Analysis
-
max time kernel
90s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 13:57
Static task
static1
Behavioral task
behavioral1
Sample
oracleSuper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
oracleSuper.exe
Resource
win10v2004-20241007-en
General
-
Target
oracleSuper.exe
-
Size
6.3MB
-
MD5
cd7754cff6dfeea0b5d8bb51abe32d7d
-
SHA1
dc88b17814ef892d1410b261b52e96684a7dd1b2
-
SHA256
4c8b1c9ed7ba0d921b0971a3e5de96bfdb3b18024e8880c7aaa2759f13c01316
-
SHA512
c0e9e8750b1a607ccd76033c2be7eee4447b199412206903c0012d3175357c27826ddb659c30382690428676978fe97d0bb9c19bc4df4fb53994937ef7adc659
-
SSDEEP
98304:Iqcn1rB4qecWyIFft+EGSB5Fgd41YQ6sFZ/Pee1R1+jIxnSLIJ7RC+aLW:IrBawEGmHQxq/2edcCSLGRCU
Malware Config
Extracted
vidar
10.4
3ab0abf23bc38232529d79e3b78a588b
https://steamcommunity.com/profiles/76561199735694209
https://t.me/puffclou
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/4548-57-0x0000000000F70000-0x00000000011B9000-memory.dmp family_vidar_v7 behavioral2/memory/4548-71-0x0000000000F70000-0x00000000011B9000-memory.dmp family_vidar_v7 -
Vidar family
-
Executes dropped EXE 2 IoCs
pid Process 1512 livecall.exe 2644 livecall.exe -
Loads dropped DLL 2 IoCs
pid Process 1512 livecall.exe 2644 livecall.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 1832 2644 livecall.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language livecall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language livecall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oracleSuper.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4408 timeout.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4112 oracleSuper.exe 4112 oracleSuper.exe 1512 livecall.exe 2644 livecall.exe 2644 livecall.exe 1832 cmd.exe 1832 cmd.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2644 livecall.exe 1832 cmd.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1512 4112 oracleSuper.exe 84 PID 4112 wrote to memory of 1512 4112 oracleSuper.exe 84 PID 4112 wrote to memory of 1512 4112 oracleSuper.exe 84 PID 1512 wrote to memory of 2644 1512 livecall.exe 85 PID 1512 wrote to memory of 2644 1512 livecall.exe 85 PID 1512 wrote to memory of 2644 1512 livecall.exe 85 PID 2644 wrote to memory of 1832 2644 livecall.exe 86 PID 2644 wrote to memory of 1832 2644 livecall.exe 86 PID 2644 wrote to memory of 1832 2644 livecall.exe 86 PID 2644 wrote to memory of 1832 2644 livecall.exe 86 PID 1832 wrote to memory of 4548 1832 cmd.exe 95 PID 1832 wrote to memory of 4548 1832 cmd.exe 95 PID 1832 wrote to memory of 4548 1832 cmd.exe 95 PID 1832 wrote to memory of 4548 1832 cmd.exe 95 PID 1832 wrote to memory of 4548 1832 cmd.exe 95 PID 4548 wrote to memory of 768 4548 explorer.exe 98 PID 4548 wrote to memory of 768 4548 explorer.exe 98 PID 4548 wrote to memory of 768 4548 explorer.exe 98 PID 768 wrote to memory of 4408 768 cmd.exe 100 PID 768 wrote to memory of 4408 768 cmd.exe 100 PID 768 wrote to memory of 4408 768 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\oracleSuper.exe"C:\Users\Admin\AppData\Local\Temp\oracleSuper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\localTask_v2\livecall.exeC:\Users\Admin\AppData\Local\Temp\localTask_v2\livecall.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\localTask_v2\livecall.exeC:\Users\Admin\AppData\Roaming\localTask_v2\livecall.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\SysWOW64\explorer.exe" & rd /s /q "C:\ProgramData\BGHIDGCAFCBA" & exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4408
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5347aece59c5627418e5dbac7459b58b4
SHA1f5e15828245f184b661c47dc556e33d21baedc64
SHA256f5882908b77dddc2adb94cf13f10f2c0186374d4ee8025131d7d922b0b9c184f
SHA512e86cc783cb5622463da29b6ea9cb726c6e174acb206217ac0af982dddf90d1e70ea6ada7c194ef217f6cabb4d54cebe156f120c6136c2666e32d6aebd09e0c26
-
Filesize
917KB
MD5d90ca501655c2f1f7336f841c9934dc5
SHA10d2b1f0f9ac52e015dcf8c8a5b0af6379d7d6929
SHA256aa4d5239ba314fd7f0b274616e6580f2e295dd04774115691fc1063203edce98
SHA5123d6369e2c43e36ecd8072781237c7e3261fdae2231380a9e6f2ebeeaba311782b1d6909935e7ed5f3601bf688707296b05caabbb0d3f2ff2beb08816e9c5bd53
-
Filesize
779KB
MD5698ab9779a752c547148e9f49b3a9882
SHA1670a9caaef0fd226e535434b43c7358832a17b38
SHA2568f086ae53bdab26e2988e89af32258ec1aaab6f5e8c6024ca7437cdc48238802
SHA512769ed2af3cae5e319c6e4ef8cca9f3051ff35f84cd477f006afabb55cc470e72378f785b9c6f4180348a387a0124058a2b58915d29c45a548dd09c28b890efd5
-
Filesize
39KB
MD506359a574d89ea3beef13f28bb8e0200
SHA1c0c502e7bdc59990386e364364e86bba9d60f7a6
SHA256b4e8c2e4125e0d282424ace74d65610c4cac3c9d3be75b09cac46f1004cec853
SHA512cdf1151d0ee20be0fa54779d0a83147033b7e23f9ee8d1911c614316491a64980d8284d3e4171ac60ac3b8a2e240c20235a80e19f6c4a14ab6a5b14a931a63ae
-
Filesize
293KB
MD5d9602ab0e6370519bd54d13d22dd6ef5
SHA195a3a7afdb00e1b2a99fddfe5d3203aa5cd4a09d
SHA25663ec17feda1f0ea80e0dd7b7938fbf7354aedf8d9f4041543afca9a35337f7bf
SHA5124587ca630bf5e421e48d5ac7f9ac6866000b06a99d89c1ca31c999414a63ba06a6be2e11467c045b0e2cddb21d792342e69977e6abda6e265b91044e2c8007cd
-
Filesize
791KB
MD5e3706fae1e25735c63015193f9e63bf0
SHA1827c5c63d38010584e38f4fb0b1f061c231ad893
SHA2566e693c426c2bcf7e34713dd36b0fcbbf3a2f323cb10d95e765920cd9b2fccd80
SHA51237ae67b9dd5a898cf8aa4de40f2c4940d7b7f9590f214551bcc5ffbbacf1b4fd454b8382d0c345d8dd2254e7f756189dedbd1a5c1db15e6a01a43d8e87f7c9a2