Analysis

  • max time kernel
    90s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2025 13:57

General

  • Target

    oracleSuper.exe

  • Size

    6.3MB

  • MD5

    cd7754cff6dfeea0b5d8bb51abe32d7d

  • SHA1

    dc88b17814ef892d1410b261b52e96684a7dd1b2

  • SHA256

    4c8b1c9ed7ba0d921b0971a3e5de96bfdb3b18024e8880c7aaa2759f13c01316

  • SHA512

    c0e9e8750b1a607ccd76033c2be7eee4447b199412206903c0012d3175357c27826ddb659c30382690428676978fe97d0bb9c19bc4df4fb53994937ef7adc659

  • SSDEEP

    98304:Iqcn1rB4qecWyIFft+EGSB5Fgd41YQ6sFZ/Pee1R1+jIxnSLIJ7RC+aLW:IrBawEGmHQxq/2edcCSLGRCU

Malware Config

Extracted

Family

vidar

Version

10.4

Botnet

3ab0abf23bc38232529d79e3b78a588b

C2

https://steamcommunity.com/profiles/76561199735694209

https://t.me/puffclou

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1

Signatures

  • Detect Vidar Stealer 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\oracleSuper.exe
    "C:\Users\Admin\AppData\Local\Temp\oracleSuper.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\localTask_v2\livecall.exe
      C:\Users\Admin\AppData\Local\Temp\localTask_v2\livecall.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Users\Admin\AppData\Roaming\localTask_v2\livecall.exe
        C:\Users\Admin\AppData\Roaming\localTask_v2\livecall.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1832
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4548
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\SysWOW64\explorer.exe" & rd /s /q "C:\ProgramData\BGHIDGCAFCBA" & exit
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:768
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:4408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\583f54ed

    Filesize

    2.3MB

    MD5

    347aece59c5627418e5dbac7459b58b4

    SHA1

    f5e15828245f184b661c47dc556e33d21baedc64

    SHA256

    f5882908b77dddc2adb94cf13f10f2c0186374d4ee8025131d7d922b0b9c184f

    SHA512

    e86cc783cb5622463da29b6ea9cb726c6e174acb206217ac0af982dddf90d1e70ea6ada7c194ef217f6cabb4d54cebe156f120c6136c2666e32d6aebd09e0c26

  • C:\Users\Admin\AppData\Local\Temp\5ff6cd47

    Filesize

    917KB

    MD5

    d90ca501655c2f1f7336f841c9934dc5

    SHA1

    0d2b1f0f9ac52e015dcf8c8a5b0af6379d7d6929

    SHA256

    aa4d5239ba314fd7f0b274616e6580f2e295dd04774115691fc1063203edce98

    SHA512

    3d6369e2c43e36ecd8072781237c7e3261fdae2231380a9e6f2ebeeaba311782b1d6909935e7ed5f3601bf688707296b05caabbb0d3f2ff2beb08816e9c5bd53

  • C:\Users\Admin\AppData\Local\Temp\localTask_v2\foramen.flv

    Filesize

    779KB

    MD5

    698ab9779a752c547148e9f49b3a9882

    SHA1

    670a9caaef0fd226e535434b43c7358832a17b38

    SHA256

    8f086ae53bdab26e2988e89af32258ec1aaab6f5e8c6024ca7437cdc48238802

    SHA512

    769ed2af3cae5e319c6e4ef8cca9f3051ff35f84cd477f006afabb55cc470e72378f785b9c6f4180348a387a0124058a2b58915d29c45a548dd09c28b890efd5

  • C:\Users\Admin\AppData\Local\Temp\localTask_v2\fuel.log

    Filesize

    39KB

    MD5

    06359a574d89ea3beef13f28bb8e0200

    SHA1

    c0c502e7bdc59990386e364364e86bba9d60f7a6

    SHA256

    b4e8c2e4125e0d282424ace74d65610c4cac3c9d3be75b09cac46f1004cec853

    SHA512

    cdf1151d0ee20be0fa54779d0a83147033b7e23f9ee8d1911c614316491a64980d8284d3e4171ac60ac3b8a2e240c20235a80e19f6c4a14ab6a5b14a931a63ae

  • C:\Users\Admin\AppData\Local\Temp\localTask_v2\livecall.exe

    Filesize

    293KB

    MD5

    d9602ab0e6370519bd54d13d22dd6ef5

    SHA1

    95a3a7afdb00e1b2a99fddfe5d3203aa5cd4a09d

    SHA256

    63ec17feda1f0ea80e0dd7b7938fbf7354aedf8d9f4041543afca9a35337f7bf

    SHA512

    4587ca630bf5e421e48d5ac7f9ac6866000b06a99d89c1ca31c999414a63ba06a6be2e11467c045b0e2cddb21d792342e69977e6abda6e265b91044e2c8007cd

  • C:\Users\Admin\AppData\Local\Temp\localTask_v2\msidcrl40.dll

    Filesize

    791KB

    MD5

    e3706fae1e25735c63015193f9e63bf0

    SHA1

    827c5c63d38010584e38f4fb0b1f061c231ad893

    SHA256

    6e693c426c2bcf7e34713dd36b0fcbbf3a2f323cb10d95e765920cd9b2fccd80

    SHA512

    37ae67b9dd5a898cf8aa4de40f2c4940d7b7f9590f214551bcc5ffbbacf1b4fd454b8382d0c345d8dd2254e7f756189dedbd1a5c1db15e6a01a43d8e87f7c9a2

  • memory/1512-29-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-28-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/1832-49-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

    Filesize

    2.0MB

  • memory/1832-48-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/1832-50-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/1832-51-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/1832-55-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/2644-41-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/2644-45-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/2644-42-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

    Filesize

    2.0MB

  • memory/2644-43-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/4112-19-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/4112-44-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/4112-20-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/4112-1-0x0000000000E80000-0x00000000014D0000-memory.dmp

    Filesize

    6.3MB

  • memory/4112-18-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/4112-9-0x00000000748F2000-0x00000000748F4000-memory.dmp

    Filesize

    8KB

  • memory/4112-8-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

    Filesize

    2.0MB

  • memory/4112-7-0x00000000748E0000-0x0000000074A5B000-memory.dmp

    Filesize

    1.5MB

  • memory/4548-56-0x00007FF82D390000-0x00007FF82D585000-memory.dmp

    Filesize

    2.0MB

  • memory/4548-57-0x0000000000F70000-0x00000000011B9000-memory.dmp

    Filesize

    2.3MB

  • memory/4548-71-0x0000000000F70000-0x00000000011B9000-memory.dmp

    Filesize

    2.3MB