Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 14:03
Static task
static1
Behavioral task
behavioral1
Sample
oracleSuper.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
oracleSuper.exe
Resource
win10v2004-20241007-en
General
-
Target
oracleSuper.exe
-
Size
6.3MB
-
MD5
cd7754cff6dfeea0b5d8bb51abe32d7d
-
SHA1
dc88b17814ef892d1410b261b52e96684a7dd1b2
-
SHA256
4c8b1c9ed7ba0d921b0971a3e5de96bfdb3b18024e8880c7aaa2759f13c01316
-
SHA512
c0e9e8750b1a607ccd76033c2be7eee4447b199412206903c0012d3175357c27826ddb659c30382690428676978fe97d0bb9c19bc4df4fb53994937ef7adc659
-
SSDEEP
98304:Iqcn1rB4qecWyIFft+EGSB5Fgd41YQ6sFZ/Pee1R1+jIxnSLIJ7RC+aLW:IrBawEGmHQxq/2edcCSLGRCU
Malware Config
Extracted
vidar
10.4
3ab0abf23bc38232529d79e3b78a588b
https://steamcommunity.com/profiles/76561199735694209
https://t.me/puffclou
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2640-58-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 behavioral1/memory/2640-107-0x0000000000400000-0x0000000000649000-memory.dmp family_vidar_v7 -
Vidar family
-
Executes dropped EXE 2 IoCs
pid Process 2992 livecall.exe 2856 livecall.exe -
Loads dropped DLL 4 IoCs
pid Process 3048 oracleSuper.exe 2992 livecall.exe 2992 livecall.exe 2856 livecall.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2856 set thread context of 2764 2856 livecall.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oracleSuper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language livecall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language livecall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2128 timeout.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3048 oracleSuper.exe 3048 oracleSuper.exe 2992 livecall.exe 2856 livecall.exe 2856 livecall.exe 2764 cmd.exe 2764 cmd.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2856 livecall.exe 2764 cmd.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2992 3048 oracleSuper.exe 30 PID 3048 wrote to memory of 2992 3048 oracleSuper.exe 30 PID 3048 wrote to memory of 2992 3048 oracleSuper.exe 30 PID 3048 wrote to memory of 2992 3048 oracleSuper.exe 30 PID 2992 wrote to memory of 2856 2992 livecall.exe 31 PID 2992 wrote to memory of 2856 2992 livecall.exe 31 PID 2992 wrote to memory of 2856 2992 livecall.exe 31 PID 2992 wrote to memory of 2856 2992 livecall.exe 31 PID 2856 wrote to memory of 2764 2856 livecall.exe 32 PID 2856 wrote to memory of 2764 2856 livecall.exe 32 PID 2856 wrote to memory of 2764 2856 livecall.exe 32 PID 2856 wrote to memory of 2764 2856 livecall.exe 32 PID 2856 wrote to memory of 2764 2856 livecall.exe 32 PID 2764 wrote to memory of 2640 2764 cmd.exe 34 PID 2764 wrote to memory of 2640 2764 cmd.exe 34 PID 2764 wrote to memory of 2640 2764 cmd.exe 34 PID 2764 wrote to memory of 2640 2764 cmd.exe 34 PID 2764 wrote to memory of 2640 2764 cmd.exe 34 PID 2764 wrote to memory of 2640 2764 cmd.exe 34 PID 2640 wrote to memory of 2116 2640 explorer.exe 37 PID 2640 wrote to memory of 2116 2640 explorer.exe 37 PID 2640 wrote to memory of 2116 2640 explorer.exe 37 PID 2640 wrote to memory of 2116 2640 explorer.exe 37 PID 2116 wrote to memory of 2128 2116 cmd.exe 39 PID 2116 wrote to memory of 2128 2116 cmd.exe 39 PID 2116 wrote to memory of 2128 2116 cmd.exe 39 PID 2116 wrote to memory of 2128 2116 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\oracleSuper.exe"C:\Users\Admin\AppData\Local\Temp\oracleSuper.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\localTask_v2\livecall.exeC:\Users\Admin\AppData\Local\Temp\localTask_v2\livecall.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Roaming\localTask_v2\livecall.exeC:\Users\Admin\AppData\Roaming\localTask_v2\livecall.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\SysWOW64\explorer.exe" & rd /s /q "C:\ProgramData\IDBAFHDGDGHD" & exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2128
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5347aece59c5627418e5dbac7459b58b4
SHA1f5e15828245f184b661c47dc556e33d21baedc64
SHA256f5882908b77dddc2adb94cf13f10f2c0186374d4ee8025131d7d922b0b9c184f
SHA512e86cc783cb5622463da29b6ea9cb726c6e174acb206217ac0af982dddf90d1e70ea6ada7c194ef217f6cabb4d54cebe156f120c6136c2666e32d6aebd09e0c26
-
Filesize
917KB
MD5edbc43dbce1886a0711d3f0072eb720b
SHA1cef14ede1b06ed6a0072540bdfa2352e6f91394d
SHA256b9f45d58368da7eec04d5786febf30bd3a930243d32c201f07c16657daec6395
SHA512211ff5c6680dff16bb9dd7733124331e06ffdc14f238a0c4ceeda4c7335f75fa148858e90b56ec53151559cf02e96bda71178dce222d4e8d4e8d59c130946063
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
779KB
MD5698ab9779a752c547148e9f49b3a9882
SHA1670a9caaef0fd226e535434b43c7358832a17b38
SHA2568f086ae53bdab26e2988e89af32258ec1aaab6f5e8c6024ca7437cdc48238802
SHA512769ed2af3cae5e319c6e4ef8cca9f3051ff35f84cd477f006afabb55cc470e72378f785b9c6f4180348a387a0124058a2b58915d29c45a548dd09c28b890efd5
-
Filesize
39KB
MD506359a574d89ea3beef13f28bb8e0200
SHA1c0c502e7bdc59990386e364364e86bba9d60f7a6
SHA256b4e8c2e4125e0d282424ace74d65610c4cac3c9d3be75b09cac46f1004cec853
SHA512cdf1151d0ee20be0fa54779d0a83147033b7e23f9ee8d1911c614316491a64980d8284d3e4171ac60ac3b8a2e240c20235a80e19f6c4a14ab6a5b14a931a63ae
-
Filesize
791KB
MD5e3706fae1e25735c63015193f9e63bf0
SHA1827c5c63d38010584e38f4fb0b1f061c231ad893
SHA2566e693c426c2bcf7e34713dd36b0fcbbf3a2f323cb10d95e765920cd9b2fccd80
SHA51237ae67b9dd5a898cf8aa4de40f2c4940d7b7f9590f214551bcc5ffbbacf1b4fd454b8382d0c345d8dd2254e7f756189dedbd1a5c1db15e6a01a43d8e87f7c9a2
-
Filesize
293KB
MD5d9602ab0e6370519bd54d13d22dd6ef5
SHA195a3a7afdb00e1b2a99fddfe5d3203aa5cd4a09d
SHA25663ec17feda1f0ea80e0dd7b7938fbf7354aedf8d9f4041543afca9a35337f7bf
SHA5124587ca630bf5e421e48d5ac7f9ac6866000b06a99d89c1ca31c999414a63ba06a6be2e11467c045b0e2cddb21d792342e69977e6abda6e265b91044e2c8007cd