Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2025 12:53

General

  • Target

    random.exe

  • Size

    883KB

  • MD5

    9ce7b5dc80b072328c7bbcdb1c787941

  • SHA1

    7ec1102c335fc5db907c9ee2dcc0ec2ab3f6196a

  • SHA256

    d264ece444ce4f309f8abb6624a948b7e475b0ea41922a167b2c206a99a2f3ed

  • SHA512

    e559fc4c461dc51d6e528781079b5705a48190e1e1523fa88a44ea083ce4c36e26f49cc266dc7bf7e94a1a8d644c252c04a3f8a75ee75d5e13632cb55d366ebf

  • SSDEEP

    24576:92AkXmXG/wzcVn5eiBOdsd1NvyiOIMEWozYL:umXGAcVN8dsFaiXvWeu

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/sc1phell

https://steamcommunity.com/profiles/76561199819539662

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Signatures

  • Detect Vidar Stealer 3 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Fixed Fixed.cmd & Fixed.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1712
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:824
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:620
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1324
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 567757
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2272
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Activation
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2140
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "VIETNAM" Diagnostic
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2484
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 567757\Appeal.com + Entirely + Thumbnails + Atmospheric + Eternal + Quite + Strictly + Mongolia + Card + Decent 567757\Appeal.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:940
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Tuner + ..\Rest + ..\Reservation + ..\Twiki j
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1628
      • C:\Users\Admin\AppData\Local\Temp\567757\Appeal.com
        Appeal.com j
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1372
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1611da94cddb2846b7c2f12046237653

    SHA1

    d02781b9b9af8878f2fcf351288019d95c8999d7

    SHA256

    81dc589595178b5a46503bfeda3e2e3990ed3cb778908e42d3eeb22ff2c97d48

    SHA512

    a6408f6dfd93d2ce76586a6eebf6056fc6a5802e76dc36a41ca7afd45b64af676a02a6c8d34653a5e851a63d44a6690bc87517a9dc7a1238e742796020c3932d

  • C:\Users\Admin\AppData\Local\Temp\567757\Appeal.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Temp\567757\j

    Filesize

    264KB

    MD5

    bea05129f3d2b301606b36116e7ffe19

    SHA1

    575cc30cfd8bb82a88e8c4beda23968bb403cc9a

    SHA256

    a9c09e22c72b21952a90d102bb6bb42d9d2f226068b6a77184fb1e274cf3e76d

    SHA512

    e4b1f3dbaa6e11f1448d3ad5681e5d151f663a45f7301eb631212958c6f714c9dc0d4dc7d60a27e2a1ee031d2304f11b191a03327c8b74ad7bc15efccd0bcdf3

  • C:\Users\Admin\AppData\Local\Temp\Activation

    Filesize

    477KB

    MD5

    c042767a484a5319e2ffdf93fa07d4df

    SHA1

    1324d6934ec525637bc9f3009ddcda26e4d8523b

    SHA256

    66eb9a54081b65f15f9a77838f1aab81514fb5e85c247fff9033a5c10cfe5d2b

    SHA512

    390eebcba07894a96b6ce40592941b73b7af174ca9d9bebd8042d176bbc4453bb264555fe50a52b7de02273bfef4546657e470efe93a0c11ac9ae64386aa58c6

  • C:\Users\Admin\AppData\Local\Temp\Atmospheric

    Filesize

    128KB

    MD5

    af8134d998304dfc95f82b8c678f26da

    SHA1

    5a56502d75b2de535b5933435b8cd549ce5743d7

    SHA256

    728c7faaace50362f3c67e704a010a8360d85824ccb3fcaf66ff5623a928b6fa

    SHA512

    56f8aa8bd7492542688f0afb5e0c93ea0ff30517129a9b5c0a5b12dcb0354ffb34be8b519330a6e0ba65af331f69c9371235e153e8e9f6954d53c00a8db25a66

  • C:\Users\Admin\AppData\Local\Temp\Cab8661.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Card

    Filesize

    89KB

    MD5

    d7061f4477f12a32caddffd0b0c29e16

    SHA1

    204e4cfb4b6eddcf7ea834256b447d497cc061b6

    SHA256

    b36978d1ca56074d4f11f03dd630941247a6b894610f8ff7429050a931f4cc16

    SHA512

    76a3db295ff95852cf0db033a305b4dee33e9096ccb5bc2aff4ab02b47085f4d832117f1be34dcbd83b3c73aea680e83106bc0695372065bf17dbc7872c3d080

  • C:\Users\Admin\AppData\Local\Temp\Decent

    Filesize

    85KB

    MD5

    01ff6be8a48027e603eddae661a2d000

    SHA1

    300a6db081e678351062969eea9cb7f10bd4fd6d

    SHA256

    189afc539d6f0a40276704eb46b3858b9fee408be3f7c40a23dfebbd2f10f1a8

    SHA512

    056155fa6b32dc4a598def3c5bd8de3bf741cdce24f8ee1846a1c84bf591ce6472ddef56782294cd6dbd2ac5500ebb6d374e676cbf0039463d0535c1907ade87

  • C:\Users\Admin\AppData\Local\Temp\Diagnostic

    Filesize

    1KB

    MD5

    b5908f69e3eeb69aeb3f978477a7c456

    SHA1

    ab944a1997b230a67eed789253f5951118182405

    SHA256

    f460d0c32047f7d8009e98d8a4cafc297a6a4a63c503e34487e4638ef80fec0d

    SHA512

    b1b70a66f05ee1fc3acf40877a69bd2aa90191e7091586f67f978ce9a722794717d78acb12da95861dade4e74873b30edbb9a2100d1f82dce836ae7e767c3379

  • C:\Users\Admin\AppData\Local\Temp\Entirely

    Filesize

    102KB

    MD5

    c6913a18d3bcce6688e0be1ca7e2a8b5

    SHA1

    b2b97e9d16480fe6a00acac56f842aa1f5c73f47

    SHA256

    cc73b3fcf7eef06f7dcd1f8394b983f45ef2179b3f21d3910c791812d8aa754a

    SHA512

    841541761abf5951a56b970d24fe611830541a694d8930c23be014a94468516d4cb90cea68591181d1171b13686a4e7a2f00b69d199da31aad0b756d72152e3e

  • C:\Users\Admin\AppData\Local\Temp\Eternal

    Filesize

    89KB

    MD5

    4718f7e64793065982188e21206d6294

    SHA1

    ac50d6dd5d66df2cf9e06db798a823e4498b0d6c

    SHA256

    763329ef1c43ac9d040a65a358a85fc89d819c09ed75939e53df3d77d81a6651

    SHA512

    54eb6d4471f409dea132ff39c832feb0badc069acca2dd4d2e3c0a78f4116614bd6ac53a1d17e232cad8b7c61c0785cde3c03d7834d214a56fcdb481a0b5ab6d

  • C:\Users\Admin\AppData\Local\Temp\Fixed

    Filesize

    10KB

    MD5

    7117c1138e8068028e7f2fb726c8ac67

    SHA1

    3f83509ec14c0659f83690b61fefc590f21a082a

    SHA256

    68f92f74131dcf6d66a9bd7da09ded0c9bf2ca429999840ff939af6f07c02b2b

    SHA512

    b2a2298a14023686a516021389c474bcf6ecefd86e4523c78a396109c84317223465a4737203fc6b23794fae5eaeeb900bd9162322dccdfc4bd089d3a57f594e

  • C:\Users\Admin\AppData\Local\Temp\Mongolia

    Filesize

    79KB

    MD5

    5fe069336af303408f55f02eb045daa3

    SHA1

    e9fb6cda3a06e6290b2dd51a82d009bdea911926

    SHA256

    92dc1cef807e79e0ed7d950a86b224cc58f493b01d9b75b4ff649bd6da169bd9

    SHA512

    62a733fc5cc2f402257475a52e46e800781cd0719c9ba44f058d8cf047a7e08d55c40d35c73ae24061a5d947281befeec7a3aee6394fe5396b4f1a3612838ce3

  • C:\Users\Admin\AppData\Local\Temp\Quite

    Filesize

    73KB

    MD5

    6e02c7319146dad58b90a75059393c0c

    SHA1

    4bd68a73a30140617517a57d2a20b79cf6c5c32d

    SHA256

    ba5ece2b426cae95e115b35d127b1c72cdb4b8a97545eb2f99fc50538a3158ba

    SHA512

    c0eeb3535c794761cf682db543c434d11e52321435ccbb58ff65d7186c7bae6508526e92a60bc1bf45cde6394ccf76fdc1e805ea26b2f8cfbce92cf7c467ebc3

  • C:\Users\Admin\AppData\Local\Temp\Reservation

    Filesize

    62KB

    MD5

    4a0945abd91a0b79f3b899debd967f29

    SHA1

    af8c83f726494ec097543588e9c2fc803bd3239e

    SHA256

    1436f83587e806ca856d3fde24009ad6a180e2c9b2b397715046e8f3aae21795

    SHA512

    e55312522eb577979586e276ba751cbcfe8548f90420d9db962fa165e0e16436b045fb58d2240c90e2ae85caa6355d338482da81fdff269642450a119b987aeb

  • C:\Users\Admin\AppData\Local\Temp\Rest

    Filesize

    96KB

    MD5

    28763a8a7722839bc8ce2ab430fa82c4

    SHA1

    dfc910b3f6288ea14966e57556a062b8cb4649da

    SHA256

    947d6ded15a2cd4974f40e2580d1900ef27270611ed09fca4faeec074a7b8fe9

    SHA512

    8ae6cc950390da08310cc352d5a1bc5b6fa7501731ab817a9ee97535dec1b5d65beb87010b67ce748b3e8be4b73a7c538404743eaffc43922cba5cdc88ab0616

  • C:\Users\Admin\AppData\Local\Temp\Strictly

    Filesize

    140KB

    MD5

    e14eb6ad0a8b317c4e8a3fdb9f6c4b24

    SHA1

    6c8d172a8792525f0a5ba46e06bacc06c8f986c4

    SHA256

    d19c3ed5618ddcf1c7e8f9f2aad6f9020dbfe06c07e83a9e2cff74775f50916b

    SHA512

    e7fe38315b72efa826dac7772fe5c54b529a685e97f9856795e34437a53e4546494cbf209f6d90cf255b558d98fb53e87074037644922ebb521408a2dd746106

  • C:\Users\Admin\AppData\Local\Temp\Tar8693.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Thumbnails

    Filesize

    138KB

    MD5

    e78741491bc854f7cbde3f069f94314e

    SHA1

    681b53e1569915eff99c7e1b579ce738fc7465c6

    SHA256

    fc26c1817b2597de1bde8fc406937c6cd598cd797553c26e6464f2dd630d0131

    SHA512

    954e1ebcef26665ab90c968d72c24f2d74303bc16c0e25ad633a5a6772ada4b2aa4074f377f195c10b6f3319c37b4e015a3d0d31c5ec9e34fcbc736a6b5be7cf

  • C:\Users\Admin\AppData\Local\Temp\Tuner

    Filesize

    91KB

    MD5

    694219b361a8ebd27e3b720169123583

    SHA1

    0d3dbd78af311ac516a2739e427e63a140a56c81

    SHA256

    99b7024eea08adcc218c61f24f6351c3355bf61c210d0e6fff2e76f5a8dbb567

    SHA512

    ca9d57bd8f03102db056512fc7b2aa096e847f81a711b086e7b14132cc309f1e66d5c1a339b32c775dc376f35e85b663a7ddd757eac7d91eb5662662b0787de5

  • C:\Users\Admin\AppData\Local\Temp\Twiki

    Filesize

    15KB

    MD5

    9c4150b1770ad669bd39a0843f5a7b0a

    SHA1

    8985996f8c7e6ec1569539abe05940ab26c8757c

    SHA256

    94ffc7eb03c8a7da54f408cff29bec080fc7c274dc4df30cc6c324fef4215e5b

    SHA512

    87ee959afcfa9adf9b4ca86e1c264c8d3be89f040cc6a269adba2139e92f44c58b9768a2c06005160a81bad655933294a1e592bcd32df796f7ddea916dca73a9

  • memory/1372-287-0x0000000003410000-0x0000000003432000-memory.dmp

    Filesize

    136KB

  • memory/1372-286-0x0000000003410000-0x0000000003432000-memory.dmp

    Filesize

    136KB

  • memory/1372-285-0x0000000003410000-0x0000000003432000-memory.dmp

    Filesize

    136KB

  • memory/1372-290-0x0000000003410000-0x0000000003432000-memory.dmp

    Filesize

    136KB

  • memory/1372-291-0x0000000003410000-0x0000000003432000-memory.dmp

    Filesize

    136KB

  • memory/1372-289-0x0000000003410000-0x0000000003432000-memory.dmp

    Filesize

    136KB

  • memory/1372-288-0x0000000003410000-0x0000000003432000-memory.dmp

    Filesize

    136KB