488e70afcb8acb17e39f0c9b3d59e333624bb8d124b2ca82127d7befda2853d12905b
-
Filesize
103KB
MD5ad3c9ca5d7b3829b261492045496bab2
SHA1db2e35f065cb4575d0fcc904e5cb881629120b3a
SHA2563e2280923af87a99dc0b1c889405963d5efc05ef5d59f6fbbb61262905887b70
SHA5128dbad25fe0a43ec47c856ab2db56fc2aeb1d1973e605f3ad99687537f865b3c2cbe5a3d65a2e8c8bdc619aa37ac97eb6e59f1e1b8c3cd6f9ad346873d825b665
-
Filesize
31KB
MD5882956a359bba993badd30fda85bc232
SHA1d2eb13f54f7eef589aa3de784498473a143dfe72
SHA256859b26625286898328183fd299fb1f37278bbea294f58923fc8240afd2da00bf
SHA51213968f5d54f59601266265e619e4cca4bfdbaca608d8c097ee10575f7909b05e0fa6f45fc0b99f7f5f85db2929401306b25ae3c0abe5f88ed12751f5c9cffd31
-
Filesize
11KB
MD59785ae0c049dfc7ef7d091250963f083
SHA19fd85852bb484686cf17baffe2d46e714a981483
SHA256331c604b297b1d3b9a5087dab66df87c259ef6a7ac57a656d727783769ef8517
SHA512880d11353c98729a7d87d563e5d28e5123970528ab37e9b87985f69f94b68d998d3793e76dbfb467ee389fd8ac52f362989c77b9868e130d5573f452c5d15d79
-
Filesize
90KB
MD505cc077502e6849213ebaf215cd405cf
SHA1e3389a716bf67e5b1529c47edb5d7dd708e064dc
SHA2567e0092734bdb8182c79c06821018427803e39c97d77d58838c35e6fb7ff040f3
SHA512c274dfdd50af8fc8e1a0b31b93ead5ff942eb679ba8d969f17c241f5ae6ecbd19db5a8b3f69e9117f3258889afbec58c638f1888954fd5028be888b257904c40
-
Filesize
50KB
MD544bbd6106044f458a6376f8f73f233f0
SHA1770bb9161fcec36ad5dd418ae903abc251847f21
SHA256271a7d7ed64cd2128f3f2ab218a48bd62e5b7c4941e0753a632cd0cf49930f05
SHA51226a60e179dcd6790d756e521062499817de037a11d8e9992c596a60cb6785509aaddc9714fab47c048ea104df3bc696134d5ecaf54d70098576fb609b69586b2
-
Filesize
478KB
MD5545715f9edd6559d712774c5a56aeb18
SHA18fce54d6bdd247cd4191ed05944eb580e0aa2d6f
SHA25653ef3fc9d220f0280d8838a8fb35dd042d22b908cca6697e524b8103b8456c33
SHA512bbe54913f07362a1a8e1340681d00a72bd7af62f8d8f6ac9710e96a79517f010fc7dcda173307bbab025979c83a65d727f83b3308405bd849fa8e6f253af21e8
-
Filesize
138KB
MD516278f9126d6c344f8d38c2d847c63d1
SHA192434569a16cab0371fc583a461644ba944a8cd6
SHA256656067e924422a45897fed4eb916b7cfef4394b26667777080d8f81b386db47b
SHA512eb80a7918d5574d851d4980511c30df1285f1036a903680729c3bea795882d6f46dc0d18c37a4c7efa87bb69c08ee0fe90b86c2e63a00a404a9d81322ea3283f
-
Filesize
139KB
MD5220486757f7058d1ff73df0136296ee3
SHA156e9dedd165a7750718a2303e0f8b76dc19ad6f9
SHA2563409ec2788e9339fac7df9f8775463a4a532bd73915b6c18912c4e1fad236171
SHA5129002fbdf16a4264eed2b918949b3354f058125782760b12469e2ce9245a10c784c3aff79ca0d8e81338ab8bb32b9fca9e7af4e3e4104df13d7211528ca90df07
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
888KB
MD5ad2ccaab29318002cd1b01b97eb4af02
SHA144eebe4c043cdd3393038576ddbdd59a26d9c03d
SHA256bb1c808ad6d989df052a90e9a09d4e299c60c1a503310ed36e0281c97c37abed
SHA512b16e7d4ef5ac83ee1759599f85188ea062f79b6e57536a468808bab1c4ed5531f30010b0a7d43e1ea3b00a00bcef198dd8b9659e91fd776e96fd53860c04cea2